Skip to content

Commit 18368e7

Browse files
authored
Merge pull request #295 from auth0/fix/DOCS-5270-clarify-bot-detection-doc
Update bot-detection.mdx
2 parents 092da09 + 2f6faea commit 18368e7

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

main/docs/secure/attack-protection/bot-detection.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ Auth0 uses a large amount of data and statistical models to identify patterns th
2727

2828
## Configure Bot Detection
2929

30-
Auth0 enables Bot Detection by default for all connections.
30+
When enabled, you can customize Bot Detection preferences, such as the detection model, and response actions, which applies to all connections in your tenant.
3131

32-
If you do not configure **Response** settings with Bot Detection enabled, Bot Detection operates in [Monitoring](/docs/secure/attack-protection#monitoring) mode. Monitoring mode records related events (with risk assessment information) in your tenant log for you to review. To learn more, read [View Attack Protection Log Events](/docs/secure/attack-protection/view-attack-protection-events).
32+
If you do not configure **Response** actions with Bot Detection enabled, Bot Detection operates in [Monitoring](/docs/secure/attack-protection#monitoring) mode. Monitoring mode records related events, including risk assessment details, in your tenant logs for review. To learn more, read [View Attack Protection Log Events](/docs/secure/attack-protection/view-attack-protection-events).
3333

3434
You can enable tenant logs for Risk Assessment in the [Auth0 Dashboard](https://manage.auth0.com/#).
3535

@@ -214,4 +214,4 @@ Your custom login form code must handle scenarios where the user is asked to pas
214214
* [Add Bot Detection to Native Applications](/docs/secure/attack-protection/bot-detection/bot-detection-native-apps)
215215
* [Breached Password Detection](/docs/secure/attack-protection/breached-password-detection)
216216
* [Brute-Force Protection](/docs/secure/attack-protection/brute-force-protection)
217-
* [Suspicious IP Throttling](/docs/secure/attack-protection/suspicious-ip-throttling)
217+
* [Suspicious IP Throttling](/docs/secure/attack-protection/suspicious-ip-throttling)

0 commit comments

Comments
 (0)