Skip to content

Commit 94b27f7

Browse files
committed
dex, risk-score, gateway, email-security
1 parent af3477b commit 94b27f7

File tree

4 files changed

+135
-28
lines changed

4 files changed

+135
-28
lines changed
Lines changed: 30 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,42 @@
11
---
22
pcx_content_type: changelog
33
title: Digital Experience Monitoring
4-
release_notes_file_name:
5-
- dex
64
head:
75
- tag: title
86
content: Digital Experience Monitoring Changelog
97
description: Review recent changes to Digital Experience Monitoring.
10-
118
---
129

13-
import { ProductReleaseNotes, Render } from "~/components"
10+
import { ProductChangelog } from "~/components";
11+
12+
{/* <!-- All changelog entries live in src/content/changelogs/dex/. */}
13+
14+
<ProductChangelog product="dex" hideEntry="2024-06-16-cloudflare-one" />
15+
16+
## 2025-01-24
17+
18+
**IP visibility**
19+
20+
[IP visibility](/cloudflare-one/insights/dex/ip-visibility/) enables admins to inspect the different IP addresses associated with an end-user device. IP types available for review on the Cloudflare dashboard include: the device's private IP, the public IP assigned to the device by the ISP, and the router's (that the device is connected to) private IP.
21+
22+
## 2024-12-19
23+
24+
**Remote captures**
25+
26+
Admins can now collect packet captures (PCAPs) and WARP diagnostic logs from end-user devices. For more information, refer to [Remote captures](/cloudflare-one/insights/dex/remote-captures/).
27+
28+
## 2024-05-20
29+
30+
**Last seen ISP**
31+
32+
Admins can view the last ISP seen for a device by going to **My Team** > **Devices**. Requires setting up a [traceroute test](/cloudflare-one/insights/dex/tests/traceroute/).
33+
34+
## 2024-05-13
1435

15-
<Render file="changelog-note" />
36+
**DEX alerts**
1637

17-
{/* <!-- All changelog entries live in src/content/changelogs/dex.yaml. For more details, refer to https://developers.cloudflare.com/style-guide/documentation-content-strategy/content-types/changelog/#yaml-file --> */}
38+
Admins can now set [DEX alerts](/cloudflare-one/insights/dex/notifications/) using [Cloudflare Notifications](/notifications/). Three new DEX alert types:
1839

19-
<ProductReleaseNotes />
40+
- Device connectivity anomaly
41+
- Test latency
42+
- Test low availability
Lines changed: 23 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,31 @@
11
---
22
pcx_content_type: changelog
33
title: Email Security
4-
release_notes_file_name:
5-
- email-security
6-
74
---
85

9-
import { ProductReleaseNotes, Render } from "~/components"
6+
import { ProductChangelog } from "~/components";
7+
8+
{/* <!-- All changelog entries live in src/content/changelogs/email-security/. */}
9+
10+
<ProductChangelog
11+
product="email-security"
12+
hideEntry="2024-06-16-cloudflare-one"
13+
/>
14+
15+
## 2024-12-19
16+
17+
**Email Security expanded folder scanning**
18+
19+
Microsoft 365 customers can now choose to scan all folders or just the inbox when deploying via the Graph API.
20+
21+
## 2024-08-06
22+
23+
**Email Security is live**
24+
25+
Email Security is now live under Zero Trust.
1026

11-
<Render file="changelog-note" />
27+
## 2024-08-06
1228

13-
{/* <!-- Actual content lives in /src/content/release-notes/email-security.yaml. Update the file there for new entries to appear here. For more details, refer to https://developers.cloudflare.com/style-guide/documentation-content-strategy/content-types/changelog/#yaml-file --> */}
29+
**Microsoft Graph API deployment.**
1430

15-
<ProductReleaseNotes />
31+
Customers using Microsoft Office 365 can set up Email Security via Microsoft Graph API.
Lines changed: 74 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,86 @@
11
---
22
pcx_content_type: changelog
33
title: Gateway
4-
release_notes_file_name:
5-
- gateway
64
head:
75
- tag: title
86
content: Gateway Changelog
97
description: Review recent changes to Cloudflare Gateway.
10-
118
---
129

