Skip to content

Commit 295055b

Browse files
Add DashButton to only account-level step in CF4SaaS
1 parent 947503d commit 295055b

File tree

1 file changed

+6
-6
lines changed
  • src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/waf-for-saas

1 file changed

+6
-6
lines changed

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/waf-for-saas/managed-rulesets.mdx

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ head:
99

1010
---
1111

12+
import { DashButton } from "~/components";
13+
1214
If you are interested in [WAF for SaaS](/cloudflare-for-platforms/cloudflare-for-saas/security/waf-for-saas/) but unsure of where to start, Cloudflare recommends using WAF Managed Rules. The Cloudflare security team creates and manages a variety of rules designed to detect common attack vectors and protect applications from vulnerabilities. These rules are offered in [managed rulesets](/waf/managed-rules/), like Cloudflare Managed and OWASP, which can be deployed with different settings and sensitivity levels.
1315

1416
***
@@ -43,18 +45,16 @@ After the association is complete, the JSON blob is added to the defined custom
4345

4446
## 2. Deploy Rulesets
4547

46-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and navigate to your account.
48+
1. In the Cloudflare dashboard, go to the **WAF** page.
4749

48-
2. Select Account Home > **WAF**.
50+
<DashButton url="/?to=/:account/application-security/waf" />
4951

5052
:::note
51-
52-
5353
**WAF** at the account level will only be visible on Enterprise plans. If you do not see this option, contact your account manager.
54-
55-
5654
:::
5755

56+
2. Select **Managed rulesets**.
57+
5858
3. Select **Deploy a managed ruleset**.
5959

6060
4. Under **Field**, Select *Hostname*. Set the operator as *equals*. The complete expression should look like this, plus any logic you would like to add:

0 commit comments

Comments
 (0)