Skip to content

Commit 3c223e7

Browse files
committed
Add procedure for editing profile settings
1 parent 955e7fd commit 3c223e7

File tree

3 files changed

+30
-20
lines changed

3 files changed

+30
-20
lines changed

src/content/docs/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings.mdx

Lines changed: 23 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,31 +7,46 @@ sidebar:
77

88
import { Badge } from "~/components";
99

10-
This page lists the advanced settings available when configuring a [predefined](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/) or [custom](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/#build-a-custom-profile) DLP profile.
10+
This page lists the profile settings available when configuring a [predefined](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/) or [custom](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/#build-a-custom-profile) DLP profile. You can configure profile settings when you create a custom profile or [edit profile settings](#edit-profile-settings) for an existing predefined or custom profile.
1111

12-
## Match count
12+
## Edit profile settings
13+
14+
To edit profile settings for an existing predefined or custom DLP profile:
15+
16+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP profiles**.
17+
2. Choose a profile, then select **Edit**.
18+
3. In **Settings**, configure the [settings](#available-settings) for your profile.
19+
4. Select **Save profile**.
20+
21+
## Available settings
22+
23+
The following settings are available for predefined and custom DLP profiles.
24+
25+
### Match count
1326

1427
Match count refers to the number of times that any enabled entry in the profile can be detected before an action is triggered, such as blocking or logging. For example, if you select a match count of 10, the scanned file or HTTP body must contain 11 or more matching strings. Detections do not have to be unique.
1528

16-
## Optical Character Recognition (OCR)
29+
### Optical Character Recognition (OCR)
1730

1831
Optical Character Recognition (OCR) analyzes and interprets text within image files. When used with DLP profiles, OCR can detect sensitive data within images your users upload.
1932

2033
OCR supports scanning `.jpg`/`.jpeg` and `.png` files between 4 KB and 1 MB in size. Text is encoded in UTF-8 format, including support for non-Latin characters.
2134

22-
## AI context analysis <Badge text="Beta" variant="caution" size="small" /> {/* ai-context-analysis */}
35+
### AI context analysis <Badge text="Beta" variant="caution" size="small" /> {/* ai-context-analysis */}
36+
37+
{/* TODO: set up redirects for this section based on live docs */}
2338

2439
:::note
2540
AI context analysis only supports Gateway HTTP and HTTPS traffic.
2641
:::
2742

28-
AI context analysis uses machine learning to analyze and adjust the confidence in a detection based on its surrounding context. DLP will log any matches that are above your detection threshold.
43+
AI context analysis uses machine learning to analyze and adjust the confidence in a detection based on its surrounding context. DLP will log any matches that are above your confidence threshold.
2944

3045
DLP submits the context as an AI text embedding vector to [Cloudflare Workers AI](/workers-ai/). Vectors are stored in a database bucket for up to six months, along with relevant metadata from the HTTP request including the URL, HTTP method, matching DLP profile, and Gateway request ID.
3146

3247
To train the model, you need to [report false and true positives](/cloudflare-one/policies/data-loss-prevention/dlp-policies/logging-options/#report-true-and-false-positive-to-ai-context-analysis) in your DLP payload logs.
3348

34-
## Confidence thresholds
49+
### Confidence thresholds
3550

3651
Confidence thresholds indicate how confident Cloudflare DLP is in a DLP detection. DLP determines the confidence by inspecting the content for proximity keywords around the detection.
3752

@@ -43,11 +58,11 @@ To change the confidence threshold of a DLP profile:
4358

4459
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP profiles**.
4560
2. Select the profile, then select **Edit**.
46-
3. In **Advanced settings** > **Confidence Threshold**, choose a new confidence threshold from the dropdown menu.
61+
3. In **Settings** > **Confidence threshold**, choose a new confidence threshold from the dropdown menu.
4762

4863
Setting the confidence to Low will also consider Medium and High confidence detections as matches. Setting the confidence to Medium or High will filter out lower confidence detections.
4964

50-
### Gateway detections
65+
#### Gateway detections
5166

5267
For inline detections in Gateway, to display Low and Medium confidence detections but block High confidence detections, Cloudflare recommends creating two HTTP policies. The first policy should use a Low confidence DLP profile with an Allow action. The second policy should use a High confidence DLP profile with a Block action. For example:
5368

Lines changed: 6 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,31 @@
11
---
22
{}
3-
43
---
54

6-
import { Details } from "~/components"
5+
import { Details } from "~/components";
76

8-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP Profiles**.
7+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP profiles**.
98

109
2. Select **Create profile**.
1110

1211
3. Enter a name and optional description for the profile.
1312

1413
4. Add custom or existing detection entries.
1514

16-
1715
<Details header="Add a custom entry">
1816

1917
1. Select **Add custom entry** and give it a name.
2018

2119
2. In **Value**, enter a regular expression (or regex) that defines the text pattern you want to detect. For example, `test\d\d` will detect the word `test` followed by two digits.
2220

23-
* Regular expressions are written in Rust. We recommend validating your regex with [Rustexp](https://rustexp.lpil.uk/).
24-
* DLP detects UTF-8 characters, which can be up to 4 bytes each. Custom text pattern detections are limited to 1024 bytes in length.
25-
* DLP does not support regular expressions with `+` or `*` operators because they are prone to exceeding the length limit. For example, the regex pattern `a+` can detect an infinite number of `a` characters. We recommend using `a{min,max}` instead, such as `a{1,1024}`.
21+
- Regular expressions are written in Rust. We recommend validating your regex with [Rustexp](https://rustexp.lpil.uk/).
22+
- DLP detects UTF-8 characters, which can be up to 4 bytes each. Custom text pattern detections are limited to 1024 bytes in length.
23+
- DLP does not support regular expressions with `+` or `*` operators because they are prone to exceeding the length limit. For example, the regex pattern `a+` can detect an infinite number of `a` characters. We recommend using `a{min,max}` instead, such as `a{1,1024}`.
2624

2725
3. To save the detection entry, select **Done**.
2826

29-
3027
</Details>
3128

32-
3329
<Details header="Add existing entries">
3430

3531
Existing entries include [predefined detection entries](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/) and [DLP datasets](/cloudflare-one/policies/data-loss-prevention/datasets/).
@@ -38,9 +34,8 @@ import { Details } from "~/components"
3834
2. Choose which entries you want to add, then select **Confirm**.
3935
3. To save the detection entry, select **Done**.
4036

41-
4237
</Details>
4338

44-
5. (Optional) Configure [**Advanced settings**](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/) for the profile.
39+
5. (Optional) Configure [**profile settings**](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/) for the profile.
4540

4641
6. Select **Save profile**.

src/content/partials/cloudflare-one/data-loss-prevention/predefined-profile.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
{}
33
---
44

5-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP Profiles**.
5+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP profiles**.
66
2. Choose a [predefined profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/) and select **Configure**.
77
3. Enable one or more **Detection entries** according to your preferences. The DLP Profile matches using the OR logical operator — if multiple entries are enabled, your data needs to match only one of the entries.
88
4. Select **Save profile**.

0 commit comments

Comments
 (0)