You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Bypass HTTP inspection for applications that use embedded certificates. This will help avoid any certificate pinning errors that may arise from an initial rollout.
15
15
@@ -18,9 +18,7 @@ Bypass HTTP inspection for applications that use embedded certificates. This wil
@@ -110,15 +94,11 @@ Security teams often need to perform threat analysis or malware testing that cou
110
94
| Destination IP | not in list |_Quarantined-Users-IPAllowlist_| And | Block |
111
95
| User Group Names | in |_Quarantined Users_|||
112
96
113
-
</Details>
114
-
115
-
<Detailsheader="All-HTTP-Domain-Isolate">
97
+
## All-HTTP-Domain-Isolate
116
98
117
99
Isolate high risk domains or create a custom list of known risky domains to avoid data exfiltration or malware infection. Ideally, your incident response teams can update the blocklist with an [API automation](/security-center/intel-apis/) to provide real-time threat protection.
Copy file name to clipboardExpand all lines: src/content/docs/learning-paths/secure-internet-traffic/build-network-policies/recommended-network-policies.mdx
Restrict access for devices where baseline posture checks have not passed. If posture checks are integrated with service providers such as Crowdstrike or Intune via the API, this policy dynamically blocks access for devices that do not meet predetermined security requirements.
30
28
@@ -37,9 +35,7 @@ Restrict access for devices where baseline posture checks have not passed. If po
37
35
38
36
You can add a number of WARP client device posture checks as needed, such as [Disk encryption](/cloudflare-one/identity/devices/warp-client-checks/disk-encryption/) and [Domain joined](/cloudflare-one/identity/devices/warp-client-checks/domain-joined/). For more information on device posture checks, refer to [Enforce device posture](/cloudflare-one/identity/devices/).
Allow HTTPS access for user groups. For example, the following policy gives finance users access to any known financial applications:
45
41
@@ -48,9 +44,7 @@ Allow HTTPS access for user groups. For example, the following policy gives fina
48
44
| Destination IP | in list |_Finance Servers_| And | Allow |
49
45
| User Group Names | in |_Finance Users_|||
50
46
51
-
</Details>
52
-
53
-
<Detailsheader="All-NET-Internet-Blocklist">
47
+
## All-NET-Internet-Blocklist
54
48
55
49
Block traffic to destination IPs, <GlossaryTooltipterm="Server Name Indication (SNI)">SNIs</GlossaryTooltip>, and domain SNIs that are malicious or pose a threat to your organization.
56
50
@@ -66,9 +60,7 @@ Block traffic to destination IPs, <GlossaryTooltip term="Server Name Indication
66
60
The **Detected Protocol** selector is only available for Enterprise users. For more information, refer to [Protocol detection](/cloudflare-one/policies/gateway/network-policies/protocol-detection/).
67
61
:::
68
62
69
-
</Details>
70
-
71
-
<Detailsheader="All-NET-SSH-Internet-Allowlist">
63
+
## All-NET-SSH-Internet-Allowlist
72
64
73
65
Allow SSH traffic to specific endpoints on the Internet for specific users. You can create a similar policy for other non-web endpoints that required access.
74
66
@@ -81,9 +73,7 @@ Optionally, you can include a selector to filter by source IP or IdP group.
Block all non-web traffic towards the Internet. By using the **Detected Protocol** selector, you will ensure alternative ports for HTTP and HTTPS are allowed.
89
79
@@ -92,14 +82,10 @@ Block all non-web traffic towards the Internet. By using the **Detected Protocol
92
82
| Destination IP | not in list |_InternalNetwork_| And | Block |
Implicitly deny all of your internal IP ranges included in a list. We recommend you place this policy at the [bottom of your policy list](/learning-paths/secure-internet-traffic/understand-policies/order-of-enforcement/#order-of-precedence) to ensure you explicitly approve traffic defined in the above policies.
0 commit comments