Skip to content

Commit 33c6669

Browse files
pedrosousadaisyfaithauma
authored andcommitted
[Page Shield] Clarify hash of script version (#22245)
1 parent f721aaa commit 33c6669

File tree

3 files changed

+33
-13
lines changed

3 files changed

+33
-13
lines changed

src/content/docs/page-shield/detection/monitor-connections-scripts.mdx

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ sidebar:
55
order: 2
66
---
77

8+
import { Render } from "~/components";
9+
810
Once you [activate Page Shield](/page-shield/get-started/), the **Monitors** dashboard will show which resources (scripts and connections) are running on your domain, as well as the cookies recently detected in HTTP traffic.
911

1012
If you notice unexpected scripts or connections on the dashboard, check them for signs of malicious activity. Enterprise customers with a paid add-on will have their [connections and scripts classified as potentially malicious](/page-shield/how-it-works/malicious-script-detection/) based on threat feeds. You should also check for any new or unexpected cookies.
@@ -54,15 +56,23 @@ You can filter the data in these dashboards using different criteria, and print
5456
Only available to customers on Business and Enterprise plans.
5557
:::
5658

57-
To view the details of an item, select **Details** next to the item.
59+
To view the details of an item, select **Details** next to it.
60+
61+
### Script and connection details
5862

5963
The details of each connection or script include:
6064

6165
- **Last seen**: How long ago the resource was last detected (in the last 30 days).
6266
- **First seen at**: The date and time when the resource was first detected.
63-
- **Page URLs**: The most recent pages where the resource was detected (up to ten pages).
64-
- **First page URL**: The page where the resource was first detected.
65-
- **Host**: The host where the script is being loaded or the connection is being made.
67+
- **Seen on host**: The host where the script is being loaded or the connection is being made.
68+
- **Seen on pages**: The most recent pages where the resource was detected (up to ten pages).
69+
- **First seen on**: The page where the resource was first detected.
70+
71+
The script details also include the last 10 script versions detected by Page Shield.
72+
73+
<Render file="scripts-hash-note" />
74+
75+
### Cookie details
6676

6777
The details of each cookie include:
6878

src/content/docs/page-shield/detection/review-malicious-scripts.mdx

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@ sidebar:
66
head: []
77
description: Learn how to review scripts and connections that Page Shield
88
considered malicious.
9-
109
---
1110

12-
:::note
11+
import { Render } from "~/components";
1312

13+
:::note
1414
Only available to Enterprise customers with a paid add-on.
1515
:::
1616

@@ -26,10 +26,13 @@ To review the scripts considered malicious:
2626

2727
3. Select **Details** for each script considered malicious. The script details will contain:
2828

29-
* **Malicious Code**: Whether Cloudflare's internal systems consider the script malicious or not, and what is the score of the current script version (1-99).
30-
* **Malicious URL**: Whether the script URL is known to be malicious according to threat intelligence feeds.
31-
* **Malicious domain**: Whether the script's domain is known to be malicious according to threat intelligence feeds.
32-
* **Malicious category**: The categorization of the script considered malicious according to threat intelligence feeds.
29+
- **Malicious code analysis**: Scores between 1-99 classifying how malicious the current script version is, where 1 means definitely malicious and 99 means definitely not malicious.
30+
- **Code behavior analysis**: Scores classifying the behavior of the current script version in terms of code obfuscation and data exfiltration. The scores vary between 1-99, where 1 means definitely malicious and 99 means definitely not malicious.
31+
- **Threat intelligence**: Whether the script URL and/or domain is known to be malicious according to threat intelligence feeds. If the script is considered malicious according to the feeds, Page Shield will list the associated threat [categories](/page-shield/how-it-works/malicious-script-detection/#malicious-script-and-connection-categories). If threat intelligence feeds do not have any information about the script URL or domain, the dashboard will show **Not present**.
32+
33+
The script details also include the last 10 script versions detected by Page Shield.
34+
35+
<Render file="scripts-hash-note" />
3336

3437
For more information, refer to [Malicious script and connection detection](/page-shield/how-it-works/malicious-script-detection/).
3538

@@ -47,9 +50,9 @@ To review the connections considered malicious:
4750

4851
3. Select **Details** for each connection considered malicious. The connection details will contain:
4952

50-
* **URL match**: Whether the connection's target URL is known to be malicious according to threat intelligence feeds. This field requires that you configure Page Shield to analyze the [full URI](/page-shield/reference/settings/#connection-target-details) of outgoing connections.
51-
* **Domain match**: Whether the connection's target domain is known to be malicious according to threat intelligence feeds.
52-
* **Category**: The categorization of the connection considered malicious according to threat intelligence feeds.
53+
- **URL match**: Whether the connection's target URL is known to be malicious according to threat intelligence feeds. This field requires that you configure Page Shield to analyze the [full URI](/page-shield/reference/settings/#connection-target-details) of outgoing connections.
54+
- **Domain match**: Whether the connection's target domain is known to be malicious according to threat intelligence feeds.
55+
- **Category**: The categorization of the connection considered malicious according to threat intelligence feeds.
5356

5457
For more information, refer to [Malicious script and connection detection](/page-shield/how-it-works/malicious-script-detection/).
5558

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
{}
3+
---
4+
5+
:::note
6+
The **Hash** value shown in the script details for each script version is an internal identifier. This differs from the file content hash defined by [Subresource Integrity (SRI)](https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity) that is required to be used in [Page Shield policies](/page-shield/policies/).
7+
:::

0 commit comments

Comments
 (0)