Skip to content

Commit 7376c3f

Browse files
[Docs] Update threat score references (#22210)
--------- Co-authored-by: Kate Tungusova <[email protected]>
1 parent f3e7383 commit 7376c3f

File tree

16 files changed

+61
-73
lines changed

16 files changed

+61
-73
lines changed

src/content/docs/analytics/account-and-zone-analytics/threat-types.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ _Note: During a JavaScript challenge you will be shown an interstitial page for
3232

3333
A request that came from an IP address that is not trusted by Cloudflare based on the threat score.
3434

35-
Cloudflare uses threat scores gathered from sources such as Project Honeypot, as well as our own communities' traffic to determine whether a visitor is legitimate or malicious. When a legitimate visitor passes a challenge, that helps offset the threat score against the previous negative behavior seen from that IP address. Our system learns who is a threat from this activity.
35+
Previously, the threat score was a score from `0` (zero risk) to `100` (high risk) classifying the IP reputation of a visitor. Currently, the threat score is always `0` (zero).
3636

3737
## Country block
3838

@@ -68,4 +68,4 @@ Request that came from a bot.
6868

6969
Unclassified threats comprises a number of automatic blocks that are not related to the Browser Integrity Challenge (Bad Browser). These threats usually relate to Hotlink Protection, and other actions that happen on Cloudflare's global network based on the composition of the request (and not its content).
7070

71-
Unclassified means a number of conditions under which we group common threats related to Hotlink Protection as well as certain cases of IP reputation and specific requests that are blocked at Cloudflare's global network before reaching your servers.
71+
Unclassified means a number of conditions under which we group common threats related to Hotlink Protection as well as specific requests that are blocked at Cloudflare's global network before reaching your servers.

src/content/docs/analytics/account-and-zone-analytics/total-threats-stopped.mdx

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,10 @@ source: https://support.cloudflare.com/hc/en-us/articles/204964927-How-does-Clou
44
title: Total threats stopped
55
---
66

7-
Total Threats Stopped measures the number of “suspicious” and “bad” requests that were aimed at your site. Requests receive these labels by our IP Reputation Database as they enter Cloudflare’s network:
7+
Total Threats Stopped measures the number of “suspicious” and “bad” requests that were aimed at your site. Requests receive these labels as they enter Cloudflare’s network:
88

99
- **Legitimate:** Request passed directly to your site.
1010
- **Suspicious:** Request has been challenged with a [Cloudflare challenge](/fundamentals/security/cloudflare-challenges/).
11-
- **Bad:** Request has been blocked because our Browser Integrity Check, or because of user configured settings like WAF rules or IP range block.
12-
13-
Cloudflare uses threat scores gathered from sources such as Project Honeypot, as well as our own communities' traffic to determine whether a visitor is legitimate or malicious. When a legitimate visitor passes a challenge, that helps offset the threat score against the previous negative behavior seen from that IP address. Our system learns who is a threat from this activity.
11+
- **Bad:** Request has been blocked because our Browser Integrity Check, or because of user configured settings like WAF rules or IP Access rules.
1412

1513
In addition to threat analytics you can also monitor search engine crawlers going to your websites. For most websites, threats and crawlers make up 20% to 50% of traffic.

src/content/docs/fundamentals/trace-request/how-to.mdx

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -26,20 +26,19 @@ import { GlossaryTooltip } from "~/components";
2626

2727
2. Enter a URL to trace. The URL must include a hostname that belongs to your account.
2828

29-
3. Select an HTTP method. If you select _POST_, _PUT_, or _PATCH_, you should enter a value in **Request body**.
29+
3. Select an HTTP method. If you select _POST_, _PUT_, or _PATCH_, you should enter a value in **Request Body**.
3030

3131
4. (Optional) Define any custom request properties to simulate the conditions of a specific HTTP/S request. You can customize the following request properties:
3232

3333
- **Protocol** (HTTP protocol version)
34-
- **Request headers**
34+
- **User Agent and Request Headers**
3535
- **Cookies**
3636
- **Geolocation** (request source [country](/ruleset-engine/rules-language/fields/reference/ip.src.country/), [region](/ruleset-engine/rules-language/fields/reference/ip.src.region/), and [city](/ruleset-engine/rules-language/fields/reference/ip.src.city/))
37-
- [**Bot score**](/bots/concepts/bot-score/)
38-
- **Threat score**
39-
- **Request body** (for `POST`, `PUT`, and `PATCH` requests)
40-
- **Skip challenge** (skips a Cloudflare-issued [challenge](/fundamentals/security/cloudflare-challenges/), if any, allowing the trace to continue)
37+
- [**Bot Score**](/bots/concepts/bot-score/)
38+
- **Request Body** (for `POST`, `PUT`, and `PATCH` requests)
39+
- **Skip Challenge** (skips a Cloudflare-issued [challenge](/fundamentals/security/cloudflare-challenges/), if any, allowing the trace to continue)
4140

