-
Notifications
You must be signed in to change notification settings - Fork 12.8k
[Support Feedback] Improve IUAM, DDoS triage, and origin protection docs (DDoS Protection) #28994
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: production
Are you sure you want to change the base?
Changes from all commits
a82dcf3
dd472ba
57368c3
45b533c
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,6 +1,6 @@ | ||
| --- | ||
| pcx_content_type: reference | ||
| source: https://support.cloudflare.com/hc/en-us/articles/200170076-Understanding-Cloudflare-Under-Attack-mode-advanced-DDOS-protection- | ||
|
Check warning on line 3 in src/content/docs/fundamentals/reference/under-attack-mode.mdx
|
||
| title: Under Attack mode | ||
| --- | ||
|
|
||
|
|
@@ -65,6 +65,37 @@ | |
|
|
||
| --- | ||
|
|
||
| ## Configuration strategies | ||
|
|
||
| You can scope Under Attack mode to match your needs rather than enabling it globally for your entire zone. | ||
|
|
||
| ### Site-wide | ||
|
|
||
| Turn on Under Attack mode for your entire zone via the dashboard **Quick Actions** sidebar. This is the fastest way to respond when your whole site is under attack. | ||
|
|
||
| ### Scope to specific pages | ||
|
|
||
| If only certain pages or sections are under attack, use a [configuration rule](/rules/configuration-rules/) to apply Under Attack mode selectively. Check your access logs or [analytics](/analytics/) to identify which paths are receiving attack traffic, then target only those paths. | ||
|
|
||
| ### Selectively disable for specific areas | ||
|
|
||
| If you have enabled Under Attack mode site-wide but it breaks certain parts of your site (for example, API endpoints or areas that serve non-browser traffic), use a [configuration rule](/rules/configuration-rules/) to set the security level to a lower value for those paths. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This statement Customers can no longer able to change levels (low, medium, etc..). I'd suggest changing it to |
||
|
|
||
| ### Use WAF custom rules for targeted challenges | ||
|
|
||
| When attack traffic clusters from a specific source, use [WAF custom rules](/waf/custom-rules/) to apply challenges selectively based on ASN, country, IP range, or other request attributes. This is useful when you can identify a pattern in the attack traffic but do not want to challenge all visitors globally. | ||
|
|
||
| --- | ||
|
|
||
| ## Important considerations | ||
|
|
||
| - **Under Attack mode applies challenges at Cloudflare's edge.** Challenge outcomes are recorded in [Cloudflare security analytics](/waf/analytics/security-events/). Requests reach your origin only after a challenge is solved, via a valid `cf_clearance` cookie, or when traffic is excluded from Under Attack mode through configuration rules. | ||
| - **Non-browser traffic will be blocked.** Under Attack mode requires JavaScript execution, so API clients, mobile apps, and automated integrations will fail the challenge. Use configuration rules or WAF custom rules to exclude these paths or traffic types. | ||
| - **Disable when the attack subsides.** Under Attack mode is designed as a temporary measure. Once attack traffic returns to normal, turn it off to avoid unnecessarily challenging legitimate visitors. | ||
| - **Consider customizing the challenge page.** You can brand the interstitial page shown to visitors during the challenge. Go to **Configurations** > **Custom Pages** > **Managed Challenge / I'm Under Attack Mode** to configure a custom page. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Let's change: To: |
||
|
|
||
| --- | ||
|
|
||
| ## Potential issues | ||
|
|
||
| Since the Under Attack mode requires your browser to support JavaScript to display and pass the interstitial page, it is expected to observe impact on third party analytics tools. | ||
Uh oh!
There was an error while loading. Please reload this page.