How It Works
Learn how click data moves from your campaigns into ClickFortify and back into protection actions.
Understanding the protection flow helps you configure and optimize your setup.
Protection Flow
At a high level, ClickFortify follows this loop:
- A paid click lands on your website
- Tracking scripts capture click context and behavior signals
- ClickFortify evaluates risk using strategy rules
- Action mode decides whether to observe, warn, or block
- Results appear in dashboard views and report exports
Data Scope Model
ClickFortify uses a hierarchy:
| Scope | Description |
|---|---|
| Website | Default protection and analytics level |
| Ad Account | Optional overrides for specific accounts |
| Campaign | Narrow targeting for campaign-level policies |
This model lets you keep one global baseline while applying exceptions where needed.
Action Modes
Observe
Log suspicious traffic only. No blocking action is taken.
Warn
Add bad sources to exclusion flows with minimal disruption.
Strict
Apply the strongest blocking behavior for confirmed threats.
Detection Strategy
Automatic (AI Engine)
Uses built-in heuristics with sensitivity levels from low to very strict.
Manual
Lets you enable individual checks like:
- VPN blocking
- Bot filtering
- Bounce pattern checks
Where Outcomes Appear
| Location | What You See |
|---|---|
| Dashboard | Overall threat and quality trends |
| Clicks | Per-click decision and status details |
| Exclusions | Entities excluded from delivery |
| Blacklist | Manually and automatically blocked entities |
| Reports | Downloadable historical records |
Tracking setup must be active before reliable fraud scoring appears. Missing campaign tracking templates can reduce data quality.