42-
5. Select **Send trace**.
41+
5. Select **Send Trace**.
4342

4443
### 3. Assess results
4544

src/content/docs/logs/reference/pathing-status.mdx

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -192,18 +192,18 @@ Drop DDoS attacks through L7 mitigation.
192192

193193
The macro stage is comprised of many different paths. They are categorized by the reputation of the visitor IP.
194194

195-
| EdgePathingStatus | Description | EdgePathingOp | EdgePathingSrc |
196-
| ----------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------- | -------------- |
197-
| `nr` | There is no reputation data for the IP and no action is being taken. | `wl` | `macro` |
198-
| `wl` | IP is explicitly allowlisted. | `wl` | `macro` |
199-
| `scan` | IP is explicitly allowlisted and categorized as a security scanner. | `wl` | `macro` |
200-
| `mon` | IP is explicitly allowlisted and categorized as a Monitoring Service. | `wl` | `macro` |
201-
| `bak` | IP is explicitly allowlisted and categorized as a Backup Service. | `wl` | `macro` |
202-
| `mob` | IP is explicitly allowlisted and categorized as Mobile Proxy Service. | `wl` | `macro` |
203-
| `se` | IP is explicitly allowlisted as it belongs to a search engine crawler and no action is taken. | `wl` | `macro` |
204-
| `grey` | IP is greylisted (suspected to be bad) but the request was either for a favicon or security is turned off and as such, it is allowlisted. | `wl` | `macro` |
205-
| `bad_ok` | The reputation score of the IP is bad but the request was either for a favicon or security is turned off and as such, it is allowlisted. Alternatively, the <GlossaryTooltip term="threat score">threat score</GlossaryTooltip> of the IP is in the accepted security level. | `wl` | `macro` |
206-
| `unknown` | The `pathing_status` is unknown and the request is being processed as normal. | `wl` | `macro` |
195+
| EdgePathingStatus | Description | EdgePathingOp | EdgePathingSrc |
196+
| ----------------- | ----------------------------------------------------------------------------------------------------------------------------------------- | ------------- | -------------- |
197+
| `nr` | There is no reputation data for the IP and no action is being taken. | `wl` | `macro` |
198+
| `wl` | IP is explicitly allowlisted. | `wl` | `macro` |
199+
| `scan` | IP is explicitly allowlisted and categorized as a security scanner. | `wl` | `macro` |
200+
| `mon` | IP is explicitly allowlisted and categorized as a Monitoring Service. | `wl` | `macro` |
201+
| `bak` | IP is explicitly allowlisted and categorized as a Backup Service. | `wl` | `macro` |
202+
| `mob` | IP is explicitly allowlisted and categorized as Mobile Proxy Service. | `wl` | `macro` |
203+
| `se` | IP is explicitly allowlisted as it belongs to a search engine crawler and no action is taken. | `wl` | `macro` |
204+
| `grey` | IP is greylisted (suspected to be bad) but the request was either for a favicon or security is turned off and as such, it is allowlisted. | `wl` | `macro` |
205+
| `bad_ok` | The reputation score of the IP is bad but the request was either for a favicon or security is turned off and as such, it is allowlisted. | `wl` | `macro` |
206+
| `unknown` | The `pathing_status` is unknown and the request is being processed as normal. | `wl` | `macro` |
207207

