Skip to content

Commit 2382f2d

Browse files
pedrosousaRebeccaTamachiro
authored andcommitted
[WAF] Update Firewall for AI (#21616)
1 parent 1c0757e commit 2382f2d

File tree

3 files changed

+11
-2
lines changed

3 files changed

+11
-2
lines changed

src/content/docs/security/analytics.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@ Security analytics shows information about all incoming HTTP requests or only ab
1212

1313
Use Security analytics as your starting point to understand and analyze traffic patterns, and to create security rules based on the filters you applied.
1414

15+
Security analytics is available in **Security** > **Analytics**.
16+
1517
## Traffic
1618

1719
The **Traffic** tab displays information about all incoming HTTP requests for your domain, including requests not handled by Cloudflare security products.

src/content/docs/security/rules.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ description: Security rules perform security actions on incoming requests that m
88

99
Security rules perform security-related actions on incoming requests that match specified filters. Rules are evaluated and executed in order, from first to last.
1010

11+
Security rules are available in **Security** > **Security rules**.
12+
1113
## Security rules
1214

1315
The **Security rules** tab includes a list of different types of rules configured in your domain / zone to protect your applications and resources.

src/content/docs/waf/detections/firewall-for-ai.mdx

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,14 @@ Firewall for AI is available in closed beta to Enterprise customers proxying tra
2626

2727
<Tabs syncKey="dashPlusAPI"> <TabItem label="Dashboard">
2828

29+
:::note
30+
Firewall for AI is only available in the new [application security dashboard](/security/), currently in beta for users that opt in to the new user interface.
31+
:::
32+
2933
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
3034
2. Go to **Security** > **Settings**.
31-
3. Under **Incoming traffic detections**, turn on **Firewall for AI**.
35+
3. Under **Web application exploits**, select **Manage detections**.
36+
4. In **Firewall for AI**, select **Enable**.
3237

3338
</TabItem> <TabItem label="API">
3439

@@ -55,7 +60,7 @@ curl "https://<YOUR_HOSTNAME>/api/v1/" \
5560

5661
The PII category for this request would be `EMAIL_ADDRESS`.
5762

58-
Then, use [Security Analytics](/waf/analytics/security-analytics/) to validate that the WAF is correctly detecting prompts leaking PII data in incoming requests. Filter data by the `cf-llm` managed endpoint label and review the detection results on your traffic.
63+
Then, use [Security Analytics](/waf/analytics/security-analytics/) in the new application security dashboard to validate that the WAF is correctly detecting prompts leaking PII data in incoming requests. Filter data by the `cf-llm` managed endpoint label and review the detection results on your traffic.
5964

6065
Alternatively, create a WAF custom rule like the one described in the next step using a _Log_ action. This rule will generate [security events](/waf/analytics/security-events/) that will allow you to validate your configuration.
6166

0 commit comments

Comments
 (0)