To get more information about potential bot requests, use these JA3 Fingerprints in:
To adjust how your application responds to specific fingerprints, use them with:
Block or allow certain traffic
A group of similar requests may share the same JA3 fingerprint. For this reason, JA3 may be useful in blocking an incoming threat. For example, if you notice that a bot attack is not caught by existing defenses, create a that blocks/challenges the JA3 used for the attack.
JA3 may also be useful if you want to immediately remedy false positives or false negatives with Bot Management.
Allow mobile traffic
Often, mobile application traffic will produce the same JA3 fingerprint across devices and users. This means you can identify your mobile application traffic by its JA3 fingerprint.