Skip to content

Commit f9e2d68

Browse files
Fix a typo in account-abuse-protection.mdx (#29325)
Correct a typo from `cf.fraud_detection.dispoable_domain` to `cf.fraud_detection.disposable_domain`
1 parent 9f98db1 commit f9e2d68

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

src/content/docs/bots/account-abuse-protection.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ The following fields can be used in new and existing Security Rules.
136136

137137
| Field | Description | Values |
138138
| --- | --- | --- |
139-
| `cf.fraud_detection.dispoable_domain` | Flags whether a domain for a given email is included in a known list of temporary email providers. | `True` or `False` |
139+
| `cf.fraud_detection.disposable_domain` | Flags whether a domain for a given email is included in a known list of temporary email providers. | `True` or `False` |
140140
| `cf.fraud.email_risk` | Measures risk of email based on randomness of characters in the username and domain. | `Low` represents low risk due to reduced randomness and simple emails. <br />`Medium` represents medium risk based on larger strings with slightly more randomness. <br />`High` represents high risk based on larger and random character strings. <br />`Unknown` |
141141

142142
#### Other rules
@@ -159,4 +159,4 @@ Fraud fields can be used as filters to identify suspicious patterns in your traf
159159

160160
The hashed User ID field within Security Analytics also provides Fraud customers with data that can help review detections and patterns per individual users rather than requests. You can review user level aggregations for IPs and IP counts, event types (login or sign up), locations, devices, and browsers.
161161

162-
A user level profile also provides a quick way to review the latest events associated with a user so that you can identify any anomalies and create a custom rule to log, block, or challenge that user.
162+
A user level profile also provides a quick way to review the latest events associated with a user so that you can identify any anomalies and create a custom rule to log, block, or challenge that user.

0 commit comments

Comments
 (0)