You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -63,7 +61,7 @@ API Shield searches for and highlights BOLA attacks on your APIs. Cloudflare lea
63
61
64
62
If you see one of these labels on your API endpoints, check its authorization policy with your developer team to find any authorization bugs. Additionally, you can reach out to Cloudflare for a customized report about the behavior, including attacker identifiers that you can use to confirm attack reach and impact.
65
63
66
-
BOLA attack information can be found in your [Security Overview](#security-overview) and [Endpoint details](#endpoint-details). Closed beta customers can find BOLA attack information in [Security Analytics](#security-analytics) as well.
64
+
BOLA attack information can be found in your [Security Overview](#security-overview), [Security Analytics](#security-analytics), and [Endpoint details](#endpoint-details).
67
65
68
66
### Security Overview
69
67
@@ -98,10 +96,6 @@ Review the top statistics and details of managed API endpoints, paths and values
98
96
99
97
Cloudflare recommends that you observe your traffic profile for any anomalies in its normal behavior.
100
98
101
-
:::note[Availability]
102
-
BOLA attacks in Security Analytics is currently available in closed beta.
103
-
:::
104
-
105
99
### Endpoint details
106
100
107
101
You can expand the endpoint details in Web Assets to access information on suspicious sessions' activity on the endpoint, including both enumeration attack and parameter pollution attack details.
@@ -120,7 +114,7 @@ The details specify the parameter that was affected, the number of sessions invo
120
114
121
115
If unauthorized access to the parameter was obtained, consider the potential impact to your application, users, and data. As a best practice, consult with your application and API developers to confirm unauthorized access by reviewing your API origin logs for the IP address and JA4 fingerprint of the abusive sessions.
122
116
123
-
Closed beta customers can view attack data in [Security Analytics](#security-analytics).
117
+
You can view attack data in [Security Analytics](#security-analytics).
@@ -130,4 +124,4 @@ The managed endpoint will be automatically filtered in the request activity from
130
124
131
125
## Availability
132
126
133
-
Details of BOLA attacks visible in Security Analytics are only available for customersin the closed beta.
127
+
Broken Object Level Authorization vulnerability detection is only available for Enterprise customers. If you are an Enterprise customer interested in this product, contact your account team.
Copy file name to clipboardExpand all lines: src/content/docs/api-shield/security/volumetric-abuse-detection.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,4 +85,4 @@ API Shield will always calculate recommendations when session identifiers are co
85
85
86
86
## Availability
87
87
88
-
Volumetric Abuse Detection is only available for Enterprise customers. If you are an Enterprise customer and interested in this product, contact your account team.
88
+
Volumetric Abuse Detection is only available for Enterprise customers. If you are an Enterprise customer interested in this product, contact your account team.
0 commit comments