Skip to content

Commit

Permalink
Apply suggestions from PCX review
Browse files Browse the repository at this point in the history
Co-authored-by: marciocloudflare <83226960+marciocloudflare@users.noreply.github.com>
  • Loading branch information
pedrosousa and marciocloudflare authored Sep 23, 2024
1 parent ac54b14 commit 8627e7d
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ Alternatively, create a WAF custom rule like the one described in the next step

## 3. Mitigate requests with leaked credentials

If you are on a Free plan, deploy the suggested [rate limiting rule](/waf/rate-limiting-rules/) template available in **WAF** > **Rate limiting rules**. When you deploy a rule using this template, you get instant protection against IPs attempting to access your application with a leaked password more than 5 times per 10 seconds. This rule can delay attacks by blocking them for a period of time. Alternatively, you can create a custom rule.
If you are on a Free plan, deploy the suggested [rate limiting rule](/waf/rate-limiting-rules/) template available in **WAF** > **Rate limiting rules**. When you deploy a rule using this template, you get instant protection against IPs attempting to access your application with a leaked password more than five times per 10 seconds. This rule can delay attacks by blocking them for a period of time. Alternatively, you can create a custom rule.

Paid plans have access to more granular controls when creating a WAF rule. If you are on a paid plan, create a [custom rule](/waf/custom-rules/) that challenges requests containing leaked credentials:

Expand Down

0 comments on commit 8627e7d

Please sign in to comment.