diff --git a/src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx b/src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx
index 3129f01fc99a54c..282460598856e18 100644
--- a/src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx
+++ b/src/content/docs/ddos-protection/managed-rulesets/adaptive-protection.mdx
@@ -19,8 +19,6 @@ Adaptive DDoS Protection provides the following types of protection:
Cloudflare Adaptive DDoS Protection is available to Enterprise customers according to the following table:
-
-
| Feature | Profiling dimension | WAF/CDN1 | Magic Transit /
Spectrum BYOIP2 |
| --------------------------------- | ------------------------------------------ | :-----------------: | :--------------------------------------------: |
| **HTTP Adaptive DDoS Protection** | | | |
@@ -31,8 +29,6 @@ Cloudflare Adaptive DDoS Protection is available to Enterprise customers accordi
| For Protocols | IP protocol | — | Yes |
| For Protocols | Client IP country and Region for UDP | — | Yes |
-
-
1 _WAF/CDN customers on the Enterprise plan with the Advanced DDoS Protection subscription._
2 _Magic Transit and Spectrum BYOIP customers on an Enterprise plan._
@@ -69,10 +65,19 @@ To view traffic flagged by L3/4 Adaptive DDoS Protection rules:
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
2. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
-3. Filter by `Ruleset ID equals 3b64149bfa6e4220bbbc2bd6db589552` (the ID of the Network-layer DDoS Attack Protection managed ruleset) and by rule ID.
+3. Filter by rule ID.
You may also obtain information about flagged traffic through [Logpush](/logs/about/) or the [GraphQL API](/analytics/graphql-api/).
+
+To determine if it is safe to enable an adaptive rule in mitigation:
+
+[INFO]
+
+:::note
+Only suspected attack traffic over certain thresholds will be shown in your logs.
+:::
+
## Configure the rules
You can adjust the action and sensitivity of the Adaptive DDoS Protection rules. The default action is _Log_. Use this action to first observe what traffic is flagged before deciding on a mitigation action.