| Additional control |
- Ability to restrict by path, IP address, and more. Access to bot score, JA3/JA4 fingerprint, bot tags fields, and detection IDs. |
+ Ability to restrict by path, IP address, and more. Access to bot score, JA3/JA4 fingerprint, bot tags fields, and detection IDs. |
diff --git a/src/content/partials/bots/bot-analytics-traffic-characteristics.mdx b/src/content/partials/bots/bot-analytics-traffic-characteristics.mdx
index e0a62ee4026ad52..ea1d94ecfe5ab65 100644
--- a/src/content/partials/bots/bot-analytics-traffic-characteristics.mdx
+++ b/src/content/partials/bots/bot-analytics-traffic-characteristics.mdx
@@ -10,4 +10,4 @@ Pay specific attention to:
* Traffic from Outlook or Office user-agents.
* Traffic from cloud-based Secure Web Gateways (ASNs labeled with the proxy provider).
* Traffic from on-premises forward proxies.
-* Whether requests come from a predictable IP address and ASN, or have a similar [JA3 fingerprint](/bots/concepts/ja3-ja4-fingerprint/).
+* Whether requests come from a predictable IP address and ASN, or have a similar [JA3 fingerprint](/bots/additional-configurations/ja3-ja4-fingerprint/).
diff --git a/src/content/partials/bots/bots-jsd.mdx b/src/content/partials/bots/bots-jsd.mdx
index 450ff8dec6a276a..0db49de66e6f82f 100644
--- a/src/content/partials/bots/bots-jsd.mdx
+++ b/src/content/partials/bots/bots-jsd.mdx
@@ -3,4 +3,4 @@
---
-The [**JavaScript Detections (JSD)**](/bots/reference/javascript-detections/) engine identifies headless browsers and other malicious fingerprints. This engine performs a lightweight, invisible JavaScript injection on the client side of any request while honoring our [strict privacy standards](https://www.cloudflare.com/privacypolicy/). We do not collect any personally identifiable information during the process. The JSD engine either blocks, challenges, or passes requests to other engines.
+The [**JavaScript Detections (JSD)**](/bots/additional-configurations/javascript-detections/) engine identifies headless browsers and other malicious fingerprints. This engine performs a lightweight, invisible JavaScript injection on the client side of any request while honoring our [strict privacy standards](https://www.cloudflare.com/privacypolicy/). We do not collect any personally identifiable information during the process. The JSD engine either blocks, challenges, or passes requests to other engines.
diff --git a/src/content/partials/bots/cf-clearance-cookie.mdx b/src/content/partials/bots/cf-clearance-cookie.mdx
index 6eb65a573c38dc1..d395290564350e8 100644
--- a/src/content/partials/bots/cf-clearance-cookie.mdx
+++ b/src/content/partials/bots/cf-clearance-cookie.mdx
@@ -5,7 +5,7 @@
:::note
-[JavaScript detections](/bots/reference/javascript-detections/) are stored in the `cf_clearance` cookie.
+[JavaScript detections](/bots/additional-configurations/javascript-detections/) are stored in the `cf_clearance` cookie.
The `cf_clearance` cookie cannot exceed the maximum size of 4096 bytes.
:::
\ No newline at end of file
diff --git a/src/content/partials/bots/firewall-variables.mdx b/src/content/partials/bots/firewall-variables.mdx
index 1cc6a78a2c2c685..b7a1c0ac1928498 100644
--- a/src/content/partials/bots/firewall-variables.mdx
+++ b/src/content/partials/bots/firewall-variables.mdx
@@ -6,7 +6,7 @@ Bot Management provides access to several [new variables](/ruleset-engine/rules-
- **Bot Score** (`cf.bot_management.score`): An integer between 1-99 that indicates [Cloudflare's level of certainty](/bots/concepts/bot-score/) that a request comes from a bot.
- **Verified Bot** (`cf.bot_management.verified_bot`): A boolean value that is true if the request comes from a good bot, like Google or Bing. Most customers choose to allow this traffic. For more details, see [Traffic from known bots](/waf/troubleshooting/faq/#how-does-the-waf-handle-traffic-from-known-bots).
-- **Serves Static Resource** (`cf.bot_management.static_resource`): An identifier that matches [file extensions](/bots/reference/static-resources/) for many types of static resources. Use this variable if you send emails that retrieve static images.
-- **ja3Hash** (`cf.bot_management.ja3_hash`) and **ja4** (`cf.bot_management.ja4`): A [**JA3/JA4 fingerprint**](/bots/concepts/ja3-ja4-fingerprint/) helps you profile specific SSL/TLS clients across different destination IPs, Ports, and X509 certificates.
+- **Serves Static Resource** (`cf.bot_management.static_resource`): An identifier that matches [file extensions](/bots/additional-configurations/static-resources/) for many types of static resources. Use this variable if you send emails that retrieve static images.
+- **ja3Hash** (`cf.bot_management.ja3_hash`) and **ja4** (`cf.bot_management.ja4`): A [**JA3/JA4 fingerprint**](/bots/additional-configurations/ja3-ja4-fingerprint/) helps you profile specific SSL/TLS clients across different destination IPs, Ports, and X509 certificates.
- **Bot Detection IDs** (`cf.bot_management.detection_ids`): List of IDs that correlate to the Bot Management heuristic detections made on a request (you can have multiple heuristic detections on the same request).
