Edge Security
  • Overview
  • DDoS Protection
    • DDoS Protection Overview
    • Exclusive DDoS Protection Usage
    • Configuration of Exclusive DDoS protection Rules
      • Increase DDoS Protection Level
      • Exclusive DDoS Traffic Alarm
      • Configuration IP blocklist/allowlist
      • Configuration Region Blocking Rule
      • Configuration Port Filtering
      • Configuration Features Filtering
      • Configuration Protocol Blocking Rule
      • Configuration Connections Attack Protection
      • Related References
        • Action
        • Related Concepts Introduction
  • Web Protection
    • Overview
    • Managed rules
    • CC attack defense
    • Custom rule
    • Custom Rate Limiting Rules
    • Exception Rules
    • Managed Custom Rules
    • Web security monitoring alarm
    • Refer
      • Web Protection Request Processing Order
      • Action
      • Match Condition
  • Bot Management
    • Overview
    • Bot Intelligent analysis
    • Bot Basic Feature Management
    • Client Reputation
    • Active Detection
    • Custom Bot Rule
    • Bot Exception Rule
    • Related References
      • Action
  • Rules Template
  • IP and IP Segment Grouping
  • Origin Protection
  • Custom Response Page
  • Alarm Notification
  • SSL/TLS
    • Overview
    • Deploying/Updating SSL Certificate for A Domain Name
    • Configuring A Free Certificate for A Domain Name
    • HTTPS Configuration
      • Forced HTTPS Access
      • Enabling HSTS
      • SSL/TLS Security Configuration
        • Configuring SSL/TLS Security
        • TLS Versions and Cipher Suites
      • Enabling OCSP Stapling

Overview

Bot management is a service that maintains the quality of your website traffic. Among your website visitors, there may be a portion of visits that are not initiated by real users, but by automated programs, which we usually call bots. Although some bots (e.g., search engine crawlers) are beneficial to the website, they may also cause the following issues:
1. Abnormal website traffic or performance degradation: A large amount of bot traffic may consume a lot of server resources, affecting the access experience of real users. In this case, bot management helps to identify and control these bots, optimizing website performance and improving user experience.
2. Abnormal data statistics, such as traffic and click-through rates: This may be caused by bots simulating user behavior. Bot management can more accurately distinguish between real user and bot behavior, allowing you to obtain more realistic data.
3. Website content or user information leakage or abuse: Bots may try to crawl and copy website content or obtain user personal information. Bot management can effectively block unauthorized access, protecting the security of website content and user information.
If you encounter the above issues while operating a website, then bot management is the tool you need.

Feature Overview

Bot management mainly includes the following features,Bot management will process requests in the following order.
Note:
Bot management functions are only supported when the domain name of the site has bot management capabilities enabled. After enabling, the billing standard for bot management can be found in VAU Fee (pay-as-you-go).
Module
Configurations
Customizable and flexible bot management rules, supporting multiple identification mechanisms and providing flexible disposal options. For example, delay the response of half of the automated shopping cart crawlers and silently dispose of the other half.
Identify bot tools and control them by combining the User-Agent header and client IP within the request with the corresponding features of search engines and tools.
For example, allow search engine bots to access website resources.
Identify malicious bots and provide control by combining the client IP with the threat intelligence database.
For example, intercept bot behavior that uses flash dial IP and other proxy device pools for malicious access.
Quickly deploy bot identification mechanisms, integrate multiple bot feature identification mechanisms, quickly deploy, identify and analyze website traffic patterns. It provides a clear view of user and bot visitors by automatically analyzing and classifying traffic and allows for appropriate disposal decisions for different types of traffic.
Identify human browser clients (not applicable to native mobile apps) by verifying the client's runtime environment and access behavior through Cookie and JavaScript.