You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: WARP client for Linux (version 2024.9.346.0)
10
+
description: |-
11
+
A new GA release for the Linux WARP client is now available in the [package repository](https://pkg.cloudflareclient.com/). This release contains minor fixes and minor improvements.
12
+
13
+
Notable updates:
14
+
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
15
+
- Added the ability to customize PCAP options in the `warp-cli`.
16
+
- Added a list of installed applications in `warp-diag`.
17
+
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
18
+
- Added the ability for `warp-cli` to use the team name provided in the MDM file for initial registration.
19
+
- Added a JSON output option to the `warp-cli`.
20
+
- Added the ability to execute a PCAP on multiple interfaces with `warp-cli`.
21
+
- Added MASQUE tunnel protocol support for the consumer version of WARP ([1.1.1.1 w/ WARP](/warp-client/)).
22
+
- Improved the performance of firewall operations when enforcing split tunnel configuration.
23
+
- Fixed an issue where device posture certificate checks were unexpectedly failing.
24
+
- Fixed an issue where the Linux GUI fails to open the browser login window when registering a new Zero Trust organization.
25
+
- Fixed an issue where clients using service tokens failed to retry after a network change.
26
+
- Fixed an issue where the client, when switching between WireGuard and MASQUE protocols, sometimes required a manual tunnel key reset.
27
+
- Fixed a known issue which required users to re-register when an older single configuration MDM file was deployed after deploying the newer, multiple configuration format.
28
+
- Deprecated `warp-cli` commands have been removed. If you have any workflows that use the deprecated commands, update to the new commands where necessary.
29
+
30
+
Known issues:
31
+
- Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services is enabled.
32
+
33
+
- publish_date: "2024-10-03"
34
+
title: WARP client for Windows (version 2024.9.346.0)
35
+
description: |-
36
+
A new GA release for the Windows WARP client is now available in the [App Center](https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release). This release contains minor fixes and improvements.
37
+
38
+
Notable updates:
39
+
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
40
+
- Added [pre-login](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-prelogin/) configuration details to the `warp-diag` output.
41
+
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
42
+
- Added a JSON output option to the `warp-cli`.
43
+
- Added the ability for `warp-cli` to use the team name provided in the MDM file for initial registration.
44
+
- Added the ability to execute a PCAP on multiple interfaces with `warp-cli` and `warp-dex`.
45
+
- Improved `warp-dex` default interface selection for PCAPs and changed `warp-dex` CLI output to JSON.
46
+
- Fixed an issue where the client, when switching between WireGuard and MASQUE protocols, sometimes required a manual tunnel key reset.
47
+
- Added MASQUE tunnel protocol support for the consumer version of WARP ([1.1.1.1 w/ WARP](/warp-client/)).
48
+
49
+
Known issues:
50
+
- Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services is enabled.
51
+
52
+
- publish_date: "2024-10-03"
53
+
title: WARP client for macOS (version 2024.9.346.0)
54
+
description: |-
55
+
A new GA release for the macOS WARP client is now available in the [App Center](https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-macos-1/distribution_groups/release). This release contains minor fixes and improvements.
56
+
57
+
All customers running macOS Ventura 13.0 and above (including Sequoia) are advised to upgrade to this release. This release fixes an incompatibility with the firewall found on macOS Sonoma 14.4 and above that could result in the firewall being disabled.
58
+
59
+
Notable updates:
60
+
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
61
+
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
62
+
- Added the ability for `warp-cli` to use the team name provided in the MDM file for initial registration.
63
+
- Added a JSON output option to the `warp-cli`.
64
+
- Added the ability to execute a PCAP on multiple interfaces with `warp-cli` and `warp-dex`.
65
+
- Improved `warp-dex` default interface selection for PCAPs and changed `warp-dex` CLI output to JSON.
66
+
- Improved [application posture check](/cloudflare-one/identity/devices/warp-client-checks/application-check/) compatibility with symbolically linked files.
