Skip to content

Commit 9100f96

Browse files
committed
Some updates based on latest UI
1 parent e82e57a commit 9100f96

File tree

8 files changed

+25
-22
lines changed

8 files changed

+25
-22
lines changed

src/content/docs/waf/custom-rules/skip/options.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,15 +36,15 @@ The available skip options in custom rules are the following:
3636

3737
- Skips specific security products that are not based on the Ruleset Engine. The products you can skip are the following:
3838

39-
- | Product name in the dashboard | API value |
40-
| ------------------------------------------------------------------------------------ | --------------- |
41-
| [Zone Lockdown](/waf/tools/zone-lockdown/) | `zoneLockdown` |
42-
| [User Agent Blocking](/waf/tools/user-agent-blocking/) | `uaBlock` |
43-
| [Browser Integrity Check](/waf/tools/browser-integrity-check/) | `bic` |
44-
| [Hotlink Protection](/waf/tools/scrape-shield/hotlink-protection/) | `hot` |
45-
| [Security Level](/waf/tools/security-level/) | `securityLevel` |
46-
| [Rate Limiting (previous version)](/waf/reference/legacy/old-rate-limiting/) | `rateLimit` |
47-
| [WAF managed rules (previous version)](/waf/reference/legacy/old-waf-managed-rules/) | `waf` |
39+
- | Product name in the dashboard | API value |
40+
| ---------------------------------------------------------------------------------- | --------------- |
41+
| [Zone Lockdown](/waf/tools/zone-lockdown/) | `zoneLockdown` |
42+
| [User Agent Blocking](/waf/tools/user-agent-blocking/) | `uaBlock` |
43+
| [Browser Integrity Check](/waf/tools/browser-integrity-check/) | `bic` |
44+
| [Hotlink Protection](/waf/tools/scrape-shield/hotlink-protection/) | `hot` |
45+
| [Security Level](/waf/tools/security-level/) | `securityLevel` |
46+
| [Rate limiting rules (Previous version)](/waf/reference/legacy/old-rate-limiting/) | `rateLimit` |
47+
| [Managed rules (Previous version)](/waf/reference/legacy/old-waf-managed-rules/) | `waf` |
4848

4949
- The API values are case-sensitive.
5050

src/content/docs/waf/detections/firewall-for-ai.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ The PII category for this request would be `EMAIL_ADDRESS`.
6161

6262
Then, use [Security Analytics](/waf/analytics/security-analytics/) in the new application security dashboard to validate that the WAF is correctly detecting prompts leaking PII data in incoming requests. Filter data by the `cf-llm` managed endpoint label and review the detection results on your traffic.
6363

64-
Alternatively, create a WAF custom rule like the one described in the next step using a _Log_ action. This rule will generate [security events](/waf/analytics/security-events/) that will allow you to validate your configuration.
64+
Alternatively, create a custom rule like the one described in the next step using a _Log_ action. This rule will generate [security events](/waf/analytics/security-events/) that will allow you to validate your configuration.
6565

6666
### 3. Mitigate requests containing PII
6767

src/content/docs/waf/detections/leaked-credentials/get-started.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ To check for leaked credentials in a way that is not covered by the default conf
117117

118118
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
119119
2. Go to **Security** > **Settings** and filter by **Detections**.
120-
3. Under **Leaked credentials detection** > **Configurations**, select the edit icon.
120+
3. Under **Leaked Credential Detection** > **Configurations**, select the edit icon.
121121
4. Select **Add custom username and password location**.
122122
5. In **Username location** and **Password location** (optional), enter expressions for obtaining the username and the password from the HTTP request. For example, you could use the following expressions:
123123

src/content/docs/waf/detections/malicious-uploads/get-started.mdx

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ WAF content scanning is available to customers on an Enterprise plan with a paid
2626

2727
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com), and select your account and domain.
2828
2. Go to **Security** > **Settings** and filter by **Detections**.
29-
3. Next to **Malicious upload detection**, set the toggle to **On**.
29+
3. Next to **Malicious uploads detection**, set the toggle to **On**.
3030

