Skip to content

Commit 013b1bd

Browse files
authored
Merge branch 'production' into chore/formatting
2 parents 884dba0 + 603e5ff commit 013b1bd

File tree

8 files changed

+450
-5
lines changed

8 files changed

+450
-5
lines changed

src/assets/images/reference-architecture/bot-management/bot-management-ra-diagram.svg

Lines changed: 292 additions & 0 deletions
Loading

src/content/changelogs/warp.yaml

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,70 @@ productLink: "/cloudflare-one/connections/connect-devices/warp/"
55
productArea: Cloudflare One
66
productAreaLink: /cloudflare-one/changelog/
77
entries:
8+
- publish_date: "2024-10-03"
9+
title: WARP client for Linux (version 2024.9.346.0)
10+
description: |-
11+
A new GA release for the Linux WARP client is now available in the [package repository](https://pkg.cloudflareclient.com/). This release contains minor fixes and minor improvements.
12+
13+
Notable updates:
14+
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
15+
- Added the ability to customize PCAP options in the `warp-cli`.
16+
- Added a list of installed applications in `warp-diag`.
17+
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
18+
- Added the ability for `warp-cli` to use the team name provided in the MDM file for initial registration.
19+
- Added a JSON output option to the `warp-cli`.
20+
- Added the ability to execute a PCAP on multiple interfaces with `warp-cli`.
21+
- Added MASQUE tunnel protocol support for the consumer version of WARP ([1.1.1.1 w/ WARP](/warp-client/)).
22+
- Improved the performance of firewall operations when enforcing split tunnel configuration.
23+
- Fixed an issue where device posture certificate checks were unexpectedly failing.
24+
- Fixed an issue where the Linux GUI fails to open the browser login window when registering a new Zero Trust organization.
25+
- Fixed an issue where clients using service tokens failed to retry after a network change.
26+
- Fixed an issue where the client, when switching between WireGuard and MASQUE protocols, sometimes required a manual tunnel key reset.
27+
- Fixed a known issue which required users to re-register when an older single configuration MDM file was deployed after deploying the newer, multiple configuration format.
28+
- Deprecated `warp-cli` commands have been removed. If you have any workflows that use the deprecated commands, update to the new commands where necessary.
29+
30+
Known issues:
31+
- Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services is enabled.
32+
33+
- publish_date: "2024-10-03"
34+
title: WARP client for Windows (version 2024.9.346.0)
35+
description: |-
36+
A new GA release for the Windows WARP client is now available in the [App Center](https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release). This release contains minor fixes and improvements.
37+
38+
Notable updates:
39+
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
40+
- Added [pre-login](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-prelogin/) configuration details to the `warp-diag` output.
41+
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
42+
- Added a JSON output option to the `warp-cli`.
43+
- Added the ability for `warp-cli` to use the team name provided in the MDM file for initial registration.
44+
- Added the ability to execute a PCAP on multiple interfaces with `warp-cli` and `warp-dex`.
45+
- Improved `warp-dex` default interface selection for PCAPs and changed `warp-dex` CLI output to JSON.
46+
- Fixed an issue where the client, when switching between WireGuard and MASQUE protocols, sometimes required a manual tunnel key reset.
47+
- Added MASQUE tunnel protocol support for the consumer version of WARP ([1.1.1.1 w/ WARP](/warp-client/)).
48+
49+
Known issues:
50+
- Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services is enabled.
51+
52+
- publish_date: "2024-10-03"
53+
title: WARP client for macOS (version 2024.9.346.0)
54+
description: |-
55+
A new GA release for the macOS WARP client is now available in the [App Center](https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-macos-1/distribution_groups/release). This release contains minor fixes and improvements.
56+
57+
All customers running macOS Ventura 13.0 and above (including Sequoia) are advised to upgrade to this release. This release fixes an incompatibility with the firewall found on macOS Sonoma 14.4 and above that could result in the firewall being disabled.
58+
59+
Notable updates:
60+
- Added `list targets` to the `warp-cli` to enhance the user experience with the [Access for Infrastructure SSH](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) solution.
61+
- Added a `tunnel reset mtu` subcommand to the `warp-cli`.
62+
- Added the ability for `warp-cli` to use the team name provided in the MDM file for initial registration.
63+
- Added a JSON output option to the `warp-cli`.
64+
- Added the ability to execute a PCAP on multiple interfaces with `warp-cli` and `warp-dex`.
65+
- Improved `warp-dex` default interface selection for PCAPs and changed `warp-dex` CLI output to JSON.
66+
- Improved [application posture check](/cloudflare-one/identity/devices/warp-client-checks/application-check/) compatibility with symbolically linked files.
67+
- Fixed an issue where the client, when switching between WireGuard and MASQUE protocols, sometimes required a manual tunnel key reset.
68+
- Added MASQUE tunnel protocol support for the consumer version of WARP ([1.1.1.1 w/ WARP](/warp-client/)).
69+
70+
Known issues:
71+
- Using MASQUE as the tunnel protocol may be incompatible if your organization has Regional Services is enabled.
872
- publish_date: "2024-09-26"
973
title: WARP client for macOS (version 2024.8.457.0)
1074
description: |-

