Skip to content

Commit 3cf4b2f

Browse files
committed
Remove Details tags from all recommended policy pages
1 parent a4d7333 commit 3cf4b2f

File tree

3 files changed

+20
-54
lines changed

3 files changed

+20
-54
lines changed

src/content/docs/learning-paths/secure-internet-traffic/build-dns-policies/recommended-dns-policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 3
66
---
77

8-
import { Details, Render, Tabs, TabItem } from "~/components";
8+
import { Render, Tabs, TabItem } from "~/components";
99

1010
We recommend you add the following DNS policies to build an Internet and SaaS app security strategy for your organization.
1111

src/content/docs/learning-paths/secure-internet-traffic/build-http-policies/recommended-http-policies.mdx

Lines changed: 11 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ sidebar:
55
order: 5
66
---
77

8-
import { Details, Render } from "~/components";
8+
import { Render } from "~/components";
99

1010
We recommend you add the following HTTP policies to build an Internet and SaaS app security strategy for your organization.
1111

12-
<Details header="All-HTTP-Application-InspectBypass">
12+
## All-HTTP-Application-InspectBypass
1313

1414
Bypass HTTP inspection for applications that use embedded certificates. This will help avoid any certificate pinning errors that may arise from an initial rollout.
1515

@@ -18,9 +18,7 @@ Bypass HTTP inspection for applications that use embedded certificates. This wil
1818
product="cloudflare-one"
1919
/>
2020

21-
</Details>
22-
23-
<Details header="Android-HTTP-Application-InspectionBypass">
21+
## Android-HTTP-Application-InspectionBypass
2422

2523
Bypass HTTPS inspection for Android applications (such as Google Drive) that use certificate pinning, which is incompatible with Gateway inspection.
2624

@@ -29,9 +27,7 @@ Bypass HTTPS inspection for Android applications (such as Google Drive) that use
2927
| Application | in | _Google Drive_ | And | Do Not Inspect |
3028
| Passed Device Posture Checks | in | _OS Version Android (OS version)_ | | |
3129

32-
</Details>
33-
34-
<Details header="All-HTTP-Domain-Inspection-Bypass">
30+
## All-HTTP-Domain-Inspection-Bypass
3531

3632
Bypass HTTP inspection for a custom list of domains identified as incompatible with TLS inspection.
3733

@@ -40,19 +36,15 @@ Bypass HTTP inspection for a custom list of domains identified as incompatible w
4036
| Domain | in list | _DomainInspectionBypass_ | Or | Do Not Inspect |
4137
| Domain | in list | _Known Domains_ | | |
4238

43-
</Details>
44-
45-
<Details header="All-HTTP-SecurityRisks-Blocklist">
39+
## All-HTTP-SecurityRisks-Blocklist
4640

4741
<Render file="zero-trust/blocklist-security-categories" />
4842

4943
| Selector | Operator | Value | Action |
5044
| -------------- | -------- | -------------------- | ------ |
5145
| Security Risks | in | _All security risks_ | Block |
5246

53-
</Details>
54-
55-
<Details header="All-HTTP-ContentCategories-Blocklist">
47+
## All-HTTP-ContentCategories-Blocklist
5648

5749
<Render
5850
file="zero-trust/content-categories-description"
@@ -64,9 +56,7 @@ Bypass HTTP inspection for a custom list of domains identified as incompatible w
6456
product="cloudflare-one"
6557
/>
6658

67-
</Details>
68-
69-
<Details header="All-HTTP-DomainHost-Blocklist">
59+
## All-HTTP-DomainHost-Blocklist
7060

7161
<Render file="zero-trust/blocklist-domain-host" params={{ one: "HTTP" }} />
7262

@@ -76,9 +66,7 @@ Bypass HTTP inspection for a custom list of domains identified as incompatible w
7666
| Host | in list | _Host Blocklist_ | Or | |
7767
| Host | matches regex | `.*example\.com` | | |
7868

79-
</Details>
80-
81-
<Details header="All-HTTP-Application-Blocklist">
69+
## All-HTTP-Application-Blocklist
8270

8371
<Render file="zero-trust/blocklist-application" />
8472

@@ -87,9 +75,7 @@ Bypass HTTP inspection for a custom list of domains identified as incompatible w
8775
product="cloudflare-one"
8876
/>
8977

90-
</Details>
91-
92-
<Details header="PrivilegedUsers-HTTP-Any-Isolate">
78+
## PrivilegedUsers-HTTP-Any-Isolate
9379

9480
Isolate traffic for privileged users who regularly access critical systems or execute actions such as threat analysis and malware testing.
9581

@@ -99,9 +85,7 @@ Security teams often need to perform threat analysis or malware testing that cou
9985
| ---------------- | -------- | ------------------ | ------- |
10086
| User Group Names | in | _Privileged Users_ | Isolate |
10187

102-
</Details>
103-
104-
<Details header="Quarantined-Users-HTTP-Restricted-Access">
88+
## Quarantined-Users-HTTP-Restricted-Access
10589

10690
<Render file="zero-trust/blocklist-restricted-users" />
10791

@@ -110,15 +94,11 @@ Security teams often need to perform threat analysis or malware testing that cou
11094
| Destination IP | not in list | _Quarantined-Users-IPAllowlist_ | And | Block |
11195
| User Group Names | in | _Quarantined Users_ | | |
11296

113-
</Details>
114-
115-
<Details header="All-HTTP-Domain-Isolate">
97+
## All-HTTP-Domain-Isolate
11698

