Skip to content

Commit 38f06c8

Browse files
authored
Merge branch 'production' into max/zt/migrate-lists
2 parents 1e3e338 + a24b5b5 commit 38f06c8

File tree

91 files changed

+502
-160
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

91 files changed

+502
-160
lines changed

public/__redirects

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2402,6 +2402,11 @@
24022402
/cloudflare-one/applications/non-http/* /cloudflare-one/access-controls/applications/non-http/:splat 301
24032403
/cloudflare-one/identity/devices/* /cloudflare-one/reusable-components/posture-checks/:splat 301
24042404
/cloudflare-one/traffic-policies/lists/ /cloudflare-one/reusable-components/lists/ 301
2405+
/cloudflare-one/applications/casb/casb-integrations/* /cloudflare-one/integrations/cloud-and-saas/:splat 301
2406+
/cloudflare-one/applications/casb/troubleshooting/* /cloudflare-one/integrations/cloud-and-saas/troubleshooting/:splat 301
2407+
/cloudflare-one/applications/casb/ /cloudflare-one/cloud-and-saas-findings/ 301
2408+
/cloudflare-one/applications/casb/manage-findings/ /cloudflare-one/cloud-and-saas-findings/manage-findings/ 301
2409+
/cloudflare-one/applications/casb/casb-dlp/ /cloudflare-one/cloud-and-saas-findings/casb-dlp/ 301
24052410

24062411
# Learning paths
24072412

647 KB
Loading
457 KB
Loading
457 KB
Loading
719 KB
Loading

src/content/changelog/casb/2024-11-22-cloud-data-extraction-aws.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,6 @@ import { Render } from "~/components";
88

99
You can now use CASB to find security misconfigurations in your AWS cloud environment using [Data Loss Prevention](/cloudflare-one/data-loss-prevention/).
1010

11-
You can also [connect your AWS compute account](/cloudflare-one/applications/casb/casb-integrations/aws-s3/#compute-account) to extract and scan your S3 buckets for sensitive data while avoiding egress fees. CASB will scan any objects that exist in the bucket at the time of configuration.
11+
You can also [connect your AWS compute account](/cloudflare-one/integrations/cloud-and-saas/aws-s3/#compute-account) to extract and scan your S3 buckets for sensitive data while avoiding egress fees. CASB will scan any objects that exist in the bucket at the time of configuration.
1212

1313
<Render file="casb/aws-compute-account" product="cloudflare-one" />

src/content/changelog/casb/2025-08-26-casb-ai-integrations.mdx

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,16 @@ date: 2025-08-26 16:00:00 UTC
1111
![Cloudflare CASB showing selection of new findings for ChatGPT, Claude, and Gemini integrations.](~/assets/images/casb/changelog/casb-ai-integrations-preview.png)
1212

1313
### Key capabilities
14-
- **Agentless connections** — connect ChatGPT, Claude, and Gemini tenants via API; no endpoint software required
15-
- **Posture management** — detect insecure settings and misconfigurations that could lead to data exposure
16-
- **DLP detection** — identify sensitive data in uploaded chat attachments or files
17-
- **GenAI-specific insights** — surface risks unique to each provider’s capabilities
14+
15+
- **Agentless connections** — connect ChatGPT, Claude, and Gemini tenants via API; no endpoint software required
16+
- **Posture management** — detect insecure settings and misconfigurations that could lead to data exposure
17+
- **DLP detection** — identify sensitive data in uploaded chat attachments or files
18+
- **GenAI-specific insights** — surface risks unique to each provider’s capabilities
1819

1920
### Learn more
20-
- [ChatGPT integration docs](https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/openai/)
21-
- [Claude integration docs](https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/anthropic/)
22-
- [Gemini integration docs](https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/google-workspace/gemini/)
2321

24-
These integrations are available to all Cloudflare One customers today.
22+
- [ChatGPT integration docs](https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/openai/)
23+
- [Claude integration docs](https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/anthropic/)
24+
- [Gemini integration docs](https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/google-workspace/gemini/)
2525

26+
These integrations are available to all Cloudflare One customers today.

src/content/changelog/email-security-cf1/2025-04-01-casb-email-security.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,17 @@ description: Get two free CASB integrations with your Email Security subscriptio
44
date: 2025-04-01T23:22:49Z
55
---
66

