Skip to content

Commit 4168caa

Browse files
[CF1] Insights restructure (#26139)
* [CF1] Analytics overview page restructure * reorganize user risk score and user logs documentation * period * better index description * broken links
1 parent d85128c commit 4168caa

File tree

23 files changed

+28
-26
lines changed

23 files changed

+28
-26
lines changed

public/__redirects

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2146,7 +2146,7 @@
21462146
/cloudflare-one/analytics/private-network-discovery/ /cloudflare-one/insights/analytics/shadow-it-discovery/#private-network-origins 301
21472147
/cloudflare-one/analytics/access/ /cloudflare-one/insights/analytics/access/ 301
21482148
/cloudflare-one/analytics/gateway/ /cloudflare-one/insights/analytics/gateway/ 301
2149-
/cloudflare-one/analytics/users/ /cloudflare-one/insights/logs/users/ 301
2149+
/cloudflare-one/analytics/users/ /cloudflare-one/team-and-resources/users/users/ 301
21502150
/cloudflare-one/api-terraform/access-api-examples/azure-group/ /cloudflare-one/api-terraform/access-api-examples/entra-group/ 301
21512151
/cloudflare-one/api-terraform/gateway-api-examples/ /cloudflare-one/policies/gateway/ 301
21522152
/cloudflare-one/api-terraform/gateway-api-examples/dns-policy/ /cloudflare-one/policies/gateway/dns-policies/common-policies/ 301
@@ -2252,7 +2252,7 @@
22522252
/cloudflare-one/identity/idp-integration/ping-saml/ /cloudflare-one/identity/idp-integration/pingfederate-saml/ 301
22532253
/cloudflare-one/identity/idp-integration/saml-okta/ /cloudflare-one/identity/idp-integration/okta-saml/ 301
22542254
/cloudflare-one/identity/login-page/ /cloudflare-one/applications/login-page/ 301
2255-
/cloudflare-one/insights/analytics/ /cloudflare-one/insights/analytics/analytics-overview/ 301
2255+
/cloudflare-one/insights/analytics/ /cloudflare-one/insights/analytics-overview/ 301
22562256
/cloudflare-one/insights/dex/fleet-status/ /cloudflare-one/insights/dex/monitoring/ 301
22572257
/cloudflare-one/insights/logs/logpush/rdata/ /cloudflare-one/insights/logs/logpush/#parse-logpush-logs 301
22582258
/cloudflare-one/applications/custom-pages/ /cloudflare-one/applications/ 301
@@ -2423,6 +2423,9 @@
24232423
/cloudflare-one/applications/casb/ /cloudflare-one/cloud-and-saas-findings/ 301
24242424
/cloudflare-one/applications/casb/manage-findings/ /cloudflare-one/cloud-and-saas-findings/manage-findings/ 301
24252425
/cloudflare-one/applications/casb/casb-dlp/ /cloudflare-one/cloud-and-saas-findings/casb-dlp/ 301
2426+
/cloudflare-one/insights/analytics/analytics-overview/ /cloudflare-one/insights/analytics-overview/ 301
2427+
/cloudflare-one/insights/risk-score/ /cloudflare-one/team-and-resources/users/risk-score/ 301
2428+
/cloudflare-one/insights/logs/users/ /cloudflare-one/team-and-resources/users/users/ 301
24262429

24272430
# Email Security new revamp
24282431
/cloudflare-one/email-security/email-monitoring/download-report/ /cloudflare-one/email-security/monitoring/download-report/ 301

src/content/changelog/risk-score/2024-06-17-okta-risk-exchange.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@ date: 2024-06-17
66

77
import { Render } from "~/components";
88

9-
Beyond the controls in [Zero Trust](/cloudflare-one/), you can now [exchange user risk scores](/cloudflare-one/insights/risk-score/#send-risk-score-to-okta) with Okta to inform SSO-level policies.
9+
Beyond the controls in [Zero Trust](/cloudflare-one/), you can now [exchange user risk scores](/cloudflare-one/team-and-resources/users/risk-score/#send-risk-score-to-okta) with Okta to inform SSO-level policies.
1010

1111
<Render file="send-risk-scores-okta" product="cloudflare-one" />

src/content/docs/cloudflare-one/access-controls/applications/http-apps/saas-apps/generic-saml-saas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ To send additional SAML attributes to your SaaS application, configure the follo
105105

106106
### JSONata transforms
107107

108-
In **Advanced settings** > **Transformation**, you can enter a [JSONata](https://jsonata.org/) script that modifies a copy of the [User Registry identity](/cloudflare-one/insights/logs/users/). This is useful for setting default values, excluding email addresses, or ensuring usernames meet arbitrary criteria. Access will send the modified user identity to the SaaS application as SAML attributes.
108+
In **Advanced settings** > **Transformation**, you can enter a [JSONata](https://jsonata.org/) script that modifies a copy of the [User Registry identity](/cloudflare-one/team-and-resources/users/users/). This is useful for setting default values, excluding email addresses, or ensuring usernames meet arbitrary criteria. Access will send the modified user identity to the SaaS application as SAML attributes.
109109