13-
import { ProductReleaseNotes, Render } from "~/components"
10+
import { ProductChangelog } from "~/components";
11+
12+
{/* <!-- All changelog entries live in src/content/changelogs/gateway/. */}
13+
14+
<ProductChangelog product="gateway" hideEntry="2024-06-16-cloudflare-one" />
15+
16+
## 2025-02-12
17+
18+
**Upload/Download File Size selectors for HTTP policies**
19+
20+
Gateway and DLP users can now create HTTP policies with the [Download and Upload File Size (MiB)](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-size) traffic selectors. This update allows users to block uploads or downloads based on file size.
21+
22+
## 2025-02-02
23+
24+
**The default global Cloudflare root certificate expired on 2025-02-02 at 16:05 UTC**
25+
26+
If you installed the default Cloudflare certificate before 2024-10-17, you must generate a new certificate and activate it for your Zero Trust organization to avoid inspection errors. Refer to [Troubleshooting](/cloudflare-one/faq/troubleshooting/#as-of-february-2-2025-my-end-user-devices-browser-is-returning-a-your-connection-is-not-private-warning) for instructions and troubleshooting steps.
27+
28+
## 2025-01-08
29+
30+
**Bring your own resolver IP (BYOIP) for DNS locations**
31+
32+
Enterprise users can now [provide an IP address](/cloudflare-one/connections/connect-devices/agentless/dns/locations/dns-resolver-ips/#bring-your-own-dns-resolver-ip) for a private DNS resolver to use with [DNS locations](/cloudflare-one/connections/connect-devices/agentless/dns/locations/). Gateway supports bringing your own IPv4 and IPv6 addresses.
33+
34+
## 2024-11-20
35+
36+
**Category filtering in the network policy builder**
37+
38+
Gateway users can now create network policies with the [Content Categories](/cloudflare-one/policies/gateway/network-policies/#content-categories) and [Security Risks](/cloudflare-one/policies/gateway/network-policies/#security-risks) traffic selectors. This update simplifies malicious traffic blocking and streamlines network monitoring for improved security management.
39+
40+
## 2024-10-17
41+
42+
**Per-account Cloudflare root certificate**
43+
44+
Gateway users can now generate [unique root CAs](/cloudflare-one/connections/connect-devices/user-side-certificates/) for their Zero Trust account. Both generated certificate and custom certificate users must [activate a root certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/#activate-a-root-certificate) to use it for inspection. Per-account certificates replace the default Cloudflare certificate, which is set to expire on 2025-02-02.
45+
46+
## 2024-10-10
47+
48+
**Time-based policy duration**
49+
50+
Gateway now offers [time-based DNS policy duration](/cloudflare-one/policies/gateway/dns-policies/timed-policies/#time-based-policy-duration). With policy duration, you can configure a duration of time for a policy to turn on or set an exact date and time to turn a policy off.
51+
52+
## 2024-10-04
53+
54+
**Expanded Gateway log fields**
55+
56+
Gateway now offers new fields in [activity logs](/cloudflare-one/insights/logs/gateway-logs/) for DNS, network, and HTTP policies to provide greater insight into your users' traffic routed through Gateway.
57+
58+
## 2024-09-30
59+
60+
**File sandboxing**
61+
62+
Gateway users on Enterprise plans can create HTTP policies with [file sandboxing](/cloudflare-one/policies/gateway/http-policies/file-sandboxing/) to quarantine previously unseen files downloaded by your users and scan them for malware.
63+
64+
## 2024-07-30
65+
66+
**UK NCSC indicator feed publicly available in Gateway**
67+
68+
Gateway users on any plan can now use the [PDNS threat intelligence feed](/security-center/indicator-feeds/#publicly-available-feeds) provided by the UK National Cyber Security Centre (NCSC) in DNS policies.
69+
70+
## 2024-07-14
71+
72+
**Gateway DNS filter non-authenticated queries**
73+
74+
Gateway users can now select which endpoints to use for a given DNS location. Available endpoints include IPv4, IPv6, DNS over HTTPS (DoH), and DNS over TLS (DoT). Users can protect each configured endpoint by specifying allowed source networks. Additionally, for the DoH endpoint, users can filter traffic based on source networks and/or authenticate user identity tokens.
75+
76+
## 2024-06-25
77+
78+
**Gateway DNS policy setting to ignore CNAME category matches**
79+
80+
Gateway now offers the ability to selectively ignore CNAME domain categories in DNS policies via the [**Ignore CNAME domain categories** setting](/cloudflare-one/policies/gateway/domain-categories/#ignore-cname-domain-categories) in the policy builder and the [`ignore_cname_category_matches` setting](/api/resources/zero_trust/subresources/gateway/subresources/rules/methods/create/) in the API.
1481

15-
<Render file="changelog-note" />
82+
## 2024-04-05
1683

17-
{/* <!-- All changelog entries live in src/content/changelogs/gateway.yaml. For more details, refer to https://developers.cloudflare.com/style-guide/documentation-content-strategy/content-types/changelog/#yaml-file --> */}
84+
**Gateway file type control improvements**
1885

19-
<ProductReleaseNotes />
86+
Gateway now offers a more extensive, categorized [list of files](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types) to control uploads and downloads.
Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,20 @@
11
---
22
pcx_content_type: changelog
33
title: Risk score
4-
release_notes_file_name:
5-
- risk-score
64
head:
75
- tag: title
86
content: Risk score Changelog
97
description: Review recent changes to Cloudflare Zero Trust user risk scoring.
10-
118
---
129

13-
import { ProductReleaseNotes, Render } from "~/components"
10+
import { ProductChangelog } from "~/components";
11+
12+
{/* <!-- All changelog entries live in src/content/changelogs/risk-score/. */}
13+
14+
<ProductChangelog product="risk-score" hideEntry="2024-06-16-cloudflare-one" />
1415

15-
<Render file="changelog-note" />
16+
## 2024-06-14
1617

17-
{/* <!-- All changelog entries live in src/content/changelogs/risk-score.yaml. For more details, refer to https://developers.cloudflare.com/style-guide/documentation-content-strategy/content-types/changelog/#yaml-file --> */}
18+
**SentinelOne signal ingestion**
1819

19-
<ProductReleaseNotes />
20+
You can now configure a [predefined risk behavior](/cloudflare-one/insights/risk-score/#predefined-risk-behaviors) to evaluate user risk score using device posture attributes from the [SentinelOne integration](/cloudflare-one/identity/devices/service-providers/sentinelone/).

0 commit comments

Comments
 (0)