How To Deploy and Configure DDoS Protection-as-a-Service Offerings