67
+
- Fixed an issue where the client, when switching between WireGuard and MASQUE protocols, sometimes required a manual tunnel key reset.
68
+
- Added MASQUE tunnel protocol support for the consumer version of WARP ([1.1.1.1 w/ WARP](/warp-client/)).
69
+
70
+
Known issues:
71
+
- Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services is enabled.
8
72
- publish_date: "2024-09-26"
9
73
title: WARP client for macOS (version 2024.8.457.0)
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings.mdx
+8-2Lines changed: 8 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,9 +15,15 @@ Match count refers to the number of times that any enabled entry in the profile
15
15
16
16
## Context analysis
17
17
18
-
Context analysis restricts DLP detections based on proximity keywords. Additional proximity keywords must be detected within a distance of 1000 bytes (\~1000 characters) from the original detection to trigger an action. For example, the string `123-45-6789` will only count as a detection if in proximity to keywords such as `ssn`.
18
+
Context analysis restricts detections based on proximity keywords to prevent false positives. Proximity keywords must be detected within a distance of 1000 bytes (~1000 characters) from the original detection to trigger an context-aware detection. For example, the string `123-45-6789` will only count as a detection if in proximity to keywords such as `ssn`.
19
19
20
-
Additionally, you can control context analysis for scans within files. When files are excluded from the context filter, DLP only evaluates uploaded and downloaded files based on regular expression and validation checks. Additional keywords within the file are not required.
20
+
DLP will apply context analysis to traffic and the content of [supported files](/cloudflare-one/policies/data-loss-prevention/#supported-file-types). Supported detections include the [Financial Information](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/#financial-information) and [Social Security, Insurance, Tax, and Identifier Numbers](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/#social-security-insurance-tax-and-identifier-numbers) predefined profiles.
21
+
22
+
### Exclude files from context analysis
23
+
24
+
You can exclude the content of files from context analysis while still applying context analysis to traffic. For example, if you send an email containing the string `123-45-6789`, DLP will only count a detection if the string is in proximity to keywords such as `ssn`. If you include a file in an email containing the string `123-45-6789`, DLP will match a detection regardless of keywords.
25
+
26
+
To exclude file content from context analysis, in **Exclude content type**, choose _Files_.
21
27
22
28
## Optical Character Recognition (OCR) <Badgetext="Beta"variant="caution"size="small" />
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/policies/data-loss-prevention/index.mdx
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,6 +40,8 @@ DLP supports scanning the following file types:
40
40
- PDF
41
41
- ZIP files containing the above
42
42
43
+
DLP will scan the text contained in Microsoft Office and PDF files.
44
+
43
45
### Size
44
46
45
47
The maximum file size is 100 MB. Size limitation is assessed against the file after unzipping. ZIP files can be recursively compressed a maximum of 10 times.
Cloudflare has bot management capabilities to help identify and mitigate automated traffic to protect domains from bad bots. [Bot Fight Mode](/bots/get-started/free/) and [Super Bot Fight Mode](/bots/get-started/biz-and-ent/) are options available on Free and Pro/Business accounts respectively. They offer a subset of features and capabilities available for Enterprise accounts. This reference architecture diagram focuses on [Enterprise Bot Management](/bots/get-started/bm-subscription/) available for Enterprise customers.
15
+
16
+
With [Enterprise Bot Management](https://developers.cloudflare.com/bots/get-started/bm-subscription/) customers have the maximum protection, features, and capability. A [bot score](https://developers.cloudflare.com/bots/concepts/bot-score/) is exposed for every request. Cloudflare applies a layered detection approach to Bot Management with several detection engines that cumulatively can impact the bot score. A bot score is a score from 1 to 99 that indicates the likelihood that the request came from a bot. Scores below 30 are commonly associated with bot traffic and customers can then take action on this score with [WAF custom rules](https://developers.cloudflare.com/waf/custom-rules/) or [Workers](https://developers.cloudflare.com/workers/runtime-apis/request/#incomingrequestcfproperties). Additionally, customers can view this score along with other bot specifics like bot score source, bot detection IDs, and bot detection tags in the Bots, Security Analytics, and Events dashboards; these fields can also be seen in more detailed logs in Log Explorer or, with Log Push, logs with these respective fields can be exported to 3rd party SIEMs/Analytics platforms.