7-
With Email Security, you get two free CASB integrations.
7+
With Email Security, you get two free CASB integrations.
88

9-
Use one SaaS integration for Email Security to sync with your directory of users, take actions on delivered emails, automatically provide EMLs for reclassification requests for clean emails, discover CASB findings and more.
9+
Use one SaaS integration for Email Security to sync with your directory of users, take actions on delivered emails, automatically provide EMLs for reclassification requests for clean emails, discover CASB findings and more.
1010

11-
With the other integration, you can have a separate SaaS integration for CASB findings for another SaaS provider.
11+
With the other integration, you can have a separate SaaS integration for CASB findings for another SaaS provider.
1212

13-
Refer to [Add an integration](/cloudflare-one/applications/casb/#add-an-integration) to learn more about this feature.
13+
Refer to [Add an integration](/cloudflare-one/integrations/cloud-and-saas/#add-an-integration) to learn more about this feature.
1414

1515
![CASB-EmailSecurity](~/assets/images/changelog/email-security/CASB-EmailSecurity.png)
1616

17-
This feature is available across these Email Security packages:
17+
This feature is available across these Email Security packages:
1818

19-
- **Enterprise**
20-
- **Enterprise + PhishGuard**
19+
- **Enterprise**
20+
- **Enterprise + PhishGuard**

src/content/docs/analytics/analytics-integrations/sentinel.mdx

Lines changed: 286 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,294 @@ sidebar:
66

77
---
88

9-
Microsoft has developed a Cloudflare connector that allows their customers to integrate [Cloudflare Logs](/logs/) with Microsoft Sentinel.
9+
import { Details } from "~/components";
1010

11-
## How it works
11+
Cloudflare has integrations with Microsoft Sentinel to make analyzing your Cloudflare data easier and in a centralized space. Cloudflare has two versions of this connector available. We recommend utilizing the latest Codeless Connector integration as it provides easier setup, cost management, and integrates with [Sentinel Data Lake](https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-lake-overview).
1212

13-
[Logpush](/logs/logpush/logpush-job/enable-destinations/azure/) sends logs from Cloudflare to Azure Blob Storage. From there, the Cloudflare connector, a Microsoft function, ingests these logs into Azure Log Analytics Workspace, making them available for monitoring and analysis in Microsoft Sentinel.
13+
**[Sentinel CCF Solution](https://marketplace.microsoft.com/en-us/product/azure-application/cloudflare.azure-sentinel-solution-cloudflare-ccf?tab=Overview)** (recommended): The Codeless Connector Framework (CCF) provides partners, advanced users, and developers the ability to create custom connectors for ingesting data to Microsoft Sentinel.
1414

15-
![Sentinel integrations steps](~/assets/images/analytics/sentinel-diagram.png)
15+
**[Sentinel Function Based Connector](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/cloudflare.cloudflare_sentinel?tab=Overview)**: The Cloudflare connector for Microsoft Sentinel uses [Azure Functions](https://azure.microsoft.com/en-us/products/functions) to process security logs from Cloudflare's Logpush service and ingest them directly into the SIEM platform.
16+
17+
This guide provides clear, step-by-step instructions for integrating Cloudflare logs with the new CCF connector for Microsoft Sentinel using Azure Blob Storage. By following these steps, you will be able to securely collect, store, and analyse your Cloudflare logs within Microsoft Sentinel, enhancing your organisation's security monitoring and incident response capabilities.
18+
19+
## Step 1: Prerequisites
20+
21+
- Azure Subscription with permission to create and manage resources (Contributor/Owner role recommended).
22+
- Microsoft Sentinel Workspace already set up in your Azure environment.
23+
- Azure Storage Account with a Blob container for storing Cloudflare logs.
24+
- Cloudflare Account with access to the domain whose logs you wish to export, and permission to configure Logpush jobs.
25+
26+
## Step 2: Set up a logpush job
27+
28+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
29+
2. Go to **Analytics** > **Logs** and select **Logpush**.
30+
3. Select **Create Logpush Job**. Choose the log type you want to export (for example, **HTTP requests**).
31+
4. For the destination, select **Azure Blob Storage**.
32+
5. Enter your Azure Blob Storage details:
33+
- SAS Token (Shared Access Signature)
34+
35+
To generate a SAS token from the Azure portal, first navigate to your storage account. Under the **Data Storage** section, select **Containers** and choose the relevant container. Within the settings, locate and select **Shared access signature**. Configure the required permissions, such as `write` and `create`, and specify the start and expiration dates for the token. Once configured, generate the SAS token accordingly.
36+
6. Save and activate the Logpush job.
37+
38+
For complete details, refer to the [Cloudflare Logpush to Azure documentation](/logs/logpush/logpush-job/enable-destinations/azure/).
39+
40+
## Step 3: Configure Azure and deploy the Data Connector in Microsoft Sentinel
41+
42+
1. Log in to the Azure Portal and go to your **Microsoft Sentinel** workspace.
43+
2. Select **Content Hub** in the navigation bar and search for **Cloudflare**.
44+
3. Select the **Cloudflare** solution from the results.
45+
4. Select **Install** in the right pane.
46+
5. In your **Sentinel workspace**, go to **Data connectors**.
47+
6. Search for the **Cloudflare connector** (may appear as **Cloudflare (using Azure Blob Storage)**).
48+
7. Selecte the connector to configure it.
49+
50+
![Azure portal](~/assets/images/analytics/azure-portal.png)
51+
52+
## Step 4: Fill out required fields
53+
54+
When configuring the Cloudflare data connector, you will need to provide the following information:
55+
56+
- Blob container URL
57+
58+
To obtain the container URL within your Azure storage account, access the Azure Portal and navigate to your storage account. Under **Data Storage**, select **Containers**, then choose the relevant container receiving logs from Cloudflare. The container properties section will display the URL link.
59+
60+
- Resource group name for the storage account
61+
- Storage account location
62+
- Subscription ID
63+
- Event grid topic name (only if reconfiguring; not needed for initial setup)
64+
65+
After entering all information, select **Connect**.
66+
67+
Ensure all fields are correctly filled to enable seamless log ingestion.
68+
69+
![Configuration fields](~/assets/images/analytics/configuration.png)
70+
71+
## Step 5: Complete deployment
72+
73+
1. Select **Apply changes** or **Connect** to finalise the connector setup.
74+
2. Monitor the Data connectors page in Sentinel to confirm that the Cloudflare connector status is **Connected**.
75+
3. Verify that Cloudflare logs are appearing in your Sentinel workspace under **Log Analytics** > **Logs**.
76+
4. If logs are not appearing, review your Blob Storage permissions, Cloudflare Logpush configuration, and Sentinel connector settings.
77+
78+
![Data connectors](~/assets/images/analytics/data-connectors.png)
79+
80+
By following these steps, you have successfully integrated Cloudflare logs with Microsoft Sentinel using Azure Blob Storage. This integration enables advanced security analytics and incident response capabilities for your Cloudflare-protected environments. If you encounter issues, review each configuration step, check permissions, and review Microsoft's official documentation.
81+
82+
![Cloudflare traffic overview](~/assets/images/analytics/traffic-overview.png)
83+
84+
## Supported Logs
85+
86+
We support the following fields to be utilized within the Sentinel Connectors (CCF & Function based). You can push all log fields to Azure using our logpush function as described in [Enable Microsoft Azure](/logs/logpush/logpush-job/enable-destinations/azure/) documentation.
87+
88+
<Details header="Parser fields">
89+
90+
ClientDeviceType<br />
91+
Source<br />
92+
ClientSSLCipher<br />
93+
ClientTlsCipher<br />
94+
ClientSSLProtocol<br />
95+
ClientTlsProtocol<br />
96+
FirewallMatchesActions<br />
97+
