You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/insights/dex/monitoring.mdx
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,18 +9,18 @@ Monitor performance and network status for your organization's [fleet](/cloudfla
9
9
10
10
Network and device performance data helps IT administrators troubleshoot performance issues, investigate network connectivity problems, and monitor device health.
11
11
12
-
## Fleet status
12
+
## Device overview
13
13
14
-
A fleet is a collection of user devices. All devices in a fleet have WARP installed and are connected to a [Cloudflare Zero Trust organization](/cloudflare-one/setup/#create-a-zero-trust-organization).
14
+
A fleet is a collection of user devices. All devices in a fleet have WARP installed and are connected to a [Zero Trust organization](/cloudflare-one/setup/#create-a-zero-trust-organization).
15
15
16
16
To view fleet status:
17
17
18
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DEX** > **Monitoring**.
19
-
2. In **DEX Monitoring**, review the information under the **Fleet Status** tab.
18
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience**.
19
+
2. In **Device overview**, review the information under the **Live analytics** tab.
20
20
21
21
### View metrics
22
22
23
-
The **Fleet Status** tab will show real-time and historical connectivity metrics for all devices in your organization.
23
+
The **Device overview** tab will show real-time and historical connectivity metrics for all devices in your organization.
24
24
25
25
To view analytics on a per-device level, go to [Device monitoring](/cloudflare-one/insights/dex/monitoring/#device-monitoring).
26
26
@@ -39,15 +39,15 @@ To view analytics on a per-device level, go to [Device monitoring](/cloudflare-o
39
39
40
40
-**Mode**: [WARP mode](/cloudflare-one/team-and-resources/devices/warp/configure-warp/warp-modes/) deployed on the device.
41
41
42
-
-**Colo**: Percentage of devices connected to a given Cloudflare data center.
42
+
-**Colocation**: Percentage of devices connected to a given Cloudflare data center.
43
43
44
44
-**Platform**: Operating system of the device.
45
45
46
-
-**Major Version**: WARP client version installed on the device.
46
+
-**Major version**: WARP client version installed on the device.
47
47
48
-
-**Device Status Over Time**: WARP client connection status over the selected time period.
48
+
-**Device status over time**: WARP client connection status over the selected time period.
49
49
50
-
-**Connection Methods Over Time**: WARP mode used by the device over the selected time period.
50
+
-**Connection methods over time**: WARP mode used by the device over the selected time period.
51
51
52
52
## Device monitoring
53
53
@@ -57,10 +57,10 @@ Review network and device performance for a device enrolled in your fleet.
57
57
58
58
To view a device's network and device performance metrics:
59
59
60
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My team** > **Devices**.
60
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Teams & Resources** > **Devices**.
61
61
2. Select a device > **View details**.
62
-
3. Select the **DEX** tab.
63
-
4.In **Device Monitoring**, scroll down to **Network performance** and **Device Performance**.
62
+
3. Select the **Monitoring** tab.
63
+
4.Scroll down to **Network performance** and **Device Performance**.
@@ -15,15 +15,25 @@ Gateway logs will only show the public IP address for the **Source IP** field. P
15
15
16
16
Gateway activity logs show the individual DNS queries, Network packets, and HTTP requests inspected by Gateway. You can also download encrypted [SSH command logs](/cloudflare-one/traffic-policies/network-policies/ssh-logging/) for sessions proxied by Gateway.
17
17
18
-
To view Gateway activity logs, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **Gateway**. Select an individual row to investigate the event in more detail.
18
+
To view Gateway activity logs:
19
+
20
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights**.
21
+
2. Go to **Logs** and select the Gateway logs you are interested in reviewing (DNS queries, Network packets, or HTTP requests.)
22
+
3. Select an individual row to investigate the event in more detail.
19
23
20
24
Enterprise users can generate more detailed logs with [Logpush](/cloudflare-one/insights/logs/logpush/).
21
25
22
26
## Selective logging
23
27
24
-
By default, Gateway logs all events, including DNS queries and HTTP requests that are allowed and not a risk. You can choose to disable logs or only log blocked requests. To customize what type of events are recorded, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Settings** > **Network**. Under **Activity Logging**, indicate your DNS, Network, and HTTP log preferences.
28
+
By default, Gateway logs all events, including DNS queries and HTTP requests that are allowed and not a risk. You can choose to disable logs or only log blocked requests.
29
+
30
+
To customize what type of events are recorded:
31
+
32
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Traffic policies**.
33
+
2. Go to **Traffic settings**.
34
+
3. Select **Traffic logging**, and indicate your Gateway DNS, Network, and HTTP log preferences.
25
35
26
-
These settings will only apply to logs displayed in Zero Trust. Logpush data is unaffected.
36
+
These settings will only apply to logs displayed in Cloudflare One. Logpush data is unaffected.
