Select Service
Configure Bot Defense Standard (Connectors)
Your Bot Defense Standard configuration process depends on how you host the applications that you want to protect. Before you begin the configuration process, make sure you have thoroughly reviewed the planning and best practice information](bot-defense/how-tos/plan-bot-defense) to help you make the correct configuration decisions.
Important: When you configure Bot Defense, F5 recommends that you set all mitigation actions to Flag or Continue until you finish testing that the system is configured properly and working as intended.
- For applications that route traffic through F5 Distributed Cloud Mesh (WAAP), see Configure Bot Defense on an HTTP load balancer (WAAP).
- For applications that route traffic through BIG-IP, see one of the following topics:
- For applications hosted on a third-party content delivery network, see one of the following topics:
- For all other applications, you can configure a custom integration with Bot Defense.
Next Steps
When you finish configuring Bot Defense, review Bot Defense results to help ensure the system is correctly identifying automated traffic. See the following information: