Skip to main content

Policy Configuration

Explains how to configure activation, action mode, thresholds, etc. for each policy in the BotManager console.

Policy List Screen

You can view and manage all policies in the Policy menu of the console.

Policy Filter

Policies can be filtered by type:

CategoryDescription
Automation ToolsManage automation program usage
Access EnvironmentManage access environment such as IP, ID
Access FrequencyManage abnormal request counts
Access PatternsManage access showing abnormal behavior patterns
Access TimeManage access outside allowed hours

Configuration Items

Activation/Deactivation

Sets whether to use the policy.

StatusDescription
ActivatedPolicy is applied and performs detection/blocking
DeactivatedPolicy is not applied
Threshold Counting Maintained

Threshold counting is maintained even if you deactivate and then reactivate a policy.

Action Mode

Sets how to process requests determined to be bots by policies.

ModeDescription
DetectionOnly logs are recorded and access is allowed
BlockAccess is blocked

Recommended Operation Method:

  1. Start with Detection Mode when applying new policies
  2. Monitor for 1-2 weeks and check for false positives
  3. Switch to Blocking Mode after confirming stability

For more details: Action Mode

Automatic Bot Release

Sets the time for blocked users to automatically return to normal users.

SettingDescription
DisabledNo automatic release (manual release required)
Time SettingAutomatic release after specified time

Default Value: 20 minutes

For more details: Automatic Block Release

Threshold Configuration

Sets the value that serves as the bot determination criteria in dynamic policies.

Policy TypeThreshold Example
Access FrequencyRequest count (e.g., 3 requests/sec, 100 requests/day)
Multiple SessionsSession ID count (e.g., 10)
Multiple IPsIP count (e.g., 10)
Multiple CountriesCountry count (e.g., 2)
Time-BasedTime range (e.g., 1 minute)

Example: If the threshold of the "Excessive URL Requests (1 second)" policy is set to 3, it is determined to be a bot when 4 or more requests are made in 1 second.

Secondary Verification Configuration

Sets additional verification in behavior analysis policies.

Verification TypeDescription
CAPTCHAImage-based human verification
Browser ChallengeAutomatic browser environment verification

CAPTCHA Configuration Items:

  • Success Count: Number of successes that must be achieved
  • Total Verification Count: Maximum number of attempts allowed
Application Scope

Secondary verification can only be applied to Behavior Analysis Policies. It is not applied to static policies (automation tools, header analysis, etc.).

For more details: Secondary Verification

Policy Configuration Method

Step 1: Select Policy

  1. Navigate to the Policy menu.
  2. Select the policy to configure.
  3. The policy detail screen opens.

Step 2: Basic Configuration

  1. Activation: Set whether to use the policy (On/Off).
  2. Action Mode: Select Detection or Block.
  3. Automatic Bot Release: Set release time or select Disabled.

Step 3: Additional Configuration for Dynamic Policies

For dynamic policies, configure the following items additionally:

  1. Threshold: Set the bot determination criteria value.
  2. Secondary Verification (Optional): Configure CAPTCHA or browser challenge.

Step 4: Save

After completing all configurations, click the Save button.

Configuration Examples

Example 1: Automation Tool Blocking (Static Policy)

Scenario: Block bots using automation tools such as Selenium, Puppeteer

Configuration ItemValue
PolicyBrowser Automation Tools
Action ModeBlock
Automatic Bot Release20 minutes

Description: Automation tool detection makes immediate determinations, so threshold configuration is not needed. Setting to blocking mode blocks all requests using automation tools.

Example 2: High-Speed Bot Blocking (Access Frequency)

Scenario: Block high-speed bots making 3 or more requests per second

Configuration ItemValue
PolicyExcessive URL Requests (1 second)
Action ModeBlock
Threshold3 requests
Automatic Bot Release20 minutes
Secondary VerificationCAPTCHA

Description: Setting the threshold to 3 requests means it is determined to be a bot when 4 or more requests are made in 1 second. Setting secondary verification performs additional verification through CAPTCHA when determined to be a bot.

Example 3: Multiple IP Access Detection (Access Environment)

Scenario: Detect abnormal patterns where the same session ID accesses from multiple IPs

Configuration ItemValue
PolicyOne session ID requests from multiple IPs
Action ModeDetection
Threshold10 IPs
Automatic Bot ReleaseDisabled

Description: Set to detection mode to initially only record logs, analyze patterns, and switch to blocking mode if necessary. It is determined to be a bot when a session ID accesses from 10 or more different IPs.

Example 4: Bulk Account Creation Prevention (Access Environment)

Scenario: Prevent multiple session IDs from being issued from one IP within a short time

Configuration ItemValue
PolicyMultiple session IDs issued from one IP within an hour
Action ModeBlock
Threshold3
Automatic Bot ReleaseDisabled
Secondary VerificationBrowser Challenge

Description: If 3 or more session IDs are issued from the same IP within 1 hour, it is determined to be a bot and blocked. Additional verification is performed through browser challenge.

Example 5: Repetitive Pattern Detection (Access Patterns)

Scenario: Detect bots that repeatedly call URLs at regular intervals

Configuration ItemValue
PolicyRepeated URL calls at regular minute intervals
Action ModeDetection
Threshold2 times
Automatic Bot ReleaseImmediate Release

Description: It is determined to be a bot when 2 or more repeated calls are made at the same time interval. Initially set to detection mode to analyze patterns, and switch to blocking mode if there are no false positives.

Example 6: Time-Based Access Restriction (Access Time)

Scenario: Policy that allows access only during specific time periods

Configuration ItemValue
PolicyRequests to specific path outside set hours
Action ModeDetection
Threshold13:00:00~15:00:00 (Allowed Hours)
Automatic Bot ReleaseDisabled

Description: Allows access only between 1 PM and 3 PM, and detects requests during other time periods. Suitable for services with clear operating hours.