|
8 | 8 | content: About Cloudflare WARP |
9 | 9 | --- |
10 | 10 |
|
| 11 | +## About Cloudflare WARP |
| 12 | + |
11 | 13 | The Cloudflare WARP client allows you to protect corporate devices by securely and privately sending traffic from those devices to Cloudflare's global network, where [Cloudflare Gateway](/cloudflare-one/policies/gateway/) can apply advanced web filtering. The WARP client also makes it possible to apply advanced [Zero Trust policies](/cloudflare-one/identity/devices/) that check for a device's health before it connects to corporate applications. |
12 | 14 |
|
13 | | -WARP is a lightweight device client, which builds proxy tunnels using either Wireguard or MASQUE, and builds a DNS proxy using DNS-over-HTTPS. WARP supports all major operating systems, all common forms of endpoint management tooling, and has a robust series of management parameters and profiles to accurately scope the needs of a diverse user base. |
| 15 | +## How WARP works |
| 16 | + |
| 17 | +WARP is a device client that builds proxy tunnels using either Wireguard or MASQUE, and builds a DNS proxy using DNS-over-HTTPS. WARP supports all major operating systems, all common forms of endpoint management tooling, and has a robust series of management parameters and profiles to accurately scope the needs of a diverse user base. |
| 18 | + |
| 19 | +The WARP client consists of: |
| 20 | + |
| 21 | +- Graphical User Interface (GUI): Control panel that allows end users to view WARP's [status](/cloudflare-one/connections/connect-devices/warp/troubleshooting/connectivity-status/) and perform actions such as turning WARP on or off. |
| 22 | +- WARP daemon (or service): Core background component responsible for establishing secure tunnels (using WireGuard or MASQUE) and handling all WARP functionality on your device. |
| 23 | + |
| 24 | +Refer to [WARP architecture](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/) for more information on how WARP client interacts with a device's operating system to route traffic. |
| 25 | + |
| 26 | +## Key benefits of using WARP |
| 27 | + |
| 28 | +Deploying the WARP client significantly enhances your organization's security and visibility within Cloudflare Zero Trust: |
| 29 | + |
| 30 | +- **Unified security policies everywhere**: With the WARP client deployed in the Gateway with WARP mode, [Gateway policies](/cloudflare-one/policies/gateway/) are not location-dependent — they can be enforced anywhere. |
| 31 | + |
| 32 | +- **Advanced web filtering and threat protection**: Activate Gateway features for your device traffic, including: |
| 33 | + |
| 34 | + - [Anti-Virus scanning](/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/) |
| 35 | + - [HTTP filtering](/cloudflare-one/policies/gateway/http-policies/) |
| 36 | + - [Browser Isolation](/cloudflare-one/policies/gateway/http-policies/#isolate) |
| 37 | + - [Identity-based policies](/cloudflare-one/policies/gateway/network-policies/) |
| 38 | + |
| 39 | +- **Application and device-specific insights**: With WARP installed on your corporate devices, you can view detailed application and user-level activity on the [Zero Trust Shadow IT Discovery](/cloudflare-one/insights/analytics/shadow-it-discovery/) page, while also monitoring device and network performance with [Digital Experience Monitoring (DEX)](/cloudflare-one/insights/dex/) to proactively detect and resolve issues. |
| 40 | + |
| 41 | +- **Device posture checks**: The WARP client provides advanced Zero Trust protection by making it possible to check for [device posture](/cloudflare-one/identity/devices/). By setting up device posture checks, you can build Zero Trust policies that check for a device's location, disk encryption status, OS version, and more. |
| 42 | + |
| 43 | +- **Secure private and infrastructure access**: WARP lets devices connect to [private networks](/cloudflare-one/connections/connect-networks/private-net/cloudflared/) over Cloudflare Tunnel and is required for [Access for Infrastructure](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/), enabling secure SSH with short-lived certificates and detailed logging. |
14 | 44 |
|
15 | | -WARP has flexible [operating modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) and can control device traffic as a proxy, control device DNS traffic as a DNS proxy, or both. It is the most common method to send traffic from user devices to be filtered and decrypted by Cloudflare Gateway. |
| 45 | +## WARP modes |
16 | 46 |
|
17 | | -Downloading and deploying the WARP client to your devices enhances the protection Cloudflare Zero Trust can provide to your users and data, wherever they are. |
| 47 | +WARP offers flexible [operating modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) to suit your specific needs. WARP can control device traffic as a full proxy, manage only DNS traffic as a DNS proxy, or both. WARP is the most common method for sending user device traffic through Cloudflare Gateway for filtering and decryption. |
18 | 48 |
|
19 | | -The WARP client provides in-depth protection for your organization in a few ways: |
| 49 | +## Next steps |
20 | 50 |
|
21 | | -- **WARP lets you enforce security policies anywhere**. With the WARP client deployed in the Gateway with WARP mode, Gateway policies are not location-dependent — they can be enforced anywhere. |
22 | | -- **WARP lets you enforce HTTP filtering and user-based policies**. Download and install the WARP client to enable Gateway features such as [Anti-Virus scanning](/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/), [HTTP filtering](/cloudflare-one/policies/gateway/http-policies/), [Browser Isolation](/cloudflare-one/policies/gateway/http-policies/#isolate), and [identity-based policies](/cloudflare-one/policies/gateway/network-policies/). |
23 | | -- **WARP lets you have in-depth, application-specific insights**. With WARP installed on your corporate devices, you can populate the [Zero Trust Shadow IT Discovery](/cloudflare-one/insights/analytics/shadow-it-discovery/) page with visibility down to the application and user level. This makes it easy to discover, analyze, and take action on any shadow IT your users may be using every day. |
24 | | -- **WARP allows you to build rich device posture rules.** The WARP client provides advanced Zero Trust protection by making it possible to check for [device posture](/cloudflare-one/identity/devices/). By setting up device posture checks, you can build Zero Trust policies that check for a device's location, disk encryption status, OS version, and more. |
| 51 | +- Review the [first-time setup](/cloudflare-one/connections/connect-devices/warp/set-up-warp/) guide to [install](/cloudflare-one/connections/connect-devices/warp/download-warp/) and [deploy](/cloudflare-one/connections/connect-devices/warp/deployment/) the WARP client on your corporate devices. |
| 52 | +- Review possible [WARP modes](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-modes/) and [settings](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/) to best suit your organization's needs. |
| 53 | +- Explore [Cloudflare Gateway](/cloudflare-one/policies/gateway/) to enforce advanced DNS, network, HTTP, and egress policies with WARP. |
0 commit comments