Skip to content

Commit 9f754d3

Browse files
committed
Update leaked credentials field table
1 parent 68a0cd7 commit 9f754d3

File tree

1 file changed

+9
-7
lines changed
  • src/content/docs/waf/detections/leaked-credentials

1 file changed

+9
-7
lines changed

src/content/docs/waf/detections/leaked-credentials/index.mdx

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ sidebar:
77
label: Leaked credentials
88
---
99

10+
import { Type } from "~/components";
11+
1012
The leaked credentials [traffic detection](/waf/detections/) scans incoming requests for credentials (usernames and passwords) previously leaked from [data breaches](https://www.cloudflare.com/learning/security/what-is-a-data-breach/).
1113

1214
:::note
@@ -96,13 +98,13 @@ For instructions on configuring a custom detection location, refer to [Get start
9698

9799
## Leaked credentials fields
98100

99-
| Field name in the dashboard | Field | Availability |
100-
| --------------------------- | ----------------------------------------------------------- | ------------------ |
101-
| Password Leaked | [`cf.waf.credential_check.password_leaked`][1] | All plans |
102-
| User and Password Leaked | [`cf.waf.credential_check.username_and_password_leaked`][2] | Pro plan and above |
103-
| Username Leaked | [`cf.waf.credential_check.username_leaked`][3] | Enterprise plan |
104-
| Similar Password Leaked | [`cf.waf.credential_check.username_password_similar`][4] | Enterprise plan |
105-
| Authentication detected | [`cf.waf.auth_detected`][5] | Enterprise plan |
101+
| Field | Required plan | Description |
102+
| ------------------------------------------------------------------------------------------------------------------------ | --------------- | ---------------------------------------------------------------------------------------------------------------------------- |
103+
| Password Leaked <br/> [`cf.waf.credential_check.password_leaked`][1] <br/> <Type text="Boolean" /> | N/A (all plans) | Indicates whether the password detected in the request was previously leaked. |
104+
| User and Password Leaked <br/> [`cf.waf.credential_check.username_and_password_leaked`][2] <br/> <Type text="Boolean" /> | Pro and above | Indicates whether the (username-password pair detected in the request were previously leaked. |
105+
| Username Leaked <br/> [`cf.waf.credential_check.username_leaked`][3] <br/> <Type text="Boolean" /> | Enterprise | Indicates whether the username detected in the request was previously leaked. |
106+
| Similar Password Leaked <br/> [`cf.waf.credential_check.username_password_similar`][4] <br/> <Type text="Boolean" /> | Enterprise | Indicates whether a similar version of the username and password credentials detected in the request were previously leaked. |
107+
| Authentication detected <br/> [`cf.waf.auth_detected`][5] <br/> <Type text="Boolean" /> | Enterprise | Indicates whether Cloudflare detected authentication credentials in the request. |
106108

107109
[1]: /ruleset-engine/rules-language/fields/reference/cf.waf.credential_check.password_leaked/
108110
[2]: /ruleset-engine/rules-language/fields/reference/cf.waf.credential_check.username_and_password_leaked/

0 commit comments

Comments
 (0)