17
+
18
+
## Definitions
19
+
20
+
-**Bot Score:** A [bot score](/bots/concepts/cloudflare-bot-tags/) is a score from 1 to 99 that indicates how likely that request came from a bot. A score of 1 means Cloudflare is certain the request was automated.
21
+
-**Bot Score Source:** Bot Score Source is the detection engine used for the bot score.
22
+
-**Bot Detection ID:**[Detection IDs](/bots/concepts/detection-ids/) are static rules used to detect predictable bot behavior with no overlap with human traffic. Detection IDs cause a bot to receive a score source of heuristics with a score of 1.
23
+
-**Bot Tag:**[Bot tags](/bots/concepts/cloudflare-bot-tags/) provide more detail about why Cloudflare assigned a [bot score](/bots/concepts/bot-score/) to a request.
24
+
-**Verified Bots:** Cloudflare maintains [a list of "Verified" good bots](https://radar.cloudflare.com/traffic/verified-bots) which can be used in policies to insure good bots such as those associated with a search engine are not blocked.
25
+
-**AI Bots:**[If the feature is enabled](/bots/concepts/bot/#ai-bots), Cloudflare will detect and block verified AI bots that respect `robots.txt` and crawl rate, and do not hide their behavior from your website. The rule has also been expanded to include more signatures of AI bots that do not follow the rules.
26
+
27
+
## Cloudflare Bot Management Detection Engines
28
+
29
+
-**Heuristics:** Cloudflare conducts a number of heuristic checks to identify automated traffic, and requests are matched against a growing database of malicious fingerprints. The [Heuristics engine](/bots/concepts/bot-score/#heuristics) immediately gives automated requests a score of 1.
30
+
-**Machine Learning (ML):** The [ML engine](/bots/concepts/bot-score/#machine-learning) accounts for the majority of all detections, human and bot. The ML model leverages Cloudflare's global network, which proxies billions of requests daily, to identify both automated and human traffic. The ML engine produces scores 2 through 99.
31
+
-**Anomaly Detection (AD):** The [AD engine](/bots/concepts/bot-score/#anomaly-detection) is an optional detection engine that uses a form of unsupervised learning. Cloudflare records a baseline of a domain's traffic and uses the baseline to intelligently detect outlier requests. Anomaly Detection is user agent-agnostic and can be turned on or off by your account team. Cloudflare does not recommend AD for domains that use [Cloudflare for SaaS](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/) or expect large amounts of API traffic. The AD engine immediately gives automated requests a score of 1.
32
+
-**JavaScript Detections (JSD)**: The [JSD engine](/bots/concepts/bot-score/#javascript-detections) identifies headless browsers and other malicious fingerprints. This engine performs a lightweight, invisible JavaScript injection on the client side of any request. The JSD engine either blocks, challenges, or passes requests to other engines. JSD is enabled by default but is completely optional.
33
+
34
+
## Bot Dashboards, Analytics, and Logs
35
+
36
+
Cloudflare bot score and bot traffic analysis is available in several locations.
37
+
38
+
-**Bots dashboard:**
39
+
Customers can easily see bot activity up to 30 days back and filter on bot score and other bot, traffic, and request filters. The [bot feedback loop](/bots/concepts/feedback-loop/) allows customers to report back to Cloudflare any false positives or false negatives for further investigation.
40
+
-**Security Analytics:**
41
+
Security Analytics brings together all of Cloudflare's detection capabilities in one dashboard and provides a broad view of all traffic across the site. The Bots Likelihood graph and widget provide visibility and allow customers to easily view and filter based on bot score and respective categorization of Automated, Likely Automated, Human, and Likely Human.
