Skip to content

Commit 5161730

Browse files
authored
[WAF] Use DashButton in zone-level instructions (#25895)
1 parent 0711bb2 commit 5161730

31 files changed

+290
-142
lines changed

src/content/docs/waf/analytics/security-analytics.mdx

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,10 @@ To use Security Analytics:
4343
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/) and select your account.
4444

4545
2. Go to the account or zone/domain dashboard:
46-
- For the zone/domain dashboard, select your domain and go to **Security** > **Analytics**.
46+
- For the zone/domain dashboard, go to the **Analytics** page.
47+
48+
<DashButton url="/?to=/:account/:zone/security/analytics" />
49+
4750
- For the account dashboard, go to the **Security Analytics** page.
4851

4952
<DashButton url="/?to=/:account/security-center/analytics" />

src/content/docs/waf/analytics/security-events.mdx

Lines changed: 21 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,14 @@ sidebar:
55
order: 2
66
---
77

8-
import { FeatureTable, GlossaryTooltip, Steps, DashButton } from "~/components";
8+
import {
9+
FeatureTable,
10+
GlossaryTooltip,
11+
Steps,
12+
Tabs,
13+
TabItem,
14+
DashButton,
15+
} from "~/components";
916

1017
Security Events allows you to review <GlossaryTooltip term="mitigated request">mitigated requests</GlossaryTooltip> and helps you tailor your security configurations.
1118

@@ -28,8 +35,19 @@ Available features vary according to your Cloudflare plan:
2835

2936
To open Security Events for a given zone:
3037

31-
- Old dashboard: Go to **Security** > **Events**.
32-
- New security dashboard: Go to **Security** > **Analytics** > **Events** tab.
38+
<Tabs syncKey="dashNewNav"> <TabItem label="Old dashboard">
39+
40+
- In the Cloudflare dashboard, go to **Security** > **Events**.
41+
42+
</TabItem> <TabItem label="New dashboard" icon="rocket">
43+
44+
1. In the Cloudflare dashboard, go to the **Analytics** page.
45+
46+
<DashButton url="/?to=/:account/:zone/security/analytics" />
47+
48+
2. Select the **Events** tab.
49+
50+
</TabItem> </Tabs>
3351

3452
Additionally, Enterprise customers have access to the account-level dashboard:
3553

src/content/docs/waf/concepts.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 3
66
---
77

8-
import { GlossaryTooltip, Render } from "~/components";
8+
import { GlossaryTooltip, Render, DashButton } from "~/components";
99

1010
<Render file="waf-intro" product="waf" />
1111

@@ -37,7 +37,6 @@ The two main roles of the Cloudflare WAF are the following:
3737
- **Mitigation**: Blocks, challenges, or throttles requests through different mitigation features such as [custom rules](/waf/custom-rules/), [Managed Rules](/waf/managed-rules/), and [rate limiting rules](/waf/rate-limiting-rules/). Rules that mitigate traffic can include scores from traffic scans in their expressions to better address possibly malicious requests.
3838

3939
:::caution[Warning]
40-
4140
Enabling traffic detections will not apply any mitigation measures to incoming traffic; detections only provide signals that you can use to define your attack mitigation strategy.
4241
:::
4342

@@ -51,10 +50,12 @@ The WAF currently provides the following detections for finding security threats
5150
- [**Firewall for AI**](/waf/detections/firewall-for-ai/): Helps protect your services powered by large language models (LLMs) against abuse.
5251
- [**Bot score**](/bots/concepts/bot-score/): Scores traffic on a scale from 1 (likely to be a bot) to 99 (likely to be human).
5352

54-
To enable traffic detections in the Cloudflare dashboard, go to your domain > **Security** > **Settings**.
53+
To enable traffic detections in the Cloudflare dashboard, go to the Security **Settings** page.
54+
55+
<DashButton url="/?to=/:account/:zone/security/settings" />
5556