- **Verified Bot Categories** (`cf.verified_bot_category`): A string that allows you to segment your verified bot traffic by its [type and purpose](/bots/concepts/bot/verified-bots/categories/).
diff --git a/src/content/partials/bots/get-started-pro-biz-steps.mdx b/src/content/partials/bots/get-started-pro-biz-steps.mdx
index 43d2fdfb687a415..643f29cda0c199f 100644
--- a/src/content/partials/bots/get-started-pro-biz-steps.mdx
+++ b/src/content/partials/bots/get-started-pro-biz-steps.mdx
@@ -11,8 +11,8 @@ To start using Super Bot Fight Mode:
Choose how your domain should respond to various types of traffic:
- For more details on verified bots, refer to [Verified Bots](/bots/concepts/bot/#verified-bots).
- - For more details on supported file types, refer to [Static resource protection](/bots/reference/static-resources/).
- - For more details on invisible code injection, refer to [JavaScript detections](/bots/reference/javascript-detections/).
+ - For more details on supported file types, refer to [Static resource protection](/bots/additional-configurations/static-resources/).
+ - For more details on invisible code injection, refer to [JavaScript detections](/bots/additional-configurations/javascript-detections/).
:::caution[Warning]
diff --git a/src/content/partials/bots/ja3-ja4-null.mdx b/src/content/partials/bots/ja3-ja4-null.mdx
index 2add73035242562..0d635667074dae1 100644
--- a/src/content/partials/bots/ja3-ja4-null.mdx
+++ b/src/content/partials/bots/ja3-ja4-null.mdx
@@ -3,6 +3,6 @@
---
-The [JA3/JA4 fingerprint](/bots/concepts/ja3-ja4-fingerprint/) can be null or empty in some cases. The most common case is for HTTP requests because JA3 and JA4 are calculated in TLS. It can also be empty due to the Worker sending requests within the same zone or to a zone that is not proxied (or a third party).
+The [JA3/JA4 fingerprint](/bots/additional-configurations/ja3-ja4-fingerprint/) can be null or empty in some cases. The most common case is for HTTP requests because JA3 and JA4 are calculated in TLS. It can also be empty due to the Worker sending requests within the same zone or to a zone that is not proxied (or a third party).
[Orange to Orange (O2O)](/cloudflare-for-platforms/cloudflare-for-saas/saas-customers/) should not cause null or empty JA3 or JA4 fingerprints, unless the eyeball zone is routing traffic to the target zone using a Worker.
\ No newline at end of file
diff --git a/src/content/partials/bots/javascript-detections-implementation.mdx b/src/content/partials/bots/javascript-detections-implementation.mdx
index e0a510377c7381a..313d4c86bea3abc 100644
--- a/src/content/partials/bots/javascript-detections-implementation.mdx
+++ b/src/content/partials/bots/javascript-detections-implementation.mdx
@@ -14,7 +14,7 @@ When adding this field to WAF custom rules, use it:
### Prerequisites
* You must have JavaScript detections enabled on your zone.
-* You must have [updated your Content Security Policy headers](/bots/reference/javascript-detections/#if-you-have-a-content-security-policy-csp) for JavaScript detections.
+* You must have [updated your Content Security Policy headers](/bots/additional-configurations/javascript-detections/#if-you-have-a-content-security-policy-csp) for JavaScript detections.
* You must not run this field on websocket endpoints.
* You must use the field in a custom rules expression that expects only browser traffic.
* The action should always be a managed challenge in case a legitimate user has not received the challenge for network or browser reasons.
diff --git a/src/content/partials/bots/rss-labels.mdx b/src/content/partials/bots/rss-labels.mdx
index e5ac2387128b4ce..d22a3e39d0192af 100644
--- a/src/content/partials/bots/rss-labels.mdx
+++ b/src/content/partials/bots/rss-labels.mdx
@@ -2,6 +2,6 @@
{}
---
-[Bot Fight Mode](/bots/get-started/free/) will not block requests to endpoints labeled as `cf-rss-feed`.
+[Bot Fight Mode](/bots/get-started/bot-fight-mode/) will not block requests to endpoints labeled as `cf-rss-feed`.
-[Super Bot Fight Mode rules](/bots/get-started/pro/#ruleset-engine) will not match or challenge requests labeled as `cf-rss-feed`.
\ No newline at end of file
+[Super Bot Fight Mode rules](/bots/get-started/super-bot-fight-mode/#ruleset-engine) will not match or challenge requests labeled as `cf-rss-feed`.
\ No newline at end of file
diff --git a/src/content/partials/speed/brotli-compression-warning.mdx b/src/content/partials/speed/brotli-compression-warning.mdx
index 26fa4d59d9db266..eea0423d3f16e37 100644
--- a/src/content/partials/speed/brotli-compression-warning.mdx
+++ b/src/content/partials/speed/brotli-compression-warning.mdx
@@ -14,7 +14,7 @@ Even when using the same compression algorithm end to end (between your origin s
- [Mirage](/speed/optimization/images/mirage/)
- [Polish](/images/polish/)
- [Rocket Loader](/speed/optimization/content/rocket-loader/)
-- [JavaScript detections](/bots/reference/javascript-detections/)
+- [JavaScript detections](/bots/additional-configurations/javascript-detections/)
- [RUM](/speed/speed-test/run-speed-test/#enable-real-user-monitoring-rum)
To disable these settings for specific URI paths, create a [configuration rule](/rules/configuration-rules/).