src/content/docs/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings.mdx

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,15 @@ Match count refers to the number of times that any enabled entry in the profile
1515

1616
## Context analysis
1717

18-
Context analysis restricts DLP detections based on proximity keywords. Additional proximity keywords must be detected within a distance of 1000 bytes (\~1000 characters) from the original detection to trigger an action. For example, the string `123-45-6789` will only count as a detection if in proximity to keywords such as `ssn`.
18+
Context analysis restricts detections based on proximity keywords to prevent false positives. Proximity keywords must be detected within a distance of 1000 bytes (~1000 characters) from the original detection to trigger an context-aware detection. For example, the string `123-45-6789` will only count as a detection if in proximity to keywords such as `ssn`.
1919

20-
Additionally, you can control context analysis for scans within files. When files are excluded from the context filter, DLP only evaluates uploaded and downloaded files based on regular expression and validation checks. Additional keywords within the file are not required.
20+
DLP will apply context analysis to traffic and the content of [supported files](/cloudflare-one/policies/data-loss-prevention/#supported-file-types). Supported detections include the [Financial Information](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/#financial-information) and [Social Security, Insurance, Tax, and Identifier Numbers](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/#social-security-insurance-tax-and-identifier-numbers) predefined profiles.
21+
22+
### Exclude files from context analysis
23+
24+
You can exclude the content of files from context analysis while still applying context analysis to traffic. For example, if you send an email containing the string `123-45-6789`, DLP will only count a detection if the string is in proximity to keywords such as `ssn`. If you include a file in an email containing the string `123-45-6789`, DLP will match a detection regardless of keywords.
25+
26+
To exclude file content from context analysis, in **Exclude content type**, choose _Files_.
2127

2228
## Optical Character Recognition (OCR) <Badge text="Beta" variant="caution" size="small" />
2329

src/content/docs/cloudflare-one/policies/data-loss-prevention/index.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ DLP supports scanning the following file types:
4040
- PDF
4141
- ZIP files containing the above
4242

43+
DLP will scan the text contained in Microsoft Office and PDF files.
44+
4345
### Size
4446

