Best practicesRefer to the following pages for more information on DDoS protection best practices:Third-party services and DDoS protection