208208
## Rate Limiting
209209

src/content/docs/ruleset-engine/custom-rulesets/add-rules-ruleset.mdx

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ The response will include the rule ID of the new rules in the `id` field.
3737
rules: [
3838
{
3939
expression:
40-
'(ip.src.country eq "GB" or ip.src.country eq "FR") or cf.threat_score > 0',
40+
'(ip.src.country in {"GB" "FR"} and cf.bot_management.score < 20 and not cf.bot_management.verified_bot)',
4141
action: "challenge",
42-
description: "challenge GB and FR or based on IP Reputation",
42+
description: "challenge GB and FR based on bot score",
4343
},
4444
{
4545
expression: 'not http.request.uri.path matches "^/api/.*$"',
@@ -62,8 +62,8 @@ The response will include the rule ID of the new rules in the `id` field.
6262
"id": "<CUSTOM_RULE_ID_1>",
6363
"version": "1",
6464
"action": "challenge",
65-
"expression": "(ip.src.country eq \"GB\" or ip.src.country eq \"FR\") or cf.threat_score \u003e 0",
66-
"description": "challenge GB and FR or based on IP Reputation",
65+
"expression": "(ip.src.country in {\"GB\" \"FR\"} and cf.bot_management.score < 20 and not cf.bot_management.verified_bot)",
66+
"description": "challenge GB and FR based on bot score",
6767
"last_updated": "2021-03-18T18:25:08.122758Z",
6868
"ref": "<CUSTOM_RULE_REF_1>",
6969
"enabled": true
@@ -136,8 +136,8 @@ The response will include the modified custom ruleset. Note that the updated rul
136136
"id": "<CUSTOM_RULE_ID_1>",
137137
"version": "1",
138138
"action": "challenge",
139-
"expression": "(ip.src.country eq \"GB\" or ip.src.country eq \"FR\") or cf.threat_score \u003e 0",
140-
"description": "challenge GB and FR or based on IP Reputation",
139+
"expression": "(ip.src.country in {\"GB\" \"FR\"} and cf.bot_management.score < 20 and not cf.bot_management.verified_bot)",
140+
"description": "challenge GB and FR based on bot score",
141141
"last_updated": "2021-03-18T18:25:08.122758Z",
142142
"ref": "<CUSTOM_RULE_ID_1>",
143143
"enabled": true

src/content/docs/ruleset-engine/rules-language/operators.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ The Rules language supports these comparison operators:
8282
<td>❌</td>
8383
<td>✅</td>
8484
<td>
85-
<code>cf.threat_score <strong>lt</strong> 10</code>
85+
<code>cf.waf.score <strong>lt</strong> 10</code>
8686
</td>
8787
</tr>
8888
<tr>
@@ -93,7 +93,7 @@ The Rules language supports these comparison operators:
9393
<td>❌</td>
9494
<td>✅</td>
9595
<td>
96-
<code>cf.threat_score <strong>le</strong> 20</code>
96+
<code>cf.waf.score <strong>le</strong> 20</code>
9797
</td>
9898
</tr>
9999
<tr>
@@ -104,7 +104,7 @@ The Rules language supports these comparison operators:
104104
<td>❌</td>
105105
<td>✅</td>
106106
<td>
107-
<code>cf.threat_score <strong>gt</strong> 25</code>
107+
<code>cf.waf.score <strong>gt</strong> 25</code>
108108
</td>
109109
</tr>
110110
<tr>
@@ -115,7 +115,7 @@ The Rules language supports these comparison operators:
115115
<td>❌</td>
116116
<td>✅</td>
117117
<td>
118-
<code>cf.threat_score <strong>ge</strong> 60</code>
118+
<code>cf.waf.score <strong>ge</strong> 60</code>
119119
</td>
120120
</tr>
121121
<tr>

src/content/docs/ruleset-engine/rulesets-api/add-rule.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,8 @@ The response will include the complete ruleset after adding the rule.
3838
json={{
3939
action: "js_challenge",
4040
expression:
41-
'(ip.src.country eq "GB" or ip.src.country eq "FR") or cf.threat_score > 0',
42-
description: "challenge GB and FR or based on IP Reputation",
41+
'(ip.src.country in {"GB" "FR"} and cf.bot_management.score < 20 and not cf.bot_management.verified_bot)',
42+
description: "challenge GB and FR based on bot score",
4343
}}
4444
/>
4545

@@ -65,8 +65,8 @@ The response will include the complete ruleset after adding the rule.
6565
"id": "<NEW_RULE_ID>",
6666
"version": "1",
6767
"action": "js_challenge",
68-
"expression": "(ip.src.country eq \"GB\" or ip.src.country eq \"FR\") or cf.threat_score > 0",
69-
"description": "challenge GB and FR or based on IP Reputation",
68+
"expression": "(ip.src.country in {\"GB\" \"FR\"} and cf.bot_management.score < 20 and not cf.bot_management.verified_bot)",
69+
"description": "challenge GB and FR based on bot score",
7070
"last_updated": "2024-06-22T12:35:58.144683Z",
7171
"ref": "<NEW_RULE_REF>",
7272
"enabled": true

src/content/docs/ruleset-engine/rulesets-api/delete-rule.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,8 @@ The response will include the complete ruleset after deleting the rule.
4949
"id": "<RULE_ID_2>",
5050
"version": "2",
5151
"action": "js_challenge",
52-
"expression": "(ip.src.country eq \"GB\" or ip.src.country eq \"FR\") or cf.threat_score > 0",
53-
"description": "challenge GB and FR or based on IP Reputation",
52+
"expression": "(ip.src.country in {\"GB\" \"FR\"} and cf.bot_management.score < 20 and not cf.bot_management.verified_bot)",
53+
"description": "challenge GB and FR based on bot score",
5454
"last_updated": "2021-07-22T12:54:58.144683Z",
5555
"ref": "<RULE_REF_2>",
5656
"enabled": true