4547
The maximum file size is 100 MB. Size limitation is assessed against the file after unzipping. ZIP files can be recursively compressed a maximum of 10 times.
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: Bot management
3+
pcx_content_type: reference-architecture-diagram
4+
products:
5+
- Bots
6+
sidebar:
7+
order: 1
8+
label: Bot management
9+
updated: 2024-10-04
10+
---
11+
12+
## Introduction
13+
14+
Cloudflare has bot management capabilities to help identify and mitigate automated traffic to protect domains from bad bots. [Bot Fight Mode](/bots/get-started/free/) and [Super Bot Fight Mode](/bots/get-started/biz-and-ent/) are options available on Free and Pro/Business accounts respectively. They offer a subset of features and capabilities available for Enterprise accounts. This reference architecture diagram focuses on [Enterprise Bot Management](/bots/get-started/bm-subscription/) available for Enterprise customers.
15+
16+
With [Enterprise Bot Management](https://developers.cloudflare.com/bots/get-started/bm-subscription/) customers have the maximum protection, features, and capability. A [bot score](https://developers.cloudflare.com/bots/concepts/bot-score/) is exposed for every request. Cloudflare applies a layered detection approach to Bot Management with several detection engines that cumulatively can impact the bot score. A bot score is a score from 1 to 99 that indicates the likelihood that the request came from a bot. Scores below 30 are commonly associated with bot traffic and customers can then take action on this score with [WAF custom rules](https://developers.cloudflare.com/waf/custom-rules/) or [Workers](https://developers.cloudflare.com/workers/runtime-apis/request/#incomingrequestcfproperties). Additionally, customers can view this score along with other bot specifics like bot score source, bot detection IDs, and bot detection tags in the Bots, Security Analytics, and Events dashboards; these fields can also be seen in more detailed logs in Log Explorer or, with Log Push, logs with these respective fields can be exported to 3rd party SIEMs/Analytics platforms.
17+
18+
## Definitions
19+
20+
- **Bot Score:** A [bot score](/bots/concepts/cloudflare-bot-tags/) is a score from 1 to 99 that indicates how likely that request came from a bot. A score of 1 means Cloudflare is certain the request was automated.
21+
- **Bot Score Source:** Bot Score Source is the detection engine used for the bot score.
22+
- **Bot Detection ID:** [Detection IDs](/bots/concepts/detection-ids/) are static rules used to detect predictable bot behavior with no overlap with human traffic. Detection IDs cause a bot to receive a score source of heuristics with a score of 1.
23+
- **Bot Tag:** [Bot tags](/bots/concepts/cloudflare-bot-tags/) provide more detail about why Cloudflare assigned a [bot score](/bots/concepts/bot-score/) to a request.
24+
- **Verified Bots:** Cloudflare maintains [a list of "Verified" good bots](https://radar.cloudflare.com/traffic/verified-bots) which can be used in policies to insure good bots such as those associated with a search engine are not blocked.
25+
- **AI Bots:** [If the feature is enabled](/bots/concepts/bot/#ai-bots), Cloudflare will detect and block verified AI bots that respect `robots.txt` and crawl rate, and do not hide their behavior from your website. The rule has also been expanded to include more signatures of AI bots that do not follow the rules.
26+
27+
## Cloudflare Bot Management Detection Engines
28+
29+
- **Heuristics:** Cloudflare conducts a number of heuristic checks to identify automated traffic, and requests are matched against a growing database of malicious fingerprints. The [Heuristics engine](/bots/concepts/bot-score/#heuristics) immediately gives automated requests a score of 1.
30+
- **Machine Learning (ML):** The [ML engine](/bots/concepts/bot-score/#machine-learning) accounts for the majority of all detections, human and bot. The ML model leverages Cloudflare's global network, which proxies billions of requests daily, to identify both automated and human traffic. The ML engine produces scores 2 through 99.
31+
- **Anomaly Detection (AD):** The [AD engine](/bots/concepts/bot-score/#anomaly-detection) is an optional detection engine that uses a form of unsupervised learning. Cloudflare records a baseline of a domain's traffic and uses the baseline to intelligently detect outlier requests. Anomaly Detection is user agent-agnostic and can be turned on or off by your account team. Cloudflare does not recommend AD for domains that use [Cloudflare for SaaS](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/) or expect large amounts of API traffic. The AD engine immediately gives automated requests a score of 1.
32+
- **JavaScript Detections (JSD)**: The [JSD engine](/bots/concepts/bot-score/#javascript-detections) identifies headless browsers and other malicious fingerprints. This engine performs a lightweight, invisible JavaScript injection on the client side of any request. The JSD engine either blocks, challenges, or passes requests to other engines. JSD is enabled by default but is completely optional.
33+
34+
## Bot Dashboards, Analytics, and Logs
35+
36+
Cloudflare bot score and bot traffic analysis is available in several locations.
37+
38+
- **Bots dashboard:**
39+
Customers can easily see bot activity up to 30 days back and filter on bot score and other bot, traffic, and request filters. The [bot feedback loop](/bots/concepts/feedback-loop/) allows customers to report back to Cloudflare any false positives or false negatives for further investigation.
40+
- **Security Analytics:**
41+
Security Analytics brings together all of Cloudflare's detection capabilities in one dashboard and provides a broad view of all traffic across the site. The Bots Likelihood graph and widget provide visibility and allow customers to easily view and filter based on bot score and respective categorization of Automated, Likely Automated, Human, and Likely Human.
42+
- **Events:**
43+
Events displays all events the WAF took action on. Events and logs can easily be filtered by bot score and other bot, traffic, or request criteria.
44+
- **Log Explorer:**
45+
Customers can use Log Explorer to pull additional detailed log data. Logs can easily be filtered by bot score and other bot, traffic, or request criteria.
46+
- **Log Push:**
47+
Customers can also export logs to a third party SIEM or Analytics platform. Bot score, bot score source, bot detection IDs, and bot detection tags can all be exported as part of the logs.
48+
49+
## Bot Management Traffic Flow
50+
51+
![Figure 1: How Cloudflare identifies, scores and processes traffic from bots.](~/assets/images/reference-architecture/bot-management/bot-management-ra-diagram.svg "Figure 1: How Cloudflare identifies, scores and processes traffic from bots.")
52+
53+
1. Client request is sent to the closest Cloudflare Data Center via anycast ensuring low latency.
54+
2. Cloudflare applies a layered approach for bot detection; each detection mechanism impacts the bot score assigned by Cloudflare to every request. Every request is assigned a bot score between 1-99 inclusive.
55+
3. Once the client request has been processed by all of Cloudflare's detection engines and assigned a bot score, defined security policies will be executed, some of which may also be leveraging bot score. Various actions can be taken based on the assigned bot score including the block, allow, rate limit, NoCAPTCHA Challenge.
56+
4. Cloudflare provides analytics and insights into traffic and requests traversing the Cloudflare network. Customers can use the Bots, Security Analytics, Events, and Log Explorer dashboards to understand the overall traffic and bots activity across their site. Customers can also export logs to third party SIEM and Analytics Platforms.
57+
58+
# Related Resources
59+
60+
- [Cloudflare Bot Management Product Page](https://www.cloudflare.com/application-services/products/bot-management/)
61+
- [Cloudflare Blog - Bot Management](https://blog.cloudflare.com/tag/bot-management/)
62+
- [Bots documentation](/bots/)
63+
- [Video: Cloudflare Bot Management and Turnstile with Demo](https://youtu.be/6EnekTohO7I?si=tk8FUB0xtk1PxsJV)
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
title: Bots
3+
pcx_content_type: navigation
4+
sidebar:
5+
order: 2
6+
---
7+
8+
import { DirectoryListing } from "~/components";
9+
10+
<DirectoryListing />