Event<br />
98+
FirewallMatchesRuleIDs<br />
99+
RuleID<br />
100+
ClientRequestBytes<br />
101+
ClientBytes<br />
102+
ClientSrcPort<br />
103+
ClientPort<br />
104+
EdgeResponseBytes<br />
105+
OriginBytes<br />
106+
BotScore<br />
107+
BotScoreSrc<br />
108+
CacheCacheStatus<br />
109+
CacheResponseBytes<br />
110+
CacheResponseStatus<br />
111+
CacheTieredFill<br />
112+
ClientASN<br />
113+
ClientCountry<br />
114+
ClientIP<br />
115+
ClientIPClass<br />
116+
ClientRequestHost<br />
117+
ClientRequestMethod<br />
118+
ClientRequestPath<br />
119+
ClientRequestProtocol<br />
120+
ClientRequestReferer<br />
121+
ClientRequestURI<br />
122+
ClientRequestUserAgent<br />
123+
ClientXRequestedWith<br />
124+
EdgeColoCode<br />
125+
EdgeColoID<br />
126+
EdgeEndTimestamp<br />
127+
EdgePathingOp<br />
128+
EdgePathingSrc<br />
129+
EdgePathingStatus<br />
130+
EdgeRateLimitAction<br />
131+
EdgeRateLimitID<br />
132+
EdgeRequestHost<br />
133+
EdgeResponseCompressionRatio<br />
134+
EdgeResponseContentType<br />
135+
EdgeResponseStatus<br />
136+
EdgeServerIP<br />
137+
EdgeStartTimestamp<br />
138+
FirewallMatchesSources<br />
139+
OriginIP<br />
140+
OriginResponseBytes<br />
141+
OriginResponseHTTPExpires<br />
142+
OriginResponseHTTPLastModified<br />
143+
OriginResponseStatus<br />
144+
OriginResponseTime<br />
145+
OriginSSLProtocol<br />
146+
ParentRayID<br />
147+
RayID<br />
148+
SecurityLevel<br />
149+
WAFAction<br />
150+
WAFFlags<br />
151+
WAFMatchedVar<br />
152+
WAFProfile<br />
153+
WAFRuleID<br />
154+
WAFRuleMessage<br />
155+
WorkerCPUTime<br />
156+
WorkerStatus<br />
157+
WorkerSubrequest<br />
158+
WorkerSubrequestCount<br />
159+
ZoneID<br />
160+
Application<br />
161+
ClientMatchedIpFirewall<br />
162+
ClientProto<br />
163+
ClientTcpRtt<br />
164+
ClientTlsClientHelloServerName<br />
165+
ClientTlsStatus<br />
166+
ColoCode<br />
167+
ConnectTimestamp<br />
168+
DisconnectTimestamp<br />
169+
IpFirewall<br />
170+
OriginPort<br />
171+
OriginProto<br />
172+
OriginTcpRtt<br />
173+
OriginTlsCipher<br />
174+
OriginTlsFingerprint<br />
175+
OriginTlsMode<br />
176+
OriginTlsProtocol<br />
177+
OriginTlsStatus<br />
178+
ProxyProtocol<br />
179+
Status<br />
180+
Timestamp<br />
181+
ClientASNDescription<br />
182+
ClientRefererHost<br />
183+
ClientRefererPath<br />
184+
ClientRefererQuery<br />
185+
ClientRefererScheme<br />
186+
ClientRequestQuery<br />
187+
ClientRequestScheme<br />
188+
Datetime<br />
189+
Kind<br />
190+
MatchIndex<br />
191+
OriginatorRayID<br />
192+
TimeGenerated<br />
193+
194+
</Details>
195+
196+
<Details header="WorkBook fields">
197+
198+
ClientCountry_s<br />
199+
ClientDeviceType_s<br />
200+
ClientIP_s<br />
201+
ClientIPClass_s<br />
202+
ClientRequestMethod_s<br />
203+
ClientRequestProtocol_s<br />
204+
ClientRequestReferer_s<br />
205+
ClientRequestURI_s<br />
206+
ClientRequestUserAgent_s<br />
207+
EdgePathingOp_s<br />
208+
EdgePathingSrc_s<br />
209+
EdgePathingStatus_s<br />
210+
EdgeResponseContentType_s<br />
211+
threat<br />
212+
TimeGenerated<br />
213+
EdgePathingSrc_s<br />
214+
EdgePathingOp_s<br />
215+
EdgePathingStatus_s<br />
216+
EdgeResponseStatus_d<br />
217+
OriginResponseStatus_d<br />
218+
TimeGenerated<br />
219+
220+
</Details>
221+
222+
<Details header="Analytic rules">
223+
224+
ClientIPClass<br />
225+
SrcIpAddr<br />
226+
ClientRequestURI<br />
227+
HttpUserAgentOriginal<br />
228+
HttpRequestMethod<br />
229+
TimeGenerated<br />
230+
SrcGeoCountry<br />
231+
ClientRequestURI<br />
232+
HttpRequestMethod<br />
233+
HttpStatusCode<br />
234+
DstBytes<br />
235+
SrcBytes<br />
236+
WAFRuleID<br />
237+
WAFRuleMessage<br />
238+
WAFAction<br />
239+
240+
</Details>
241+
242+
<Details header="Hunting queries">
243+
244+
TimeGenerated<br />
245+
HttpStatusCode<br />
246+
SrcIpAddr<br />
247+
ClientRequestURI<br />
248+
ClientTlsStatus<br />
249+
HttpUserAgentOriginal<br />
250+
OriginTlsStatus<br />
251+
NetworkRuleName<br />
252+
EdgeRequestHost<br />
253+
SrcGeoCountry<br />
254+
EdgeResponseStatus<br />
255+
ClientCountry<br />
256+
ClientDeviceType<br />
257+
status<br />
258+
OriginResponseStatus<br />
259+
WorkerSubrequest<br />
260+
http_method<br />
261+
dest_ip<br />
262+
dest_host<br />
263+
uri_path<br />
264+
http_user_agent<br />
265+
status<br />
266+
src_ip<br />
267+
OriginResponseStatus<br />
268+
RayID<br />
269+
WorkerSubrequest<br />
270+
http_method<br />
271+
bytes_out<br />
272+
bytes_cached_requests<br />
273+
threat<br />
274+
ClientRequestProtocol<br />
275+
http_referrer<br />
276+
ClientIPClass<br />
277+
cf_http_status_codes<br />
278+
http_content_type<br />
279+
cf_http_status_codes<br />
280+
cached_requests<br />
281+
CacheCacheStatus<br />
282+
ClientASN<br />
283+
EdgePathingSrc<br />
284+
EdgePathingOp<br />
285+
EdgePathingStatus<br />
286+
ClientRequestUserAgent<br />
287+
SecurityAction<br />
288+
SecurityRuleID<br />
289+
SecurityRuleDescription<br />
290+
291+
</Details>
292+
293+
## Resources
294+
295+
[Download Cloudflare's CCF Sentinel Solution](https://marketplace.microsoft.com/en-us/product/azure-application/cloudflare.azure-sentinel-solution-cloudflare-ccf?tab=Overview)<br />
296+
[Microsoft Data Lake Overview](https://learn.microsoft.com/en-us/azure/sentinel/datalake/sentinel-lake-overview)<br />
297+
[About the CCF Platform](https://learn.microsoft.com/en-us/azure/sentinel/create-codeless-connector)
16298

