Updated on 2025-12-15 GMT+08:00

Getting Started

After you have connected your website to EdgeSec, you can view common practices to better use EdgeSec.

Table 1 Common practices

Practice

Description

Enabling Basic Web Protection to Block SQL Injection Attacks

This topic walks you through how to enable basic web protection to block SQL injection attacks using EdgeSec.

Limiting Traffic Through IP Address-based Rate Limiting

This section guides you through configuring IP address-based rate limiting protection rules against Challenge Collapsar (CC) attacks.

Limiting Traffic Based on the Cookie Field

This section guides you through configuring cookie-based protection rules against Challenge Collapsar (CC) attacks.

Preventing Bonus Hunting by Configuring Service Cookies and System IDs

This section guides you through configuring service cookies and system IDs to prevent bonus hunting and malicious downloads.

Preventing Data Stolen Risks in a Timely Manner by Configuring Real-Time Monitoring

Real-time monitoring and warning: You can configure CDN to interconnect with Cloud Eye to view basic data (such as traffic, bandwidth, and status codes) of acceleration domain names under your account in real time. Additionally, you can set up alarm functions. When these alarms are triggered, notifications will be sent via email, SMS, WeCom, or DingTalk, enabling you to promptly detect potential risks.

Configuring Traffic Cap and Rate Limiting to Avoid High Bills

In this case, you can enable usage cap. Once the consumed bandwidth or traffic reaches the cap in a specified period, CDN acceleration will be disabled for this domain name.

Analyzing Attack Characteristics and Configuring Protection Policies Based on Statistics Reports and Logs

You can analyze traffic bursts based on statistics reports, offline logs, and real-time logs, locate attack characteristics, and configure protection policies.

Automated or AI-based Protection

BOT protection uses AI and the built-in signature database to automatically analyze visitor behavior, identify suspected fraud and attacks, and automatically defend against them. The IP intelligence database identifies client IP addresses. The protection actions can be configured based on the matching results.