3131
</TabItem> <TabItem label="API">
3232

@@ -64,6 +64,8 @@ If you use the Expression Editor, enter the following expression:
6464
(cf.waf.content_scan.has_malicious_obj)
6565
```
6666

67+
Rule action: _Block_
68+
6769
This rule will match requests where Cloudflare detects a suspicious or malicious content object. For a list of fields provided by WAF content scanning, refer to [Content scanning fields](/waf/detections/malicious-uploads/#content-scanning-fields).
6870

6971
<Details header="Optional: Combine with other Rules language fields">
@@ -126,14 +128,15 @@ To check uploaded content in a way that is not covered by the default configurat
126128

127129
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
128130
2. Go to **Security** > **Settings** and filter by **Detections**.
129-
3. Under **Malicious upload detection** > **Configurations**, select the edit icon.
130-
4. In **Content location**, enter your custom scan expression. For example:
131+
3. Under **Malicious uploads detection** > **Configurations**, select the edit icon.
132+
4. Select **Add content location**.
133+
5. In **Content location**, enter your custom scan expression. For example:
131134

132135
```txt
133136
lookup_json_string(http.request.body.raw, "file")
134137
```
135138

136-
5. Select **Save**.
139+
6. Select **Save**.
137140

138141
</TabItem> <TabItem label="API">
139142

src/content/docs/waf/get-started.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -72,9 +72,9 @@ If you are an Enterprise customer, do the following:
7272

7373
- **If incoming requests match**:
7474

75-
| Field | Operator | Value |
76-
| ------------ | --------- | ----- |
77-
| Attack Score | less than | `20` |
75+
| Field | Operator | Value |
76+
| ---------------- | --------- | ----- |
77+
| WAF Attack Score | less than | `20` |
7878

7979
- **Choose action**: Block
8080

@@ -173,7 +173,7 @@ Create a rate limiting rule to [apply rate limiting on a login endpoint](/waf/ra
173173

174174
### Prevent credential stuffing attacks
175175

176-
Use [leaked credential checks](/waf/managed-rules/check-for-exposed-credentials/) to prevent <GlossaryTooltip term="credential stuffing" link="https://www.cloudflare.com/learning/bots/what-is-credential-stuffing/">credential stuffing</GlossaryTooltip> attacks on your applications.
176+
Use [leaked credentials detection](/waf/detections/leaked-credentials/) to prevent <GlossaryTooltip term="credential stuffing" link="https://www.cloudflare.com/learning/bots/what-is-credential-stuffing/">credential stuffing</GlossaryTooltip> attacks on your applications.
177177

178178
### Prevent users from uploading malware into your applications
179179

src/content/docs/waf/rate-limiting-rules/create-zone-dashboard.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ import { Render, Tabs, TabItem } from "~/components";
2828

2929
6. (Optional) Under **Cache status**, disable **Also apply rate limiting to cached assets** to consider only the requests that reach the origin when determining the rate.
3030

31-
7. Under **With the same characteristics**, add one or more characteristics that will define the request counters for rate limiting purposes. Each value combination will have its own counter to determine the rate. Refer to [How Cloudflare determines the request rate](/waf/rate-limiting-rules/request-rate/) for more information.
31+
7. Under **With the same characteristics**, add one or more [characteristics](/waf/rate-limiting-rules/parameters/#with-the-same-characteristics) that will define the request counters for rate limiting purposes. Each value combination will have its own counter to determine the rate. For more information, refer to [How Cloudflare determines the request rate](/waf/rate-limiting-rules/request-rate/).
3232

3333
8. (Optional) To define an expression that specifies the conditions for incrementing the rate counter, enable **Use custom counting expression** and set the expression. By default, the counting expression is the same as the rule expression. The counting expression can include [response fields](/ruleset-engine/rules-language/fields/reference/?field-category=Response).
3434

src/content/docs/waf/rate-limiting-rules/find-rate-limit.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Answering the following questions during your adjustments can help you with your
7878

7979
### 4. Create a rate limiting rule
8080

81-
1. Select **Create rate limit rule** to go to the [rate limiting creation page](/waf/rate-limiting-rules/create-zone-dashboard/) with your filters, characteristics, and selected rate limit pre-populated.
81+
1. In the **Request rate analysis** tab, select **Create rate limit rule** to go to the [rate limiting creation page](/waf/rate-limiting-rules/create-zone-dashboard/) with your filters, characteristics, and selected rate limit pre-populated.
8282

8383
2. Select the rule action. Depending on your needs, you can set the rule to log, challenge, or block requests exceeding the selected threshold.
8484

src/content/partials/waf/leaked-credentials-detection-enable.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ On Free plans, the leaked credentials detection is enabled by default, and no ac
1616

1717
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com), and select your account and domain.
1818
2. Go to **Security** > **Settings** and filter by **Detections**.
19-
3. Next to **Leaked credentials detection**, set the toggle to **On**.
19+
3. Next to **Leaked Credential Detection**, set the toggle to **On**.
2020

2121
</TabItem> <TabItem label="API">
2222

0 commit comments

Comments
 (0)