Fortinet black logo

User Guide

Known Bots

Copy Link
Copy Doc ID a9687b55-f2f2-11ee-8c42-fa163e15d75b:767135
Download PDF

Known Bots

Configuring Known Bots protects your websites, mobile applications, and APIs from known malicious bots (e.g., DoS, Spam, Crawlers) while allowing activity from beneficial bots like search engines. This ensures both security and the smooth flow of essential traffic.

This feature identifies and manages a wide range of attacks from automated tools no matter where these applications or APIs are deployed.

To configure Known Bots rule

  1. Go to BOT MITIGATION > Known Bots.
    You must have already enabled this module in Add Modules. See How to add or remove a module.
  2. Configure these settings.
  3. Known Bad Bots

    Enable to take the configured action against bad bots using predefined signatures.

    Click the Edit icon on each Bot List if you want specific bots to be exempted. The signatures moved to the Allowed List will not be screened against.

    Known Good Bots

    Enable to take the configured action on known good bots (we recommend configuring bypass or alert for this option). By default, all popular predefined search engines (Google, Bing, Yahoo, etc.) are on the Selected List.

    Click the Edit icon on each Bot List if you want specific bots to be exempted. The search engines moved to the Unselected List will not be screened against.

  4. Select the action that FortiWeb Cloud takes when it detects a Known Good or Bad Bot.
    To configure the actions, you must first enable the Advanced Configuration in Global > System Settings > Settings.

    Bypass

    Accept the request with no generated log or alert.

    Alert

    Accept the request and generate an alert email and/or log message

    Alert & Deny

    Block the request (or reset the connection) and generate an alert email and/or log message.

    Deny(no log)

    Block the request (or reset the connection).

    Period Block

    Block the current request. Moreover, all the subsequent requests from the same client in the next 10 minutes will also be blocked.

  5. Click SAVE.

Known Bots

Configuring Known Bots protects your websites, mobile applications, and APIs from known malicious bots (e.g., DoS, Spam, Crawlers) while allowing activity from beneficial bots like search engines. This ensures both security and the smooth flow of essential traffic.

This feature identifies and manages a wide range of attacks from automated tools no matter where these applications or APIs are deployed.

To configure Known Bots rule

  1. Go to BOT MITIGATION > Known Bots.
    You must have already enabled this module in Add Modules. See How to add or remove a module.
  2. Configure these settings.
  3. Known Bad Bots

    Enable to take the configured action against bad bots using predefined signatures.

    Click the Edit icon on each Bot List if you want specific bots to be exempted. The signatures moved to the Allowed List will not be screened against.

    Known Good Bots

    Enable to take the configured action on known good bots (we recommend configuring bypass or alert for this option). By default, all popular predefined search engines (Google, Bing, Yahoo, etc.) are on the Selected List.

    Click the Edit icon on each Bot List if you want specific bots to be exempted. The search engines moved to the Unselected List will not be screened against.

  4. Select the action that FortiWeb Cloud takes when it detects a Known Good or Bad Bot.
    To configure the actions, you must first enable the Advanced Configuration in Global > System Settings > Settings.

    Bypass

    Accept the request with no generated log or alert.

    Alert

    Accept the request and generate an alert email and/or log message

    Alert & Deny

    Block the request (or reset the connection) and generate an alert email and/or log message.

    Deny(no log)

    Block the request (or reset the connection).

    Period Block

    Block the current request. Moreover, all the subsequent requests from the same client in the next 10 minutes will also be blocked.

  5. Click SAVE.