src/content/docs/registrar/get-started/transfer-domain-to-cloudflare.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,10 @@ Registrants transferring a `.us` domain will always receive a FOA email.
118118

119119
:::
120120

121+
## Bulk domain transfers
122+
123+
The process for transferring domains in bulk to Cloudflare is the same process as transferring a single domain. Even if you transfer multiple domains in bulk, you will be charged for each domain as bulk billing is not yet available.
124+
121125
## Transfer statuses
122126

123127
You can check the status of your transfer in **Account Home** > **Overview** > **Domain Registration** for your domain. Below, you can find a list of the possible transfer statuses.

src/content/docs/stream/viewing-videos/securing-your-stream.mdx

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -363,11 +363,11 @@ If the first two rules don't match, the final rule of any will match all remaini
363363
By default, Stream embed codes can be used on any domain. If needed, you can limit the domains a video can be embedded on from the Stream dashboard.
364364

365365
In the dashboard, you will see a text box by each video labeled `Enter allowed origin domains separated by commas`. If you click on it, you can list the domains that the Stream embed code should be able to be used on.
366-
367-
* `*.badtortilla.com` covers a.badtortilla.com, a.b.badtortilla.com and does not cover badtortilla.com
366+
`
367+
* `*.badtortilla.com` covers `a.badtortilla.com`, `a.b.badtortilla.com` and does not cover `badtortilla.com`
368368
* `example.com` does not cover [www.example.com](http://www.example.com) or any subdomain of example.com
369369
* `localhost` requires a port if it is not being served over HTTP on port 80 or over HTTPS on port 443
370-
* There's no path support - `example.com` covers example.com/\*
370+
* There is no path support - `example.com` covers `example.com/\*`
371371

372372
You can also control embed limitation programmatically using the Stream API. `uid` in the example below refers to the video id.
373373

@@ -377,6 +377,10 @@ curl https://api.cloudflare.com/client/v4/accounts/{account_id}/stream/{video_ui
377377
--data "{\"uid\": \"<VIDEO_UID>\", \"allowedOrigins\": [\"example.com\"]}"
378378
```
379379

380+
### Allowed Origins
381+
382+
The Allowed Origins feature lets you specify which origins are allowed for playback. This feature works even if you are using your own video player. When using your own video player, Allowed Origins restricts which domain the HLS/DASH manifests and the video segments can be requested from.
383+
380384
### Signed URLs
381385

382386
Combining signed URLs with embedding restrictions allows you to strongly control how your videos are viewed. This lets you serve only trusted users while preventing the signed URL from being hosted on an unknown site.

0 commit comments

Comments
 (0)