Closed jonbirge closed 3 months ago
First check to see if the CSV file will suffice. The main issue here is that just generating a 403 still creates log traffic and isn't as secure as just blocking the IP address at the network (versus application) level.
First check to see if the CSV file will suffice. The main issue here is that just generating a 403 still creates log traffic and isn't as secure as just blocking the IP address at the network (versus application) level.