You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/china-network/get-started.mdx
+8-9Lines changed: 8 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,18 +3,17 @@ title: Get started
3
3
pcx_content_type: get-started
4
4
sidebar:
5
5
order: 2
6
-
7
6
---
8
7
9
-
## Step 1 — Contract required services and agree to supplemental terms
8
+
## 1. Contract required services and agree to supplemental terms
10
9
11
10
1. Ensure that you have a Cloudflare Enterprise plan. If you do not have an Enterprise plan yet, you must upgrade.
12
11
2. Add the Cloudflare China Network package (a separate subscription) to your Enterprise plan.
13
12
3. Agree to the [China Service Supplemental Terms](https://www.cloudflare.com/supplemental-terms/#china-service).
14
13
15
14
Contact your sales team for more information on these steps.
16
15
17
-
## Step 2 — Obtain ICP and vet domain content
16
+
## 2. Obtain ICP and vet domain content
18
17
19
18
1.[Obtain Internet Content Provider (ICP) filings or licenses](/china-network/concepts/icp/#obtain-an-icp-number) for all the apex domains you wish to onboard.
20
19
@@ -24,13 +23,13 @@ Contact your sales team for more information on these steps.
24
23
25
24
4. Prepare the required information for JD Cloud to review the content on your domains. JD Cloud, a Cloudflare partner, is required to review and vet the content of all domains on their network before enabling them. You will need to provide the following information:
26
25
27
-
* Customer and company name.
28
-
* Domain name.
29
-
* ICP license/filing number.
30
-
* A general description of the content of each domain (for example, `Marketing website`).
31
-
* A signed Self Attestation letter (provided by your sales team).
26
+
- Customer and company name.
27
+
- Domain name.
28
+
- ICP license/filing number.
29
+
- A general description of the content of each domain (for example, `Marketing website`).
30
+
- A signed Self Attestation letter (provided by your sales team).
32
31
33
-
## Step 3 — Onboard your domains to the Cloudflare China Network
32
+
## 3. Onboard your domains to the Cloudflare China Network
34
33
35
34
After content vetting is complete, [add your domains to Cloudflare](/fundamentals/setup/manage-domains/add-site/).
Copy file name to clipboardExpand all lines: src/content/docs/page-shield/best-practices/handle-an-alert.mdx
+18-19Lines changed: 18 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,12 +7,11 @@ sidebar:
7
7
head:
8
8
- tag: title
9
9
content: Handle a Page Shield alert
10
-
11
10
---
12
11
13
12
If you receive a Page Shield alert, sometimes you need to perform some manual investigation to confirm the nature of the script. Use the guidance provided in this page as a starting point for your investigation.
14
13
15
-
## Step 1 - Understand what triggered the alert
14
+
## 1. Understand what triggered the alert
16
15
17
16
Start by identifying the [detection system](/page-shield/how-it-works/malicious-script-detection/) that triggered the alert. A link is provided in the alert that will send you directly to the Page Shield dashboard to the relevant resource that needs reviewing. Alternatively, do the following:
18
17
@@ -25,13 +24,13 @@ Start by identifying the [detection system](/page-shield/how-it-works/malicious-
25
24
26
25
The details page will specify which detection system triggered the alert. Check the values of the following fields:
27
26
28
-
***Malicious code**
29
-
***Malicious URL**
30
-
***Malicious domain**
27
+
-**Malicious code**
28
+
-**Malicious URL**
29
+
-**Malicious domain**
31
30
32
31
Different detection mechanisms may consider the script malicious at the same time. This increases the likelihood of the detection not being a false positive.
33
32
34
-
## Step 2 - Find the page where the resource was detected
33
+
## 2. Find the page where the resource was detected
35
34
36
35
If you received an alert for a potentially malicious script:
37
36
@@ -45,42 +44,42 @@ If you received an alert for a potentially malicious connection:
45
44
46
45
2. Open the browser's developer tools to confirm that the connection is being made. You can check this in the developer tools' **Network** tab, searching for the target hostname of the connection.