11799
Isolate high risk domains or create a custom list of known risky domains to avoid data exfiltration or malware infection. Ideally, your incident response teams can update the blocklist with an [API automation](/security-center/intel-apis/) to provide real-time threat protection.
118100

119101
| Selector | Operator | Value | Logic | Action |
120102
| ------------------ | -------- | ---------------------------------- | ----- | ------- |
121103
| Content Categories | in | _New Domain_, _Newly Seen Domains_ | Or | Isolate |
122104
| Domain | in list | _Domain Isolation_ | | |
123-
124-
</Details>

src/content/docs/learning-paths/secure-internet-traffic/build-network-policies/recommended-network-policies.mdx

Lines changed: 8 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ sidebar:
55
order: 2
66
---
77

8-
import { Details, GlossaryTooltip, Render } from "~/components";
8+
import { GlossaryTooltip, Render } from "~/components";
99

1010
We recommend you add the following network policies to build an Internet and SaaS app security strategy for your organization.
1111

1212
For more information on building network policies, refer to [Network policies](/cloudflare-one/policies/gateway/network-policies/).
1313

14-
<Details header="Quarantined-Users-NET-Restricted-Access">
14+
## Quarantined-Users-NET-Restricted-Access
1515

1616
<Render file="zero-trust/blocklist-restricted-users" />
1717

@@ -22,9 +22,7 @@ For more information on building network policies, refer to [Network policies](/
2222
| Domain SNI | not in list | _Quarantined-Users-DomainAllowlist_ | And | |
2323
| User Group Names | in | _Quarantined Users_ | | |
2424

25-
</Details>
26-
27-
<Details header="Posture-Fail-NET-Restricted-Access">
25+
## Posture-Fail-NET-Restricted-Access
2826

2927
Restrict access for devices where baseline posture checks have not passed. If posture checks are integrated with service providers such as Crowdstrike or Intune via the API, this policy dynamically blocks access for devices that do not meet predetermined security requirements.
3028

@@ -37,9 +35,7 @@ Restrict access for devices where baseline posture checks have not passed. If po
3735

3836
You can add a number of WARP client device posture checks as needed, such as [Disk encryption](/cloudflare-one/identity/devices/warp-client-checks/disk-encryption/) and [Domain joined](/cloudflare-one/identity/devices/warp-client-checks/domain-joined/). For more information on device posture checks, refer to [Enforce device posture](/cloudflare-one/identity/devices/).
3937

40-
</Details>
41-
42-
<Details header="FinanceUsers-NET-HTTPS-FinanceServers (example)">
38+
## FinanceUsers-NET-HTTPS-FinanceServers (example)
4339

4440
Allow HTTPS access for user groups. For example, the following policy gives finance users access to any known financial applications:
4541

@@ -48,9 +44,7 @@ Allow HTTPS access for user groups. For example, the following policy gives fina
4844
| Destination IP | in list | _Finance Servers_ | And | Allow |
4945
| User Group Names | in | _Finance Users_ | | |
5046

51-
</Details>
52-
53-
<Details header="All-NET-Internet-Blocklist">
47+
## All-NET-Internet-Blocklist
5448

5549
Block traffic to destination IPs, <GlossaryTooltip term="Server Name Indication (SNI)">SNIs</GlossaryTooltip>, and domain SNIs that are malicious or pose a threat to your organization.
5650

@@ -66,9 +60,7 @@ Block traffic to destination IPs, <GlossaryTooltip term="Server Name Indication
6660
The **Detected Protocol** selector is only available for Enterprise users. For more information, refer to [Protocol detection](/cloudflare-one/policies/gateway/network-policies/protocol-detection/).
6761
:::
6862

69-
</Details>
70-
71-
<Details header="All-NET-SSH-Internet-Allowlist">
63+
## All-NET-SSH-Internet-Allowlist
7264

7365
Allow SSH traffic to specific endpoints on the Internet for specific users. You can create a similar policy for other non-web endpoints that required access.
7466

@@ -81,9 +73,7 @@ Optionally, you can include a selector to filter by source IP or IdP group.
8173
| Detected Protocol | is | _SSH_ | And | |
8274
| User Group Names | in | _SSH-Allowed-Users_ | | |
8375

84-
</Details>
85-
86-
<Details header="All-NET-NO-HTTP-HTTPS-Internet-Deny">
76+
## All-NET-NO-HTTP-HTTPS-Internet-Deny
8777

8878
Block all non-web traffic towards the Internet. By using the **Detected Protocol** selector, you will ensure alternative ports for HTTP and HTTPS are allowed.
8979

@@ -92,14 +82,10 @@ Block all non-web traffic towards the Internet. By using the **Detected Protocol
9282
| Destination IP | not in list | _InternalNetwork_ | And | Block |
9383
| Detected Protocol | not in | _HTTP_, _HTTP2_ | | |
9484

95-
</Details>
96-
97-
<Details header="All-NET-InternalNetwork-ImplicitDeny">
85+
## All-NET-InternalNetwork-ImplicitDeny
9886

9987
Implicitly deny all of your internal IP ranges included in a list. We recommend you place this policy at the [bottom of your policy list](/learning-paths/secure-internet-traffic/understand-policies/order-of-enforcement/#order-of-precedence) to ensure you explicitly approve traffic defined in the above policies.
10088

10189
| Selector | Operator | Value | Action |
10290
| -------------- | -------- | ---------------------- | ------ |
10391
| Destination IP | in list | _Internal Network IPs_ | Block |
104-
105-
</Details>

0 commit comments

Comments
 (0)