Skip to content

Commit 4fb3214

Browse files
committed
ui updates
1 parent ebf8824 commit 4fb3214

File tree

6 files changed

+23
-23
lines changed

6 files changed

+23
-23
lines changed

src/content/docs/cloudflare-one/data-loss-prevention/detection-entries.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,8 @@ To select which Exact Data Match columns to use, you will need to [reupload any
5252
<Details header="Upload an Exact Data Match dataset">
5353

5454
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **Detection entries**.
55-
2. Go to **Datasets**.
56-
3. Select **Add a dataset**. In **Exact Data Match (EDM)**, choose **Select**.
55+
2. From the **Datasets** tab, select **Add a dataset**.
56+
3. Select **Exact Data Match (EDM)**.
5757
4. Upload your dataset file. Select **Next**.
5858
5. Review and choose the detected columns you want to include. Select **Next**.
5959
6. Name your dataset. Optionally, add a description. Select **Next**.
@@ -66,8 +66,8 @@ DLP will encrypt your dataset and save its hash.
6666
<Details header="Upload a Custom Wordlist dataset">
6767

6868
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **Detection entries**.
69-
2. Go to **Datasets**.
70-
3. Select **Add a dataset**. In **Custom Wordlist (CWL)**, choose **Select**.
69+
2. From the **Datasets** tab, select **Add a dataset**.
70+
3. Select **Custom Wordlist (CWL)**.
7171
4. Name your dataset. Optionally, add a description.
7272
5. (Optional) In **Settings**, turn on **Enforce case sensitivity** to require matched values to contain exact capitalization.
7373
6. In **Upload file**, choose your dataset file.

src/content/docs/cloudflare-one/remote-browser-isolation/setup/non-identity.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,6 @@ If you want to apply Isolate policies based on user identity, you will need to e
1919
- Configure your browser to forward traffic to a Gateway proxy endpoint with [PAC files](/cloudflare-one/team-and-resources/devices/agentless/pac-files/).
2020
- Connect your enterprise site router to Gateway with the [anycast GRE or IPsec tunnel on-ramp to Magic WAN](/magic-wan/zero-trust/cloudflare-gateway/).
2121
3. Enable non-identity browser isolation:
22-
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Browser isolation** > *Browser isolation settings**.
23-
2. Turn on **Non-identity on-ramp support**.
22+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Browser isolation** > **Browser isolation settings**.
23+
2. Turn on **Allow isolated HTTP traffic when user identity is unknown**.
2424
4. Build a non-identity [HTTP policy](/cloudflare-one/remote-browser-isolation/isolation-policies/) to isolate websites in a remote browser.

src/content/docs/cloudflare-one/reusable-components/posture-checks/warp-client-checks/require-warp.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ Cloudflare One enables you to restrict access to your applications to devices ru
3131

3232
## 1. Enable the WARP check
3333

34-
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
35-
2. Ensure that **Proxy** is enabled.
34+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Traffic policies** > **Traffic settings**.
35+
2. Ensure that *Allow Secure Web Gateway to proxy traffic** is enabled.
3636
3. Go to **Reusable components** > **Posture checks**.
3737
4. In **WARP client checks**, select **Add a check**.
3838
5. Select **WARP**, then select **Save**.

src/content/docs/cloudflare-one/team-and-resources/devices/warp/troubleshooting/troubleshooting-guide.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ The [WARP Diagnostics Analyzer](/cloudflare-one/team-and-resources/devices/warp/
129129

130130
After you run a [DEX remote capture](#option-a-collect-logs-via-the-cloudflare-dashboard) for WARP diagnostics:
131131

132-
1. Go to **DEX** > **Remote captures**.
132+
1. Go to **Insights** > **Digital experience** and select the **Diagnotics** tab.
133133
2. Find your capture in the list of captures.
134134
3. Select the three-dot icon next to **Status** > select **View WARP Diag** to generate an AI summary.
135135

src/content/docs/cloudflare-one/traffic-policies/http-policies/file-sandboxing.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,8 @@ flowchart TD
4949

5050
To begin quarantining downloaded files, turn on file sandboxing:
5151

52-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
53-
2. In **Firewall**, turn on **File sandboxing**.
52+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Traffic policies** > **Traffic settings**.
53+
2. Turn on **File sandboxing**.
5454
3. (Optional) To block requests containing [non-scannable files](#non-scannable-files), select **Block requests for files that cannot be scanned**.
5555

5656
You can now create [Quarantine HTTP policies](/cloudflare-one/traffic-policies/http-policies/#quarantine) to determine what files to scan in the sandbox.