5657
:::note
57-
Currently, you cannot manage the [bot score](/bots/concepts/bot-score/) and [attack score](/waf/detections/attack-score/) detections from **Security** > **Settings**. Refer to the documentation of each feature for availability details.
58+
Currently, you cannot manage the [bot score](/bots/concepts/bot-score/) and [attack score](/waf/detections/attack-score/) detections from the **Settings** page. Refer to the documentation of each feature for availability details.
5859
:::
5960

6061
---

src/content/docs/waf/custom-rules/create-dashboard.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ head:
1010
content: Create a custom rule in the dashboard
1111
---
1212

13-
import { Render, Tabs, TabItem, Steps } from "~/components";
13+
import { Render, Tabs, TabItem, Steps, DashButton } from "~/components";
1414

1515
<Tabs syncKey="dashNewNav"> <TabItem label="Old dashboard">
1616

@@ -40,24 +40,24 @@ import { Render, Tabs, TabItem, Steps } from "~/components";
4040

4141
<Steps>
4242

43-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com), and select your account and domain.
43+
1. In the Cloudflare dashboard, go to the **Security rules** page.
4444

45-
2. Go to **Security** > **Security rules**.
45+
<DashButton url="/?to=/:account/:zone/security/security-rules" />
4646

47-
3. To create a new empty rule, select **Create rule** > **Custom rules**. To duplicate an existing rule, select the three dots next to it > **Duplicate**.
47+
2. To create a new empty rule, select **Create rule** > **Custom rules**. To duplicate an existing rule, select the three dots next to it > **Duplicate**.
4848

49-
4. <a id="rule-form" />
49+
3. <a id="rule-form" />
5050
Enter a descriptive name for the rule in **Rule name**.
5151

5252
![Custom rule creation page in the Cloudflare dashboard](~/assets/images/waf/custom-rules/firewall-custom-rule-create.png)
5353

54-
5. Under **If incoming requests match**, use the **Field** drop-down list to choose an HTTP property. For each request, the value of the property you choose for **Field** is compared to the value you specify for **Value** using the operator selected in **Operator**.
54+
4. Under **If incoming requests match**, use the **Field** drop-down list to choose an HTTP property. For each request, the value of the property you choose for **Field** is compared to the value you specify for **Value** using the operator selected in **Operator**.
5555

56-
6. Under **Then take action**, select the rule action in the **Choose action** dropdown. For example, selecting _Block_ tells Cloudflare to refuse requests that match the conditions you specified.
56+
5. Under **Then take action**, select the rule action in the **Choose action** dropdown. For example, selecting _Block_ tells Cloudflare to refuse requests that match the conditions you specified.
5757

58-
7. (Optional) If you selected the _Block_ action, you can [configure a custom response](#configure-a-custom-response-for-blocked-requests).
58+
6. (Optional) If you selected the _Block_ action, you can [configure a custom response](#configure-a-custom-response-for-blocked-requests).
5959

60-
8. To save and deploy your rule, select **Deploy**. If you are not ready to deploy your rule, select **Save as Draft**.
60+
7. To save and deploy your rule, select **Deploy**. If you are not ready to deploy your rule, select **Save as Draft**.
6161

6262
</Steps>
6363

src/content/docs/waf/custom-rules/skip/index.mdx

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ head:
88
content: Configure a custom rule with the Skip action
99
---
1010

11-
import { TabItem, Tabs, Steps } from "~/components";
11+
import { TabItem, Tabs, Steps, DashButton } from "~/components";
1212

1313
Use the _Skip_ action in a custom rule to skip one or more security features. A rule configured with the _Skip_ action is also known as a skip rule.
1414

@@ -40,21 +40,21 @@ For more information on the available options, refer to [Available skip options]
4040

4141
<Steps>
4242

43-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com), and select your account and domain.
43+
1. In the Cloudflare dashboard, go to the **Security rules** page.
4444

45-
2. Go to **Security** > **Security rules**.
45+
<DashButton url="/?to=/:account/:zone/security/security-rules" />
4646

