Applies To:Show Versions
- 15.0.0, 14.1.0
Common elements for anomaly detection
- On the Main tab, click.The Web Scraping screen opens.
- If you want the system to monitor behavior by browser (and collect its attributes) rather than by session, select theFingerprinting Usagecheck box.The screen enables fingerprinting and displays theSuspicious Clientssetting, which works together with the fingerprinting feature.
- If you plan to use fingerprinting to monitor behavior by browser (and collect its attributes) rather than by session, select theFingerprinting Usagecheck box.The screen displays additional settings; a separate task explains how to use fingerprinting to detect web scraping.
- For theIP Address Whitelistsetting, click the arrow to go to a screen where you can add the IP addresses and subnets from which traffic is known to be safe.The system adds any whitelist IP addresses to the centralized IP address exceptions list. The exceptions list is common to both brute force prevention and web scraping detection configurations.
- If you want to protect client identification data (when using Bot Detection or Session Opening detection), specify the persistence settings.
- Select thePersistent Client Identificationcheck box.
- ForPersistent Data Validity Period, type how long you want the client data to persist in minutes. The default value is120minutes.
- ForPrevention Duration, type a number that indicates how long the system prevents an anomaly attack by logging or blocking requests. The default is1800seconds.If the attack ends before this number of seconds, the system also stops attack prevention.
- To ensure that web scraping violations are learned, in the Policy Building Settings area, expandBot Detectionand selectWeb scraping detected, if it is not already selected.