src/content/glossary/cloudflare-one.yaml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ productName: Cloudflare One
33
entries:
44
- term: App Launcher
55
general_definition: |-
6-
the App Launcher portal provides end users with a single dashboard to open applications secured by Cloudflare Zero Trust.
6+
the App Launcher portal provides end users with a single dashboard to open applications secured by Cloudflare One.
77
88
- term: application
99
general_definition: |-
10-
the resource protected by Cloudflare Zero Trust, which can be a subdomain, a path, or a SaaS application.
10+
the resource protected by Cloudflare One, which can be a subdomain, a path, or a SaaS application.
1111
1212
- term: application token
1313
general_definition: |-
@@ -19,7 +19,7 @@ entries:
1919
2020
- term: CGNAT IP
2121
general_definition: |-
22-
a unique, virtual IP address assigned to each WARP device from the `100.96.0.0/12` range. You can view the CGNAT IP for a device in **My Team** > **Devices** > **Virtual IPv4/IPv6**.
22+
a unique, virtual IP address assigned to each WARP device from the `100.96.0.0/12` range. You can view the CGNAT IP for a device in **Team & Resources** > **Devices** > **Virtual IPv4/IPv6**.
2323
2424
- term: cloudflared
2525
general_definition: |-
@@ -47,7 +47,7 @@ entries:
4747
4848
- term: Cloudflare DEX
4949
general_definition: |-
50-
Cloudflare Digital Experience Monitoring (DEX) provides visibility into device, network, and application performance across your Zero Trust organization.
50+
Cloudflare Digital Experience Monitoring (DEX) provides visibility into device, network, and application performance across your Cloudflare One organization.
5151
5252
- term: Cloudflare Gateway
5353
general_definition: |-
@@ -91,7 +91,7 @@ entries:
9191

9292
- term: DoH subdomain
9393
general_definition: |-
94-
a unique DoH subdomain for each DNS location in Cloudflare Zero Trust used in WARP client settings.
94+
a unique DoH subdomain for each DNS location in Cloudflare One used in WARP client settings.
9595
9696
- term: DNS location
9797
general_definition: |-
@@ -101,7 +101,7 @@ entries:
101101

102102
- term: fleet
103103
general_definition: |-
104-
a fleet is a collection of user devices. All devices in a fleet have WARP installed and are connected to a [Cloudflare Zero Trust organization](/cloudflare-one/setup/#create-a-zero-trust-organization).
104+
a fleet is a collection of user devices. All devices in a fleet have WARP installed and are connected to a [Cloudflare One organization](/cloudflare-one/setup/#create-a-cloudflare-one-organization).
105105
106106
- term: identity provider
107107
general_definition: |-
@@ -133,7 +133,7 @@ entries:
133133
134134
- term: MCP server portal
135135
general_definition: |-
136-
a web application in Cloudflare Zero Trust that serves as a gateway to multiple MCP servers.
136+
a web application in Cloudflare One that serves as a gateway to multiple MCP servers.
137137
138138
- term: MCP server tool
139139
general_definition: |-
@@ -169,7 +169,7 @@ entries:
169169
170170
- term: remotely-managed tunnel
171171
general_definition: |-
172-
a Cloudflare Tunnel that was created in Zero Trust under **Networks** > **Tunnels**. Tunnel configuration is stored in Cloudflare, which allows you to manage the tunnel from the dashboard or using the API.
172+
a Cloudflare Tunnel whose configuration is stored on Cloudflare rather than on your local machine. You can manage the tunnel in the dashboard under **Networks** > **Connectors** or by using the API.
173173
174174
- term: RDP
175175
general_definition: |-
@@ -241,11 +241,11 @@ entries:
241241
242242
- term: team domain
243243
general_definition: |-
244-
a unique subdomain assigned to your Cloudflare account (for example, `<your-team-name>.cloudflareaccess.com`), where users will find the apps you have secured behind Cloudflare Zero Trust.
244+
a unique subdomain assigned to your Cloudflare account (for example, `<your-team-name>.cloudflareaccess.com`), where users will find the apps you have secured behind Cloudflare One.
245245
246246
- term: team name
247247
general_definition: |-
248-
the customizable portion of your team domain (`<your-team-name>.cloudflareaccess.com`). You can view your team name in Zero Trust under **Settings** > **Custom Pages**.
248+
the customizable portion of your team domain (`<your-team-name>.cloudflareaccess.com`). You can view your team name in Cloudflare One under **Settings**.
249249
250250
- term: Terraform
251251
general_definition: |-
@@ -259,11 +259,11 @@ entries:
259259
260260
- term: User risk score
261261
general_definition: |-
262-
Cloudflare Zero Trust user risk score ranks the likelihood of a user to introduce risk to your organization's systems and data based on the detection of security risk behaviors. Risk scores add user and entity behavior analytics (UEBA) to the Zero Trust platform.
262+
User risk score ranks the likelihood of a user to introduce risk to your organization's systems and data based on the detection of security risk behaviors. Risk scores add user and entity behavior analytics (UEBA) to the Cloudflare One platform.
263263
264264
- term: User risk score level
265265
general_definition: |-
266-
Cloudflare Zero Trust assigns a risk score of Low, Medium or High based on detections of users' activities, posture, and settings. A user's risk score is equal to the highest-level risk behavior they trigger.
266+
Cloudflare One assigns a risk score of Low, Medium or High based on detections of users' activities, posture, and settings. A user's risk score is equal to the highest-level risk behavior they trigger.
267267
268268
- term: Virtual network
269269
general_definition: |-

0 commit comments

Comments
 (0)