47-
3. [Create a custom rule](/waf/custom-rules/create-dashboard/) by selecting **Create rule** > **Custom rules**, or edit an existing custom rule.
47+
2. [Create a custom rule](/waf/custom-rules/create-dashboard/) by selecting **Create rule** > **Custom rules**, or edit an existing custom rule.
4848

49-
4. Define the rule name and the rule expression.
49+
3. Define the rule name and the rule expression.
5050

51-
5. Under **Choose action**, select _Skip_ from the dropdown.
51+
4. Under **Choose action**, select _Skip_ from the dropdown.
5252

5353
![Available Skip action options when configuring a custom rule](~/assets/images/waf/custom-rules/skip-action-options.png)
5454

55-
6. Configure the desired [skip options](/waf/custom-rules/skip/options/).
55+
5. Configure the desired [skip options](/waf/custom-rules/skip/options/).
5656

57-
7. Save your changes.
57+
6. Save your changes.
5858

5959
</Steps>
6060

src/content/docs/waf/detections/firewall-for-ai.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ import {
1717
Details,
1818
Steps,
1919
Type,
20+
DashButton,
2021
} from "~/components";
2122

2223
Firewall for AI is a detection that can help protect your services powered by <GlossaryTooltip term="LLM">large language models</GlossaryTooltip> (LLMs) against abuse. This model-agnostic detection currently helps you do the following:
@@ -45,8 +46,11 @@ Firewall for AI is only available in the new [application security dashboard](/s
4546

4647
<Steps>
4748

48-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
49-
2. Go to **Security** > **Settings** and filter by **Detections**.
49+
1. In the Cloudflare dashboard, go to the Security **Settings** page.
50+
51+
<DashButton url="/?to=/:account/:zone/security/settings" />
52+
53+
2. (Optional) Filter by **Detection tools**.
5054
3. Turn on **Firewall for AI**.
5155

5256
</Steps>

src/content/docs/waf/detections/index.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ import {
1414
Tabs,
1515
TabItem,
1616
Steps,
17+
DashButton,
1718
} from "~/components";
1819

1920
Traffic detections check incoming requests for malicious or potentially malicious activity. Each enabled detection provides one or more scores — available in the [Security Analytics](/waf/analytics/security-analytics/) dashboard — that you can use in rule expressions.
@@ -46,8 +47,11 @@ To turn on a traffic detection:
4647

4748
<Steps>
4849

49-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
50-
2. Go to **Security** > **Settings** and filter by **Detections**.
50+
1. In the Cloudflare dashboard, go to the Security **Settings** page.
51+
52+
<DashButton url="/?to=/:account/:zone/security/settings" />
53+
54+
2. Filter by **Detection tools**.
5155
3. Turn on the desired detections.
5256

5357
</Steps>

src/content/docs/waf/detections/leaked-credentials/get-started.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ import {
1616
Steps,
1717
GlossaryTooltip,
1818
APIRequest,
19+
DashButton,
1920
} from "~/components";
2021

2122
## 1. Turn on the detection
@@ -132,8 +133,11 @@ To check for leaked credentials in a way that is not covered by the default conf
132133

133134
<Steps>
134135

135-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
136-
2. Go to **Security** > **Settings** and filter by **Detections**.
136+
1. In the Cloudflare dashboard, go to the Security **Settings** page.
137+
138+
<DashButton url="/?to=/:account/:zone/security/settings" />
139+
140+
2. (Optional) Filter by **Detection tools**.
137141
3. Under **Leaked credential detection** > **Configurations**, select the edit icon.
138142
4. Select **Add custom username and password location**.
139143
5. In **Username location** and **Password location** (optional), enter expressions for obtaining the username and the password from the HTTP request. For example, you could use the following expressions:

src/content/docs/waf/detections/malicious-uploads/get-started.mdx

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ import {
1515
Render,
1616
Steps,
1717
APIRequest,
18+
DashButton,
1819
} from "~/components";
1920

