For AI agents: a documentation index is available at the root level at /llms.txt and /llms-full.txt. Append /llms.txt to any URL for a page-level index, or .md for the markdown version of any page.
HUMAN DashboardHUMAN WebsiteRequest a Demo
Product GuidesEnforcer GuidesMobile SDKAPI ReferenceCustomer support
Product GuidesEnforcer GuidesMobile SDKAPI ReferenceCustomer support
  • Getting Started
    • Overview
    • Best practices
  • Sightline Cyberfraud Defense
    • About Sightline Cyberfraud Defense
    • Getting Started
    • What's different in Sightline Cyberfraud Defense
    • Sensor changelog
    • About the Overview Dashboard
    • Glossary
  • AgenticTrust
    • Getting started with AgenticTrust
    • AI Agents Monitoring Dashboard
    • AI Visitors Overview Dashboard
    • Manage AI Agent Permissions
    • Agentic Activity Priority
    • Agent Trust Levels
  • Account Defender
    • Account Defender Overview
    • Use Cases
    • Prerequisites
    • Getting Started with Account Defender
    • Optimizing Account Defender Detection
    • Validating Account Defender Integration
    • Risk Triggers
    • About Network Events
    • Troubleshooting
  • Bot Defender
    • Bot Defender Overview
    • Detection
    • Bot Defender Policy Settings
    • Footprint
      • Dashboard FAQ
      • Search FAQ
      • Investigation FAQ
      • Admin FAQ
      • Sensor FAQ
  • Credential Intelligence
    • Credential Intelligence Overview
    • How to Access the Breached Flag
    • Credential Intelligence FAQ
    • Credential Intelligence Dashboard
  • Code Defender
    • Code Defender Introduction
    • Getting Started with Code Defender
    • Code Defender Glossary
    • Website Risk Analyzer
  • Platform
    • Account settings
    • Manage users
    • Role permissions
    • Enforcer configurations
    • Page Type Mapping
  • Client-Side Integration
    • JavaScript tag
    • Improving first page performance
    • Use of cookies & web storage
    • Advanced client integration
LogoLogo
Login
Login
HUMAN DashboardHUMAN WebsiteRequest a Demo
On this page
  • How does the Bot Defender Sensor collect metrics?
  • When does the Bot Defender Sensor need to load in the initial page load?
  • What is the performance impact of the sensor?
  • Why should I be forcing upgrades when installing the Mobile SDK?
Bot DefenderBot Defender FAQ

Sensor

Was this page helpful?
Previous

Overview

Next
Built with

How does the Bot Defender Sensor collect metrics?

BD sensor uses variety of methods to collect data:

  • The sensor gets signals via DOM API, BOM API, WebAssembly etc
  • The sensor collects general data about the running environment, implementing detection techniques that are helping the Detector to decide whether the running session is automatic or not. The sensor also collects device features such as visual and audio rendering capabilities, browser plugins, extensions and more.
  • The indicators stated above are compared to a growing library of bad actor profiles built on anonymized and aggregated customer sets and multiple external resources (by the detector).

When does the Bot Defender Sensor need to load in the initial page load?

As soon as the BD sensor starts running it can start collecting data which helps with the bot mitigation process. Although it doesn’t have to be the first resource to load in the initial page load to work properly, it is still advisable load the sensor as soon as possible (it will have better visibility to actions on the page, thus preventing more attacks).

What is the performance impact of the sensor?

Please refer to the Footprint page to look for overall performance impact of Bot Defender components

Why should I be forcing upgrades when installing the Mobile SDK?

We recommend to force upgrades when installing the Mobile SDK due to the following:

  1. To allow for a broader set of signals and feedback loop which strengthen the detection applied to the Mobile endpoints.
  2. By not forcing the upgrade, there may be versions of the application that will either not have the SDK at all (the detection will be irrelevant and will create a loophole for attackers to abuse), or will not have all the capabilities in the new SDK