Jump to Content
Guide
Reference
v3.5
v3.6
v4.0
v4.1
v5.0
v5.1
v5.2
v5.3
v5.4
v5.5
v5.6
v6.0
v6.1
v6.2
v6.3
v6.4
Training
Support
Community
Guide
Training
Support
Community
v5.0
Guide
Reference
Search
Get Started
Overview
Alternative authentication
Environment variables
Base IDs
Knowledge articles
Request limits
Identity and Access Management
Create identities and control access
Data sources
Contact types
Countries
Grantable roles
Groups
Roles
States
Supported languages
Time zones
Timeout policies
Resources
Blocked user properties
Group
Role
User
Application Security
Configure AppSec
Match targets
Rate policy
Data sources
API endpoints
API request constraints
Attack groups
Attack payload logging
Bypass network lists
Configuration
Configuration version
Contracts groups
Custom deny
Custom rule actions
Custom rules
Eval group
Eval penalty box
Eval rules
Evasive path match
Failover hostnames
Hostname coverage
Hostname coverage match targets
Hostname coverage overlapping
IP geo
Malware content types
Malware policies
Malware policy actions
Match targets
Penalty box
PII learning
Policy actions
Pragma header
Prefetch
Rate policies
Reputation profile actions
Reputation profile analysis
Reputation profiles
Request body settings
Rule upgrade details
Rules
Security policy
Security policy protections
Selectable hostnames
Selected hostnames
Siem definitions
Siem settings
Slow POST
Threat intel
Tuning recommendations
Version notes
WAF mode
WAP selected hostnames
Resources
Activations
Advanced logging
API constraints protection
API request constraints
Attack group
Attack payload logging
Bypass network lists
Configuration
Configuration rename
Custom deny
Custom rule
Custom rule action
Eval
Eval group
Eval penalty box
Eval rule
Evasive path match
IP geo
IP geo protection
Match target sequence
Malware policy
Malware policy action
Malware policy actions
Malware protection
Match target
Penalty box
PII learning
Policy rename
Pragma header
Prefetch
Rate policy
Rate policy action
Rate protection
Reputation profile
Reputation profile action
Reputation profile analysis
Reputation protection
Request body settings
Rule
Rule upgrade
Security policy
Selected hostnames
Siem settings
Slow POST
Slow POST protection
Threat intel
Version notes
WAF mode
WAF protections
WAP selected hostnames
Bot Manager
Define bot responses
Data sources
Bot category
Bot category action
Bot category exception
Bot endpoint coverage report
Bot management settings
Challenge action
Challenge interception rules
Client-side security
Conditional action
Custom-bot category
Custom-bot category action
Custom-bot category sequence
Custom-defined bot
Custom client
Custom deny action
Defined bot
Detection
Detection action
JavaScript injection
Recategorized Akamai-defined bot
Response action
Serve alternate action
Transactional endpoint
Transactional endpoint protection
Resources
Bot detecton action
Bot category action
Bot category exception
Bot management settings
Challenge action
Challenge interception rules
Conditional action
Client-side security
Custom-bot category
Custom-bot category action
Custom-bot category sequence
Custom client
Custom-defined bot
Custom deny action
JavaScript injection
Recategorized Akamai-defined bot
Serve alternate action
Transactional endpoint
Transactional endpoint protection
Network Lists
Configure network lists
Data sources
Network Lists
Resources
Activations
Description
Network Lists
Subscription
Edge DNS
Configure DNS zones
Data sources
Authorities set
DNS record set
Resources
DNS record
DNS zone
Property
Provision properties
Rules
Includes
Behaviors
Data sources
CP code
Hostnames
Include
Include activation
Include parents
Include rules
Includes
Products
Properties
Property
Property activation
Search
Rule formats
Rules
Rules builder
Rules template
Resources
Activation
CP code
Edge hostname
Include
Include activation
Property
Certificates
Provision certificates
Data sources
Certificate Signing Request
Deployments
Enrollment
Enrollments
Warnings
Resources
3rd-party enrollment
DV enrollment
DV validation
Upload certificate
Image and Video Manager
Add and maintain policy rules
Transform Images
Data sources
Policy image
Policy video
Resources
Policy image
Policy set
Policy video
Global Traffic Management
Create domain configurations
Data sources
Default datacenter
Datacenter
Datacenters
Resources
AS map
CIDR map
Datacenter
Domain
Geo map
Property
Resource
Cloudlets
Set up Cloudlets policies
Load Balancer Configuration
Separate origin
Data Sources
API prioritization match rule
Application load balancer
Audience segmentation match rule
Edge redirector match rule
Forward rewrite match rule
Load balancer match rule
Phased release match rule
Policy
Request control match rule
Visitor prioritization match rule
Resources
Application load balancer
Application load balancer activation
Policy activation
Policy
EdgeWorkers
Enable EdgeWorkers functions
Data sources
Activation
EdgeWorker
EdgeKV group items
EdgeKV groups
Property rules
Resource tier
Resources
Activation
EdgeKV
EdgeKV group items
EdgeWorkers
DataStream
Create data streams
DataStream migration
Data sources
Activation history
Data set fields
Data streams
Resources
Data stream
Suggest
akamai_appsec_security_policy_protections