src/content/docs/ruleset-engine/rulesets-api/update-rule.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,8 @@ The response will include the complete ruleset after updating the rule.
3737
json={{
3838
action: "js_challenge",
3939
expression:
40-
'(ip.src.country eq "GB" or ip.src.country eq "FR") or cf.threat_score > 0',
41-
description: "challenge GB and FR or based on IP Reputation",
40+
'(ip.src.country in {"GB" "FR"} and cf.bot_management.score < 20 and not cf.bot_management.verified_bot)',
41+
description: "challenge GB and FR based on bot score",
4242
}}
4343
/>
4444

@@ -55,8 +55,8 @@ The response will include the complete ruleset after updating the rule.
5555
"id": "<RULE_ID_1>",
5656
"version": "2",
5757
"action": "js_challenge",
58-
"expression": "(ip.src.country eq \"GB\" or ip.src.country eq \"FR\") or cf.threat_score > 0",
59-
"description": "challenge GB and FR or based on IP Reputation",
58+
"expression": "(ip.src.country in {\"GB\" \"FR\"} and cf.bot_management.score < 20 and not cf.bot_management.verified_bot)",
59+
"description": "challenge GB and FR based on bot score",
6060
"last_updated": "2023-03-22T12:54:58.144683Z",
6161
"ref": "<RULE_REF_1>",
6262
"enabled": true

src/content/docs/support/third-party-software/content-management-system-cms/cloudflare-and-joomla-recommended-first-steps.mdx

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -34,29 +34,28 @@ While there is not always an issue, we have seen instances where optional perfor
3434

3535
---
3636

37-
## Allow IP addresses via Cloudflare Threat Control panel
37+
## Skip security features for specific IP addresses
3838

39-
Log in to your Cloudflare Threat Control panel and allow IP addresses you want traffic from or expect traffic from. Some common services you probably want to allow include:
39+
You can use WAF custom rules to [skip certain security features](/waf/custom-rules/skip/) for IP addresses you want traffic from or expect traffic from. Some common services you probably want to allow include:
4040

41-
- APIs you are pulling from
41+
- APIs you are getting data from
4242
- Monitoring services you use to monitor your site's uptime
4343
- Security services
44-
- IP addresses you frequently login from
44+
- IP addresses you frequently log in from
4545

4646
Why do this?
4747

48-
If Cloudflare has an IP address with a high threat score going to your site, or if you have [Cloudflare's Web Application Firewall](https://cloudflare.com/waf) turned on, you may get challenged working in your back end and/or services you want to access your site may get challenged. Taking the steps to allow in the beginning will help prevent future surprises on your site.
48+
If you have enabled and configured [Cloudflare's Web Application Firewall](/waf/), legitimate services and/or you may get challenged while accessing your backend. To prevent issues on your site, consider skipping certain security features for requests coming from known IP addresses.
4949

5050
:::note
51-
52-
We allow all known search engine and social media crawlers in our macro list. If you decide to block specific countries, you must use care because you may end up inadvertently blocking their crawlers (blocking the USA, for example, could mean that their crawler gets challenged).
51+
Cloudflare allows known search engine and social media crawlers. If you decide to block specific countries, you must use care because you may end up inadvertently blocking their crawlers (blocking the USA, for example, could mean that their crawler gets challenged).
5352
:::
5453

5554
---
5655

5756
## Ensure requests from Cloudflare's IP ranges aren't blocked or limited
5857

59-
If you are using services like .htaccess, firewalls or server mods to manage access to your site from visitors, it is vitally important to make sure requests from Cloudflares IP ranges are not being blocked or limited in any way. The number one cause of site offline issues in our support channel is something blocking or restricting requests from our IPs, so please take the time to make sure that all of Cloudflares IPs are allowed on your server.
58+
If you are using services like `.htaccess`, firewalls or server mods to manage access to your site from visitors, you must ensure that requests from [Cloudflare's IP ranges](https://www.cloudflare.com/ips/) are not being blocked or limited in any way. The number one cause of "site offline" issues in Cloudflare's support channel is something blocking or restricting requests from Cloudflare IPs. To prevent this, ensure that all of Cloudflare's IPs are allowed on your server.
6059

6160
Why do this?
6261

0 commit comments

Comments
 (0)