Skip to content

Commit 10f51ef

Browse files
kodster28RebeccaTamachiro
authored andcommitted
ZT changelog release notes (#20933)
* Add initial entries for several CF1 products + pointer to previous changelog entries * Added warp client release notes * flex-wrap to help with long entries * Add more categories * add dropdown for all the locations * Add email security pic * remove 'customers' * Rest of initial entries for backfilling * Update * fix * two tweaks
1 parent fc17074 commit 10f51ef

File tree

33 files changed

+493
-173
lines changed

33 files changed

+493
-173
lines changed
110 KB
Loading
89.9 KB
Loading
94.9 KB
Loading

src/components/changelog/ProductPills.astro

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ const { products } = await props.parseAsync(Astro.props);
1616
const data = await getEntries(products);
1717
---
1818

19-
<div class="flex flex-row gap-2">
19+
<div class="flex flex-row flex-wrap gap-2">
2020
{
2121
data.map((product) => (
2222
<a href={product.data.product.url} class="no-underline">
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Find security misconfigurations in your AWS cloud environment
3+
description: CASB and DLP with Cloud Data Extraction for AWS cloud environments
4+
date: 2024-11-22T11:00:00Z
5+
products:
6+
- dlp
7+
---
8+
9+
import { Render } from "~/components";
10+
11+
You can now use CASB to find security misconfigurations in your AWS cloud environment using [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/).
12+
13+
You can also [connect your AWS compute account](/cloudflare-one/applications/casb/casb-integrations/aws-s3/#compute-account) to extract and scan your S3 buckets for sensitive data while avoiding egress fees. CASB will scan any objects that exist in the bucket at the time of configuration.
14+
15+
<Render file="casb/aws-compute-account" product="cloudflare-one" />
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Troubleshoot tunnels with diagnostic logs
3+
description: View tunnel diagnostic logs
4+
date: 2024-12-19T11:00:00Z
5+
---
6+
7+
import { Render } from "~/components";
8+
9+
The latest `cloudflared` build [2024.12.2](https://github.com/cloudflare/cloudflared/releases/tag/2024.12.2) introduces the ability to collect all the diagnostic logs needed to troubleshoot a `cloudflared` instance.
10+
11+
A diagnostic report collects data from a single instance of `cloudflared` running on the local machine and outputs it to a `cloudflared-diag` file.
12+
13+
<Render file="tunnel/tunnel-diag-file" product="cloudflare-one" />
14+
15+
For more information, refer to [Diagnostic logs](/cloudflare-one/connections/connect-networks/troubleshoot-tunnels/diag-logs/).
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: Detect source code leaks with Data Loss Prevention
3+
description: Added source code confidence levels to Data Loss Prevention
4+
date: 2025-01-03T11:00:00Z
5+
---
6+
7+
import { Render } from "~/components";
8+
9+
You can now detect source code leaks with Data Loss Prevention (DLP) with predefined checks against common programming languages.
10+
11+
<Render
12+
file="data-loss-prevention/programming-language-list"
13+
product="cloudflare-one"
14+
/>
15+
16+
For more details, refer to [DLP profiles](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/).
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Increased transparency for phishing email submissions
3+
description: New Email reclassifications tab
4+
date: 2024-12-19T11:00:00Z
5+
---
6+
7+
import { Render } from "~/components";
8+
9+
You now have more transparency about team and user submissions for phishing emails through a **Reclassification** tab in the Zero Trust dashboard.
10+
11+
Reclassifications happen when users or admins [submit a phish](/cloudflare-one/email-security/phish-submissions/) to Email Security. Cloudflare reviews and - in some cases - reclassifies these emails based on improvements to our machine learning models.
12+
13+
This new tab increases your visibility into this process, allowing you to view what submissions you have made and what the outcomes of those submissions are.
14+
15+
![Use the Reclassification area to review submitted phishing emails](~/assets/images/changelog/email-security/reclassifications-tab.png)
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
title: Block files that are password-protected, compressed, or otherwise unscannable.
3+
description: Unscannable files for Download and Upload File Types selectors
4+
date: 2025-02-03T11:00:00Z
5+
products:
6+
- dlp
7+
---
8+
9+
import { Render } from "~/components";
10+
11+
Gateway HTTP policies can now block files that are password-protected, compressed, or otherwise unscannable.
12+
13+
These unscannable files are now matched with the [Download and Upload File Types traffic selectors](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types) for HTTP policies:
14+
15+
<Render file="gateway/policies/unscannable-files" product="cloudflare-one" />
16+
17+
To get started inspecting and modifying behavior based on these and other rules, refer to [HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/).
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Generate customized terrform files for building cloud network on-ramps
3+
description: Download cloud onramp terraform
4+
date: 2024-12-05T11:00:00Z
5+
---
6+
7+
import { Render } from "~/components";
8+
9+
You can now generate customized terraform files for building cloud network on-ramps to [Magic WAN](/magic-wan/).
10+
11+
[Magic Cloud](/magic-cloud-networking/) can scan and discover existing network resources and generate the required terraform files to automate cloud resource deployment using their existing infrastructure-as-code workflows for cloud automation.
12+
13+
<Render file="terraform-setup-scenarios" product="magic-cloud-networking" />
14+
15+
For more details, refer to [Set up with Terraform](/magic-cloud-networking/cloud-on-ramps/#set-up-with-terraform).

0 commit comments

Comments
 (0)