47
46
48
-
If you find the script or connection, this means the script is being loaded (or the connection is being established) for all website visitors — proceed to [step 3](#step-3---check-the-script-reputation).
47
+
If you find the script or connection, this means the script is being loaded (or the connection is being established) for all website visitors — proceed to [step 3](#3-check-the-script-reputation).
49
48
50
49
If you do not find the script being loaded or the connection being made, this could mean one of the following:
51
50
52
-
* The script is being loaded (or the connection is being made) by visitors' browser extensions.
53
-
* Your current state will not load the script or make the connection. Complex applications might load scripts and establish connections based on state.
54
-
* You are not in the correct geographic location (or similar condition).
55
-
* The attacker is only loading the script or making the connection for a percentage of visitors or visitors with specific browsers/signatures.
51
+
- The script is being loaded (or the connection is being made) by visitors' browser extensions.
52
+
- Your current state will not load the script or make the connection. Complex applications might load scripts and establish connections based on state.
53
+
- You are not in the correct geographic location (or similar condition).
54
+
- The attacker is only loading the script or making the connection for a percentage of visitors or visitors with specific browsers/signatures.
56
55
57
56
In this case, in addition to the steps indicated below, the best approach is:
58
57
59
-
* From a safe virtual environment, use online search tools and search for the given resource. Review results and resource metadata, for example domain registration details;
60
-
* If in doubt, scan the application codebase for the resource and if found, clarify the purpose.
58
+
- From a safe virtual environment, use online search tools and search for the given resource. Review results and resource metadata, for example domain registration details;
59
+
- If in doubt, scan the application codebase for the resource and if found, clarify the purpose.
61
60
62
-
## Step 3 - Check the script reputation
61
+
## 3. Check the script reputation
63
62
64
63
If Page Shield considers the resource’s domain a "malicious domain", it is likely that the domain does not have a good reputation. The domain may be known for hosting malware or for being used for phishing attacks. Usually, reviewing the domain/hostname is sufficient to understand why you received the alert. You can use tools like Cloudflare’s [Security Center Investigate](https://dash.cloudflare.com/?to=/:account/security-center/investigate) platform to help with this validation.
65
64
66
65
If Cloudflare's internal systems classified the script as containing "malicious code", external tools may not confirm the detection you got from Page Shield, since the machine learning (ML) model being used is Cloudflare-specific technology. However, you can re-run Page Shield’s ML model against the script source code, by using Cloudflare’s [Security Center Analyze](https://dash.cloudflare.com/?to=/:account/security-center/investigate/analyze) tool to confirm the match.
67
66
68
-
## Step 4 (optional) - Analyze the script content
67
+
## 4. (Optional) Analyze the script content
69
68
70
69
You could use a virtual machine to perform some of the following analysis:
71
70
72
71
1. Open the script URL and get the script source code. If the script is obfuscated or encoded, this could be a sign that the script is malicious.
73
72
2. Scan the script source code for any hostnames or IP addresses.
74
73
3. For each hostname or IP address you identified, use Cloudflare's Security Center Investigate platform to look up threat information and/or search online for potential Indicators of Compromise.
75
74
76
-
***
75
+
---
77
76
78
77
## Conclusion
79
78
80
79
If a resource which triggered a malicious alert from Page Shield:
81
80
82
-
* Is actively present in your application
83
-
* Is being loaded from a malicious host or IP address, or has malicious code
84
-
* Has malicious hostnames or IP addresses in its source code, which may be obfuscated/encoded
81
+
- Is actively present in your application
82
+
- Is being loaded from a malicious host or IP address, or has malicious code
83
+
- Has malicious hostnames or IP addresses in its source code, which may be obfuscated/encoded
85
84
86
85
You should investigate further, since these indicators can be a sign of an ongoing active compromise.
0 commit comments