27
37
28
38
## DNS logs
29
39
@@ -62,7 +72,7 @@ These settings will only apply to logs displayed in Zero Trust. Logpush data is
62
72
|**Registration ID**| UUID of the user's WARP client registration. A unique registration ID is generated each time a device is registered for a particular email. The same physical device may have multiple registration IDs. |
63
73
|**Device name**| Display name of the device returned by the operating system to the WARP client. Typically this is the hostname of a device. Not all devices will have a device name. Device names are not guaranteed to be unique. |
64
74
|**Device ID**| UUID of the device connected with the WARP client. Each physical device in your organization will have a UUID. |
65
-
|**Last authenticated**| Date and time the user last authenticated their Zero Trust session. |
75
+
|**Last authenticated**| Date and time the user last authenticated their session. |
66
76
67
77
#### DNS query details
68
78
@@ -159,7 +169,7 @@ Gateway can log failed connections in [network session logs](/logs/logpush/logpu
159
169
|**Registration ID**| ID of the user's device registration. This is generated by the WARP client. |
160
170
|**Device name**| Name of the device that sent the packet. |
161
171
|**Device ID**| ID of the physical device that sent the packet. This is generated by the WARP client. |
162
-
|**Last authenticated**| Date and time the user last authenticated with Zero Trust. |
172
+
|**Last authenticated**| Date and time the user last authenticated with Cloudflare One. |
163
173
164
174
#### Network query details
165
175
@@ -229,7 +239,7 @@ When an HTTP request results in an error, Gateway logs the first 512 bytes of th
229
239
|**Registration ID**| ID of the user's device registration. This is generated by the WARP client. |
230
240
|**Device name**| Name of the device that made the request. |
231
241
|**Device ID**| ID of the physical device that made the request. This is generated by the WARP client on the device that created the request. |
232
-
|**Last authenticated**| Date and time the user last authenticated with Zero Trust. |
242
+
|**Last authenticated**| Date and time the user last authenticated with Cloudflare One. |
233
243
234
244
#### HTTP query details
235
245
@@ -275,13 +285,13 @@ Enhanced file detection is an optional feature to extract more file information
275
285
276
286
To turn on enhanced file detection:
277
287
278
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Network**.
279
-
2. In **Firewall**, turn on **TLS decryption**.
288
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Traffic policies** > **Traffic settings**.
289
+
2. In **Proxy and inspection**, turn on **Inspect HTTPS requests with TLS decryption**.
280
290
3. In **Gateway Logging**, turn on **Enable enhanced file detection**.
281
291
282
292
### Isolate requests
283
293
284
-
When a user creates an [isolation policy](/cloudflare-one/remote-browser-isolation/isolation-policies/), Gateway logs the initial request that triggers isolation as an Isolate action. Because this request is not isolated yet, the `is_isolated` field will return `false`. Zero Trust then securely returns the result to the user in an isolated browser. Gateway will log all subsequent requests in the isolated browser with the action (such as Allow or Block), and the `is_isolated` field will return `true`.
294
+
When a user creates an [isolation policy](/cloudflare-one/remote-browser-isolation/isolation-policies/), Gateway logs the initial request that triggers isolation as an Isolate action. Because this request is not isolated yet, the `is_isolated` field will return `false`. Cloudflare One then securely returns the result to the user in an isolated browser. Gateway will log all subsequent requests in the isolated browser with the action (such as Allow or Block), and the `is_isolated` field will return `true`.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/insights/logs/gateway-logs/manage-pii.mdx
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,11 @@ Cloudflare Gateway can log the following types of PII:
23
23
24
24
Enabling this setting means Cloudflare Gateway will log activity without storing any employee PII. Changes to this setting will not change PII storage of any previous logs. This means if Exclude PII is enabled and then disabled, there will be no PII data for logs captured while Exclude PII was enabled. The PII data will be unavailable to all roles within your Zero Trust organization, including the Super Admin.
25
25
26
-
To enable or disable this setting, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Traffic policies** > **Traffic settings** > **Exclude personally identifiable information (PII) from logs**.
26
+
To enable or disable this setting:
27
+
28
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Traffic policies**.
29
+
2. Go to **Traffic settings**.
30
+
2. Toggle **Exclude personally identifiable information (PII) from logs** to your desired state.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/insights/logs/index.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,8 +40,8 @@ For more information, refer to [Log Explorer](/log-explorer/).
40
40
41
41
## Customer Metadata Boundary
42
42
43
-
Cloudflare Zero Trust can be used with the Data Localization Suite to ensure that data storage is restricted to a specific geographic region. For more information refer to [Customer Metadata Boundary](/data-localization/metadata-boundary/).
43
+
Cloudflare Zero Trust can be used with the Data Localization Suite to ensure that data storage is restricted to a specific geographic region. For more information, refer to [Customer Metadata Boundary](/data-localization/metadata-boundary/).
44
44
45
45
## Data privacy
46
46
47
-
For more information on how we use this data, refer to our[Privacy Policy](https://www.cloudflare.com/application/privacypolicy/).
47
+
For more information on how we use this data, refer to Cloudflare's[Privacy Policy](https://www.cloudflare.com/application/privacypolicy/).
0 commit comments