You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can now configure a [predefined risk behavior](/cloudflare-one/insights/risk-score/#predefined-risk-behaviors) to evaluate user risk score using device posture attributes from the [SentinelOne integration](/cloudflare-one/identity/devices/service-providers/sentinelone/).
20
+
You can now configure a [predefined risk behavior](/cloudflare-one/insights/risk-score/#predefined-risk-behaviors) to evaluate user risk score using device posture attributes from the [SentinelOne integration](/cloudflare-one/integrations/service-providers/sentinelone/).
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/devices/access-integrations/tanium.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ head:
11
11
import { Render } from"~/components";
12
12
13
13
:::note
14
-
Not recommended for new deployments. We recommend using the [Tanium service-to-service integration](/cloudflare-one/identity/devices/service-providers/taniums2s/) to get device posture signals from Tanium.
14
+
Not recommended for new deployments. We recommend using the [Tanium service-to-service integration](/cloudflare-one/integrations/service-providers/taniums2s/) to get device posture signals from Tanium.
15
15
:::
16
16
17
17
Cloudflare Access can use endpoint data from [Tanium™](https://www.tanium.com/) to determine if a request should be allowed to reach a protected resource. When users attempt to connect to a resource protected by Access with a Tanium rule, Cloudflare Access will validate the user's identity, and the browser will connect to the Tanium agent before making a decision to grant access.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/devices/index.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ With Cloudflare Zero Trust, you can configure Zero Trust policies that rely on a
14
14
Setup instructions and requirements vary depending on the device posture attribute. Refer to the links below to view the setup guide for your provider.
15
15
16
16
-[WARP client checks](/cloudflare-one/identity/devices/warp-client-checks/) are performed by the Cloudflare WARP client.
17
-
-[Service-to-service checks](/cloudflare-one/identity/devices/service-providers/) are performed by third-party device posture providers.
17
+
-[Service-to-service checks](/cloudflare-one/integrations/service-providers/) are performed by third-party device posture providers.
18
18
-[Access integration checks](/cloudflare-one/identity/devices/access-integrations/) are only configurable for Access applications. These attributes cannot be used in Gateway policies.
19
19
20
20
## 2. Verify device posture checks
@@ -37,7 +37,7 @@ Gateway does not support device posture checks for the [Tanium Access integratio
37
37
38
38
## 4. Ensure traffic is going through WARP
39
39
40
-
[WARP client](/cloudflare-one/identity/devices/warp-client-checks/) and [service-to-service](/cloudflare-one/identity/devices/service-providers/) posture checks rely on traffic going through WARP to detect posture information for a device. In your [Split Tunnel configuration](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/), ensure that the following domains are included in WARP:
40
+
[WARP client](/cloudflare-one/identity/devices/warp-client-checks/) and [service-to-service](/cloudflare-one/integrations/service-providers/) posture checks rely on traffic going through WARP to detect posture information for a device. In your [Split Tunnel configuration](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/), ensure that the following domains are included in WARP:
41
41
42
42
- The IdP used to authenticate to Cloudflare Zero Trust if posture check is part of an Access policy.
43
43
-`<your-team-name>.cloudflareaccess.com` if posture check is part of an Access policy.
@@ -77,4 +77,4 @@ By default, the WARP client polls the device for status changes every five minut
77
77
78
78
#### Service provider checks
79
79
80
-
When setting up a [service-to-service integration](/cloudflare-one/identity/devices/service-providers/), you will choose a polling frequency to determine how often Cloudflare will query the third-party API. To set the polling frequency via the API, use the [`interval`](/api/resources/zero_trust/subresources/devices/subresources/posture/subresources/integrations/methods/edit/) parameter.
80
+
When setting up a [service-to-service integration](/cloudflare-one/integrations/service-providers/), you will choose a polling frequency to determine how often Cloudflare will query the third-party API. To set the polling frequency via the API, use the [`interval`](/api/resources/zero_trust/subresources/devices/subresources/posture/subresources/integrations/methods/edit/) parameter.
Cloudflare Zero Trust integrates with your organization's identity provider to apply Zero Trust and Secure Web Gateway policies. If you work with partners, contractors, or other organizations, you can integrate multiple identity providers simultaneously.
11
-
12
-
As an alternative to configuring an identity provider, Cloudflare Zero Trust can send a [one-time PIN (OTP)](/cloudflare-one/integrations/identity-providers/one-time-pin/) to approved email addresses. No configuration needed — simply add a user's email address to an [Access policy](/cloudflare-one/policies/access/) and to the group that allows your team to reach the application.
13
-
14
-
You can simultaneously configure an OTP and an identity provider to allow users to use their own authentication method.
15
-
16
-
Additionally, Cloudflare Zero Trust can integrate with [endpoint protection providers](/cloudflare-one/identity/devices/) to check requests for device posture. This allows you to configure security policies that rely on additional signals from endpoint security providers to allow or deny connections to your applications.
|**Name**| Name of the [device posture check](/cloudflare-one/identity/devices). |
40
-
|**Type**| Type of [WARP client check](/cloudflare-one/identity/devices/warp-client-checks/) or [service provider check](/cloudflare-one/identity/devices/service-providers/). |
40
+
|**Type**| Type of [WARP client check](/cloudflare-one/identity/devices/warp-client-checks/) or [service provider check](/cloudflare-one/integrations/service-providers/). |
41
41
|**Rule ID**| UUID of the device posture check. |
42
42
|**Conditions met**| Whether the device passed or failed the posture check criteria. Evaluates to `true` if the **Received values** match the **Expected values**. |
43
43
|**Expected values**| Values required to pass the device posture check. |
| Impossible travel |[A configured Access application](/cloudflare-one/applications/)| User has a successful login from two different locations that they could not have traveled between in that period of time. Matches will appear in your [Access audit logs](/cloudflare-one/insights/logs/audit-logs/). |
56
56
| High number of DLP policies triggered |[A configured DLP profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/)| User has created a high number of DLP policy matches within a narrow frame of time. Matches will appear in your [Gateway activity logs](/cloudflare-one/insights/logs/gateway-logs/). |
57
-
| SentinelOne threat detected on machine |[SentinelOne service provider integration](/cloudflare-one/identity/devices/service-providers/sentinelone/)| SentinelOne returns one or more configured [device posture attributes](/cloudflare-one/identity/devices/service-providers/sentinelone/#device-posture-attributes) for a user. |
57
+
| SentinelOne threat detected on machine |[SentinelOne service provider integration](/cloudflare-one/integrations/service-providers/sentinelone/)| SentinelOne returns one or more configured [device posture attributes](/cloudflare-one/integrations/service-providers/sentinelone/#device-posture-attributes) for a user. |
0 commit comments