Skip to content

Commit 18c8e6a

Browse files
pedrosousaelithrar
authored andcommitted
[Page Shield, China Network] Remove "Step" from headings (#17469)
1 parent 7048bd8 commit 18c8e6a

File tree

2 files changed

+26
-28
lines changed

2 files changed

+26
-28
lines changed

src/content/docs/china-network/get-started.mdx

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,17 @@ title: Get started
33
pcx_content_type: get-started
44
sidebar:
55
order: 2
6-
76
---
87

9-
## Step 1 — Contract required services and agree to supplemental terms
8+
## 1. Contract required services and agree to supplemental terms
109

1110
1. Ensure that you have a Cloudflare Enterprise plan. If you do not have an Enterprise plan yet, you must upgrade.
1211
2. Add the Cloudflare China Network package (a separate subscription) to your Enterprise plan.
1312
3. Agree to the [China Service Supplemental Terms](https://www.cloudflare.com/supplemental-terms/#china-service).
1413

1514
Contact your sales team for more information on these steps.
1615

17-
## Step 2 — Obtain ICP and vet domain content
16+
## 2. Obtain ICP and vet domain content
1817

1918
1. [Obtain Internet Content Provider (ICP) filings or licenses](/china-network/concepts/icp/#obtain-an-icp-number) for all the apex domains you wish to onboard.
2019

@@ -24,13 +23,13 @@ Contact your sales team for more information on these steps.
2423

2524
4. Prepare the required information for JD Cloud to review the content on your domains. JD Cloud, a Cloudflare partner, is required to review and vet the content of all domains on their network before enabling them. You will need to provide the following information:
2625

27-
* Customer and company name.
28-
* Domain name.
29-
* ICP license/filing number.
30-
* A general description of the content of each domain (for example, `Marketing website`).
31-
* A signed Self Attestation letter (provided by your sales team).
26+
- Customer and company name.
27+
- Domain name.
28+
- ICP license/filing number.
29+
- A general description of the content of each domain (for example, `Marketing website`).
30+
- A signed Self Attestation letter (provided by your sales team).
3231

33-
## Step 3 — Onboard your domains to the Cloudflare China Network
32+
## 3. Onboard your domains to the Cloudflare China Network
3433

3534
After content vetting is complete, [add your domains to Cloudflare](/fundamentals/setup/manage-domains/add-site/).
3635

src/content/docs/page-shield/best-practices/handle-an-alert.mdx

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,11 @@ sidebar:
77
head:
88
- tag: title
99
content: Handle a Page Shield alert
10-
1110
---
1211

1312
If you receive a Page Shield alert, sometimes you need to perform some manual investigation to confirm the nature of the script. Use the guidance provided in this page as a starting point for your investigation.
1413

15-
## Step 1 - Understand what triggered the alert
14+
## 1. Understand what triggered the alert
1615

1716
Start by identifying the [detection system](/page-shield/how-it-works/malicious-script-detection/) that triggered the alert. A link is provided in the alert that will send you directly to the Page Shield dashboard to the relevant resource that needs reviewing. Alternatively, do the following:
1817

@@ -25,13 +24,13 @@ Start by identifying the [detection system](/page-shield/how-it-works/malicious-
2524

2625
The details page will specify which detection system triggered the alert. Check the values of the following fields:
2726

28-
* **Malicious code**
29-
* **Malicious URL**
30-
* **Malicious domain**
27+
- **Malicious code**
28+
- **Malicious URL**
29+
- **Malicious domain**
3130

3231
Different detection mechanisms may consider the script malicious at the same time. This increases the likelihood of the detection not being a false positive.
3332

34-
## Step 2 - Find the page where the resource was detected
33+
## 2. Find the page where the resource was detected
3534

3635
If you received an alert for a potentially malicious script:
3736

@@ -45,42 +44,42 @@ If you received an alert for a potentially malicious connection:
4544

4645
2. Open the browser's developer tools to confirm that the connection is being made. You can check this in the developer tools' **Network** tab, searching for the target hostname of the connection.
4746

48-
If you find the script or connection, this means the script is being loaded (or the connection is being established) for all website visitors — proceed to [step 3](#step-3---check-the-script-reputation).
47+
If you find the script or connection, this means the script is being loaded (or the connection is being established) for all website visitors — proceed to [step 3](#3-check-the-script-reputation).
4948

5049
If you do not find the script being loaded or the connection being made, this could mean one of the following:
5150

52-
* The script is being loaded (or the connection is being made) by visitors' browser extensions.
53-
* Your current state will not load the script or make the connection. Complex applications might load scripts and establish connections based on state.
54-
* You are not in the correct geographic location (or similar condition).
55-
* The attacker is only loading the script or making the connection for a percentage of visitors or visitors with specific browsers/signatures.
51+
- The script is being loaded (or the connection is being made) by visitors' browser extensions.
52+
- Your current state will not load the script or make the connection. Complex applications might load scripts and establish connections based on state.
53+
- You are not in the correct geographic location (or similar condition).
54+
- The attacker is only loading the script or making the connection for a percentage of visitors or visitors with specific browsers/signatures.
5655

5756
In this case, in addition to the steps indicated below, the best approach is:
5857

59-
* From a safe virtual environment, use online search tools and search for the given resource. Review results and resource metadata, for example domain registration details;
60-
* If in doubt, scan the application codebase for the resource and if found, clarify the purpose.
58+
- From a safe virtual environment, use online search tools and search for the given resource. Review results and resource metadata, for example domain registration details;
59+
- If in doubt, scan the application codebase for the resource and if found, clarify the purpose.
6160

62-
## Step 3 - Check the script reputation
61+
## 3. Check the script reputation
6362

6463
If Page Shield considers the resource’s domain a "malicious domain", it is likely that the domain does not have a good reputation. The domain may be known for hosting malware or for being used for phishing attacks. Usually, reviewing the domain/hostname is sufficient to understand why you received the alert. You can use tools like Cloudflare’s [Security Center Investigate](https://dash.cloudflare.com/?to=/:account/security-center/investigate) platform to help with this validation.
6564

6665
If Cloudflare's internal systems classified the script as containing "malicious code", external tools may not confirm the detection you got from Page Shield, since the machine learning (ML) model being used is Cloudflare-specific technology. However, you can re-run Page Shield’s ML model against the script source code, by using Cloudflare’s [Security Center Analyze](https://dash.cloudflare.com/?to=/:account/security-center/investigate/analyze) tool to confirm the match.
6766

68-
## Step 4 (optional) - Analyze the script content
67+
## 4. (Optional) Analyze the script content
6968

7069
You could use a virtual machine to perform some of the following analysis:
7170

7271
1. Open the script URL and get the script source code. If the script is obfuscated or encoded, this could be a sign that the script is malicious.
7372
2. Scan the script source code for any hostnames or IP addresses.
7473
3. For each hostname or IP address you identified, use Cloudflare's Security Center Investigate platform to look up threat information and/or search online for potential Indicators of Compromise.
7574

76-
***
75+
---
7776

7877
## Conclusion
7978

8079
If a resource which triggered a malicious alert from Page Shield:
8180

82-
* Is actively present in your application
83-
* Is being loaded from a malicious host or IP address, or has malicious code
84-
* Has malicious hostnames or IP addresses in its source code, which may be obfuscated/encoded
81+
- Is actively present in your application
82+
- Is being loaded from a malicious host or IP address, or has malicious code
83+
- Has malicious hostnames or IP addresses in its source code, which may be obfuscated/encoded
8584

8685
You should investigate further, since these indicators can be a sign of an ongoing active compromise.

0 commit comments

Comments
 (0)