Best practicesRefer to the following pages for more information on DDoS protection best practices: Third-party services and DDoS protection