Skip to content

Commit 5bc6f75

Browse files
authored
Final formatting changes
1 parent 29080f2 commit 5bc6f75

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed

src/content/docs/waf/reference/legacy/old-waf-managed-rules/index.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ When viewing a ruleset, Cloudflare shows default actions for each rule listed un
5252
* **Disable**: Turns off the specific rule within the group.
5353
* **Block**: Discards the request.
5454
* **Interactive Challenge**: The visitor receives a challenge page that requires interaction.
55-
* **Simulate**: The request is allowed through but is logged in [**Sampled logs**](/waf/analytics/security-events/#sampled-logs).
55+
* **Simulate**: The request is allowed through but is logged in [Sampled logs](/waf/analytics/security-events/#sampled-logs).
5656

5757
Cloudflare’s [WAF changelog](/waf/change-log/) allows customers to monitor ongoing changes to the Cloudflare Managed Ruleset.
5858

@@ -66,7 +66,7 @@ After OWASP evaluates a request, Cloudflare compares the final score to the **Se
6666

6767
* **Block**: The request is discarded.
6868
* **Challenge**: The visitor receives an interactive challenge page.
69-
* **Simulate**: The request is allowed through but is logged in [**Sampled logs**](/waf/analytics/security-events/#sampled-logs).
69+
* **Simulate**: The request is allowed through but is logged in [Sampled logs](/waf/analytics/security-events/#sampled-logs).
7070

7171
The sensitivity score required to trigger the WAF for a specific **Sensitivity** is as follows:
7272

@@ -80,7 +80,7 @@ For AJAX requests, the following scores are applied instead:
8080
* **Medium**: 80 and higher
8181
* **High**: 65 and higher
8282

83-
Review the entry in [**Sampled logs**](/waf/analytics/security-events/#sampled-logs) for the final score and for the individual triggered rules.
83+
Review the entry in [Sampled logs](/waf/analytics/security-events/#sampled-logs) for the final score and for the individual triggered rules.
8484

8585
### Control the OWASP package
8686

@@ -99,7 +99,7 @@ Cloudflare recommends initially setting the sensitivity to *Low* and reviewing f
9999

100100
:::note
101101

102-
**Sampled logs** displays rule ID `981176` when a request is blocked by OWASP. Also, some OWASP rules listed in **Sampled logs** do not appear in the OWASP list of rules because disabling those rules is not recommended.
102+
Sampled logs displays rule ID `981176` when a request is blocked by OWASP. Also, some OWASP rules listed in Sampled logs do not appear in the OWASP list of rules because disabling those rules is not recommended.
103103
:::
104104

105105
***

src/content/docs/waf/reference/migration-guides/waf-managed-rules-migration.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,7 @@ The returned configuration in the example above, which would match the existing
308308
}'
309309
```
310310

311-
After invoking this API endpoint, both WAF managed rules and WAF Managed Rules will be enabled. Check [**Sampled logs**](/waf/analytics/security-events/#sampled-logs) in Security Events for any legitimate traffic getting blocked, and perform any required adjustments to the WAF Managed Rules configuration. For example, you can [add an override](/ruleset-engine/managed-rulesets/override-managed-ruleset/) for a single rule that disables it or changes its action.
311+
After invoking this API endpoint, both WAF managed rules and WAF Managed Rules will be enabled. Check [Sampled logs](/waf/analytics/security-events/#sampled-logs) in Security Events for any legitimate traffic getting blocked, and perform any required adjustments to the WAF Managed Rules configuration. For example, you can [add an override](/ruleset-engine/managed-rulesets/override-managed-ruleset/) for a single rule that disables it or changes its action.
312312

313313
4. To finish the migration and disable WAF managed rules, set the configuration for the new WAF using the settings you obtained in step 2 and possibly adjusted in step 3. Make sure you include the `waf_migration=pending&phase_two=1` query string parameters.
314314

src/content/docs/waf/tools/validation-checks.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Currently, you cannot disable validation checks. They run early in Cloudflare's
1313

1414
## Event logs for validation checks
1515

16-
Actions performed by the Validation component appear in the **Sampled logs** of [Security Events](/waf/analytics/security-events/) associated with the `Validation` service and without a rule ID. Event logs downloaded from the API show source as `Validation` and action as `drop` when this behavior occurs.
16+
Actions performed by the Validation component appear in [Sampled logs](/waf/analytics/security-events/#sampled-logs) in Security Events, associated with the `Validation` service and without a rule ID. Event logs downloaded from the API show source as `Validation` and action as `drop` when this behavior occurs.
1717

1818
The following example shows a request blocked by the Validation component due to a malformed `User-Agent` HTTP request header:
1919

src/content/release-notes/waf-general.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ entries:
1818
- publish_date: "2024-11-14"
1919
title: Security Events pagination
2020
description: |-
21-
Fixed an issue with pagination in Security Events' **Sampled logs** where some pages were missing data. Also removed the total count from the events log as these are only sampled logs.
21+
Fixed an issue with pagination in Security Events' Sampled logs where some pages were missing data. Also removed the total count from the events log as these are only sampled logs.
2222
- publish_date: "2024-11-04"
2323
title: New table in Security Analytics and Security Events
2424
description: |-

0 commit comments

Comments
 (0)