110110
:::note
111111
JSONata transformations are not compatible with [SAML attribute statements](#saml-attribute-statements). JSONata transformations will override any specified SAML attributes.

src/content/docs/cloudflare-one/changelog/risk-score.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ import { ProductChangelog, Render } from "~/components";
1717

1818
**SentinelOne signal ingestion**
1919

20-
You can now configure a [predefined risk behavior](/cloudflare-one/insights/risk-score/#predefined-risk-behaviors) to evaluate user risk score using device posture attributes from the [SentinelOne integration](/cloudflare-one/integrations/service-providers/sentinelone/).
20+
You can now configure a [predefined risk behavior](/cloudflare-one/team-and-resources/users/risk-score/#predefined-risk-behaviors) to evaluate user risk score using device posture attributes from the [SentinelOne integration](/cloudflare-one/integrations/service-providers/sentinelone/).

src/content/docs/cloudflare-one/insights/analytics/analytics-overview.mdx renamed to src/content/docs/cloudflare-one/insights/analytics-overview.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: reference
33
title: Analytics overview
44
sidebar:
5-
order: 2
5+
order: 1
66
---
77

88
The Cloudflare One Analytics overview provides a dashboard that reports on how Cloudflare One is protecting your organization and networks.
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: navigation
3-
title: Analytics
3+
title: Dashboards
44
sidebar:
55
order: 1
66
group:
@@ -9,6 +9,6 @@ sidebar:
99

1010
import { DirectoryListing, Render } from "~/components";
1111

12-
[Zero Trust](https://one.dash.cloudflare.com/) analytics provide a summary of your applications and traffic.
12+
[Cloudflare One](https://one.dash.cloudflare.com/) provides a catalog of saved analytics views for reporting and investigation.
1313

1414
<DirectoryListing />

src/content/docs/cloudflare-one/insights/dex/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: navigation
3-
title: DEX
3+
title: Digital experience
44
sidebar:
55
order: 1
66
---

src/content/docs/cloudflare-one/insights/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,6 @@ sidebar:
99

1010
import { DirectoryListing } from "~/components";
1111

12-
Cloudflare Zero Trust gives you comprehensive and in-depth visibility into your network. Whether you need data on network usage, on security threats blocked by Cloudflare Zero Trust, or on how many users have logged in to your applications this month, Zero Trust provides you with the right tools for the job.
12+
Cloudflare One provides observability tools to monitor your environment. View traffic metrics for Access applications and Gateway policies in Dashboards, monitor endpoint and network performance with Digital Experience Monitoring (DEX), and analyze logs for security events.
1313

1414
<DirectoryListing />

src/content/docs/cloudflare-one/insights/logs/scim-logs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ SCIM activity logs allow administrators to audit how [SCIM provisioning](/cloudf
1414

1515
For an overview of SCIM events across all users, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **SCIM provisioning**. This page lists the inbound SCIM requests from all identity providers configured with SCIM. You can select an individual request to view more details about the SCIM operation.
1616

17-
To investigate how SCIM events impacted a specific user, go to their [User Registry identity](/cloudflare-one/insights/logs/users/).
17+
To investigate how SCIM events impacted a specific user, go to their [User Registry identity](/cloudflare-one/team-and-resources/users/users/).
1818

1919
<Render file="access/scim-requires-login" product="cloudflare-one" />
2020

src/content/docs/cloudflare-one/integrations/identity-providers/okta.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ import { Render } from "~/components";
88

99
Okta provides cloud software that helps companies manage and secure user authentication to modern applications, and helps developers build identity controls into applications, website web services, and devices. You can integrate Okta with Cloudflare One and build rules based on user identity and group membership. Cloudflare One supports Okta integrations using either the OIDC (default) or [SAML](/cloudflare-one/integrations/identity-providers/okta-saml/) protocol.
1010

11-
Additionally, you can configure Okta to use risk information from Cloudflare One [user risk scores](/cloudflare-one/insights/risk-score/) to create SSO-level policies. For more information, refer to [Send risk score to Okta](/cloudflare-one/insights/risk-score/#send-risk-score-to-okta).
11+
Additionally, you can configure Okta to use risk information from Cloudflare One [user risk scores](/cloudflare-one/team-and-resources/users/risk-score/) to create SSO-level policies. For more information, refer to [Send risk score to Okta](/cloudflare-one/team-and-resources/users/risk-score/#send-risk-score-to-okta).
1212

1313
## Prerequisites
1414

0 commit comments

Comments
 (0)