17-
For more details, refer to the Microsoft documentation [Cloudflare connector for Microsoft Sentinel](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/cloudflare.cloudflare_sentinel).
18299

src/content/docs/china-network/faq.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -52,14 +52,14 @@ The JD Cloud network is proxying content inside of China for customers who have
5252

5353
## Products and features
5454

55-
### How does IPv6 work on the Cloudflare China Network?
55+
### How does IPv6 work on China Network?
5656

57-
All sites hosted in Mainland China must have IPv6 enabled. The Cloudflare China Network feature automatically enables IPv6 for domains to fulfill this requirement and it is not possible to disable it. According to internal testing, IPv6 connections in Mainland China are more reliable and offer better latency.
57+
All sites hosted in Mainland China must have IPv6 enabled. China Network automatically enables IPv6 for domains to fulfill this requirement and it is not possible to disable it. According to internal testing, IPv6 connections in Mainland China are more reliable and offer better latency.
5858

5959
### Is Turnstile available in Mainland China?
6060

6161
[Turnstile](/turnstile/) is not supported in Mainland China. Therefore, both China Network zones and [global zones](/fundamentals/concepts/accounts-and-zones/#zones) with users visiting your content from Mainland China may experience issues with Turnstile.
6262

63-
## Is Cloudflare Pages available in Mainland China?
63+
### Is Pages available in Mainland China?
6464

65-
[Cloudflare Pages](/pages/) is not available in Mainland China due to pages.dev certificate not residing within Mainland China. However, Pages from a global zone may potentially be extended into Mainland China.
65+
[Pages](/pages/) is not available in Mainland China due to pages.dev certificate not residing within Mainland China. However, Pages from a global zone may potentially be extended into Mainland China.

0 commit comments

Comments
 (0)