2021
:::note
@@ -37,8 +38,11 @@ WAF content scanning is available to customers on an Enterprise plan with a paid
3738

3839
<Steps>
3940

40-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com), and select your account and domain.
41-
2. Go to **Security** > **Settings** and filter by **Detections**.
41+
1. In the Cloudflare dashboard, go to the Security **Settings** page.
42+
43+
<DashButton url="/?to=/:account/:zone/security/settings" />
44+
45+
2. (Optional) Filter by **Detection tools**.
4246
3. Turn on **Malicious uploads detection**.
4347

4448
</Steps>
@@ -143,8 +147,11 @@ To check uploaded content in a way that is not covered by the default configurat
143147

144148
<Steps>
145149

146-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
147-
2. Go to **Security** > **Settings** and filter by **Detections**.
150+
1. In the Cloudflare dashboard, go to the Security **Settings** page.
151+
152+
<DashButton url="/?to=/:account/:zone/security/settings" />
153+
154+
2. (Optional) Filter by **Detection tools**.
148155
3. Under **Malicious uploads detection** > **Configurations**, select the edit icon.
149156
4. Select **Add content location**.
150157
5. In **Content location**, enter your custom scan expression. For example:

src/content/docs/waf/get-started.mdx

Lines changed: 24 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,15 @@ sidebar:
55
order: 2
66
---
77

8-
import { Stream, Details, GlossaryTooltip, Tabs, TabItem, Steps } from "~/components";
8+
import {
9+
Stream,
10+
Details,
11+
GlossaryTooltip,
12+
Tabs,
13+
TabItem,
14+
Steps,
15+
DashButton,
16+
} from "~/components";
917

1018
The Cloudflare Web Application Firewall (Cloudflare WAF) checks incoming web and API requests and filters undesired traffic based on sets of rules called rulesets.
1119

@@ -18,9 +26,9 @@ This guide focuses on configuring WAF for individual domains, known as <Glossary
1826
:::
1927

2028
<Stream
21-
id="1a426a3ae597ae3935eb97b5f97f106f"
22-
title="Application Security: Get started guide"
23-
thumbnail="https://pub-d9bf66e086fb4b639107aa52105b49dd.r2.dev/appsec-get-started-guide.png"
29+
id="1a426a3ae597ae3935eb97b5f97f106f"
30+
title="Application Security: Get started guide"
31+
thumbnail="https://pub-d9bf66e086fb4b639107aa52105b49dd.r2.dev/appsec-get-started-guide.png"
2432
/>
2533

2634
## Before you begin
@@ -47,8 +55,11 @@ The [Cloudflare Managed Ruleset](/waf/managed-rules/reference/cloudflare-managed
4755

4856
<Steps>
4957

50-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com), and select your account and domain.
51-
2. Go to **Security** > **Settings** and filter by **Web application exploits**.
58+
1. In the Cloudflare dashboard, go to the Security **Settings** page.
59+
60+
<DashButton url="/?to=/:account/:zone/security/settings" />
61+
62+
2. (Optional) Filter by **Web application exploits**.
5263
3. Turn on **Cloudflare managed ruleset**.
5364

5465
</Steps>
@@ -144,8 +155,13 @@ The Cloudflare OWASP Core Ruleset is prone to false positives and offers only ma
144155

145156
<Steps>
146157

147-
1. Go to your domain > **Security** > **Settings** and filter by **Web application exploits**.
148-
2. Turn on **OWASP Core**.<br/>
158+
1. In the Cloudflare dashboard, go to the Security **Settings** page.
159+
160+
<DashButton url="/?to=/:account/:zone/security/settings" />
161+
162+
2. (Optional) Filter by **Web application exploits**.
163+
164+
3. Turn on **OWASP Core**.<br/>
149165
This will deploy the Cloudflare OWASP Core Ruleset with the default configuration: paranoia level = _PL1_ and score threshold = _Medium - 40 and higher_.
150166

151167
</Steps>

0 commit comments

Comments
 (0)