Skip to content

Commit 68a0cd7

Browse files
committed
Update heading in Firewall for AI
1 parent 7477e9e commit 68a0cd7

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

src/content/docs/waf/detections/firewall-for-ai.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Firewall for AI is a detection that can help protect your services powered by <G
2020

2121
When enabled, the detection runs on incoming traffic, searching for any LLM prompts attempting to exploit the model.
2222

23-
Cloudflare will populate the existing [Firewall for AI fields](#fields) based on the scan results. You can check these results in the [Security Analytics](/waf/analytics/security-analytics/) dashboard by filtering on the `cf-llm` [managed endpoint label](/api-shield/management-and-monitoring/endpoint-labels/) and reviewing the detection results on your traffic. Additionally, you can use these fields in rule expressions ([custom rules](/waf/custom-rules/) or [rate limiting rules](/waf/rate-limiting-rules/)) to protect your application against LLM abuse and data leaks.
23+
Cloudflare will populate the existing [Firewall for AI fields](#firewall-for-ai-fields) based on the scan results. You can check these results in the [Security Analytics](/waf/analytics/security-analytics/) dashboard by filtering on the `cf-llm` [managed endpoint label](/api-shield/management-and-monitoring/endpoint-labels/) and reviewing the detection results on your traffic. Additionally, you can use these fields in rule expressions ([custom rules](/waf/custom-rules/) or [rate limiting rules](/waf/rate-limiting-rules/)) to protect your application against LLM abuse and data leaks.
2424

2525
## Availability
2626

@@ -86,7 +86,7 @@ Alternatively, create a custom rule like the one described in the next step usin
8686
- **With response type**: Custom JSON
8787
- **Response body**: `{ "error": "Your request was blocked. Please rephrase your request." }`
8888

89-
For additional examples, refer to [Example mitigation rules](#example-mitigation-rules). For a list of fields provided by Firewall for AI, refer to [Fields](#fields).
89+
For additional examples, refer to [Example mitigation rules](#example-mitigation-rules). For a list of fields provided by Firewall for AI, refer to [Fields](#firewall-for-ai-fields).
9090

9191
<Details header="Combine with other Rules language fields">
9292

@@ -114,7 +114,7 @@ You can combine the previous expression with other [fields](/ruleset-engine/rule
114114

115115
</Details>
116116

117-
## Fields
117+
## Firewall for AI fields
118118

119119
When enabled, Firewall for AI populates the following fields:
120120

0 commit comments

Comments
 (0)