Follow

Integrating Shape Defense

 

Description

  • Shape Defense protects your application against unwanted automations. To implement Shape Defense, follow the steps outlined below.

Environment

  • Silverline Shape Defense

Procedure

Shape Defense onboarding process is divided into four phases: Preparation, Provisioning, Testing and Release. The phases and the underlying tasks are listed below and should be implemented sequentially.

For assistance with any of the steps, please contact Silverline SOC (support@f5silverline.com).

 

  1. Preparation 
    1. Shape Defense Overview
    2. Best Practices
  2. Provisioning
  3. Testing
  4. Release
    1. Point DNS to Silverline
    2. False Positive Analysis for Web Traffic
    3. False Positive Analysis for Mobile Traffic
    4. Enable Mitigation

 

Related Content

 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request