42
+
-**Events:**
43
+
Events displays all events the WAF took action on. Events and logs can easily be filtered by bot score and other bot, traffic, or request criteria.
44
+
-**Log Explorer:**
45
+
Customers can use Log Explorer to pull additional detailed log data. Logs can easily be filtered by bot score and other bot, traffic, or request criteria.
46
+
-**Log Push:**
47
+
Customers can also export logs to a third party SIEM or Analytics platform. Bot score, bot score source, bot detection IDs, and bot detection tags can all be exported as part of the logs.
48
+
49
+
## Bot Management Traffic Flow
50
+
51
+

52
+
53
+
1. Client request is sent to the closest Cloudflare Data Center via anycast ensuring low latency.
54
+
2. Cloudflare applies a layered approach for bot detection; each detection mechanism impacts the bot score assigned by Cloudflare to every request. Every request is assigned a bot score between 1-99 inclusive.
55
+
3. Once the client request has been processed by all of Cloudflare's detection engines and assigned a bot score, defined security policies will be executed, some of which may also be leveraging bot score. Various actions can be taken based on the assigned bot score including the block, allow, rate limit, NoCAPTCHA Challenge.
56
+
4. Cloudflare provides analytics and insights into traffic and requests traversing the Cloudflare network. Customers can use the Bots, Security Analytics, Events, and Log Explorer dashboards to understand the overall traffic and bots activity across their site. Customers can also export logs to third party SIEM and Analytics Platforms.
Copy file name to clipboardExpand all lines: src/content/docs/registrar/get-started/transfer-domain-to-cloudflare.mdx
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,6 +118,10 @@ Registrants transferring a `.us` domain will always receive a FOA email.
118
118
119
119
:::
120
120
121
+
## Bulk domain transfers
122
+
123
+
The process for transferring domains in bulk to Cloudflare is the same process as transferring a single domain. Even if you transfer multiple domains in bulk, you will be charged for each domain as bulk billing is not yet available.
124
+
121
125
## Transfer statuses
122
126
123
127
You can check the status of your transfer in **Account Home** > **Overview** > **Domain Registration** for your domain. Below, you can find a list of the possible transfer statuses.
Copy file name to clipboardExpand all lines: src/content/docs/stream/viewing-videos/securing-your-stream.mdx
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -363,11 +363,11 @@ If the first two rules don't match, the final rule of any will match all remaini
363
363
By default, Stream embed codes can be used on any domain. If needed, you can limit the domains a video can be embedded on from the Stream dashboard.
364
364
365
365
In the dashboard, you will see a text box by each video labeled `Enter allowed origin domains separated by commas`. If you click on it, you can list the domains that the Stream embed code should be able to be used on.
366
-
367
-
*`*.badtortilla.com` covers a.badtortilla.com, a.b.badtortilla.com and does not cover badtortilla.com
366
+
`
367
+
*`*.badtortilla.com` covers `a.badtortilla.com`, `a.b.badtortilla.com` and does not cover `badtortilla.com`
368
368
*`example.com` does not cover [www.example.com](http://www.example.com) or any subdomain of example.com
369
369
*`localhost` requires a port if it is not being served over HTTP on port 80 or over HTTPS on port 443
370
-
* There's no path support - `example.com` covers example.com/\*
370
+
* There is no path support - `example.com` covers `example.com/\*`
371
371
372
372
You can also control embed limitation programmatically using the Stream API. `uid` in the example below refers to the video id.
The Allowed Origins feature lets you specify which origins are allowed for playback. This feature works even if you are using your own video player. When using your own video player, Allowed Origins restricts which domain the HLS/DASH manifests and the video segments can be requested from.
383
+
380
384
### Signed URLs
381
385
382
386
Combining signed URLs with embedding restrictions allows you to strongly control how your videos are viewed. This lets you serve only trusted users while preventing the signed URL from being hosted on an unknown site.
0 commit comments