Skip to content

Commit 9fd5c48

Browse files
authored
[ZT] Overview audit (#16671)
1 parent 4bfcdb8 commit 9fd5c48

File tree

17 files changed

+114
-138
lines changed

17 files changed

+114
-138
lines changed

src/content/docs/cloudflare-one/applications/scan-apps/casb-integrations/index.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ You can integrate the following SaaS applications with Cloudflare CASB:
99

1010
- [Atlassian Confluence](atlassian-confluence/)
1111
- [Atlassian Jira](atlassian-jira/)
12+
- [Bitbucket Cloud](bitbucket-cloud/)
1213
- [Box](box/)
1314
- [Dropbox](dropbox/)
1415
- [GitHub](github/)

src/content/docs/cloudflare-one/applications/scan-apps/manage-findings.mdx

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,14 @@ sidebar:
66
head:
77
- tag: title
88
content: Manage security findings
9-
109
---
1110

1211
Findings are security issues detected within SaaS applications that involve users, data at rest, and other configuration settings. With Cloudflare CASB, you can review a comprehensive list of findings in Zero Trust and immediately start taking action on the issues found.
1312

1413
## Prerequisites
1514

16-
* You have [added](/cloudflare-one/applications/scan-apps/#add-an-integration) a CASB integration.
17-
* Your scan has surfaced at least one security finding.
15+
- You have [added](/cloudflare-one/applications/scan-apps/#add-an-integration) a CASB integration.
16+
- Your scan has surfaced at least one security finding.
1817

1918
## View findings
2019

@@ -43,18 +42,18 @@ File findings for some integrations (such as [Microsoft 365](/cloudflare-one/app
4342

4443
Cloudflare CASB labels each finding with one of the following severity levels:
4544

46-
* **Critical**: Suggests the finding is something your team should act on today.
47-
* **High**: Suggests the finding is something your team should act on this week.
48-
* **Medium**: Suggests the finding should be reviewed sometime this month.
49-
* **Low**: Suggests the finding is informational or part of a scheduled review process.
45+
- **Critical**: Suggests the finding is something your team should act on today.
46+
- **High**: Suggests the finding is something your team should act on this week.
47+
- **Medium**: Suggests the finding should be reviewed sometime this month.
48+
- **Low**: Suggests the finding is informational or part of a scheduled review process.
5049

5150
### Change the severity level
5251

5352
You can change the severity level for a finding at any time, in case the default assignment does not suit your environment:
5453

5554
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
5655
2. Locate the finding you want to modify and select **View**.
57-
3. In the severity level drop-down menu, choose your desired setting (*Critical*, *High*, *Medium*, or *Low*).
56+
3. In the severity level drop-down menu, choose your desired setting (_Critical_, _High_, _Medium_, or _Low_).
5857

5958
The new severity level will only apply to the finding within this specific integration. If you added multiple integrations of the same SaaS application, the other integrations will not be impacted by this change.
6059

@@ -64,19 +63,19 @@ Using the security findings from CASB allows for fine-grained Gateway policies w
6463

6564
:::note[Before you begin]
6665

67-
Ensure that you have [enabled HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/) for your organization.
66+
Ensure that you have [enabled HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/) for your organization.
6867
:::
6968

7069
To create a Gateway policy directly from a CASB finding:
7170

7271
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Findings**.
7372
2. Locate the finding you want to modify and select **View**.
7473
3. Find the instance you want to block and select its three-dot menu.
75-
4. Select **Block with Gateway HTTP policy**. A new browser tab will open with a pre-filled HTTP policy.
74+
4. Select **Block with Gateway HTTP policy**. A new browser tab will open with a pre-filled HTTP policy.
7675
:::note
77-
78-
Not all CASB findings will have the **Block with Gateway HTTP policy** option. Unsupported findings can only be resolved from your SaaS application dashboard or through your domain provider.
76+
Not all CASB findings will have the **Block with Gateway HTTP policy** option. Unsupported findings can only be resolved from your SaaS application dashboard or through your domain provider.
7977
:::
78+
8079
5. (Optional) [Customize the HTTP policy](/cloudflare-one/policies/gateway/http-policies/). For example, if the policy blocks an unsanctioned third-party app, you can apply the policy to some or all users, or only block uploads or downloads.
8180
6. Select **Save**.
8281

src/content/docs/cloudflare-one/connections/connect-devices/agentless/dns/index.mdx

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,10 @@ pcx_content_type: navigation
33
title: DNS
44
sidebar:
55
order: 1
6-
6+
group:
7+
hideIndex: true
78
---
89

9-
import { DirectoryListing } from "~/components"
10-
11-
:::caution
12-
13-
14-
Deploying Gateway DNS filtering using static IP addresses may prevent users from connecting to public Wi-Fi networks through captive portals.
15-
16-
17-
:::
10+
import { DirectoryListing } from "~/components";
1811

1912
<DirectoryListing />

src/content/docs/cloudflare-one/connections/connect-devices/agentless/dns/locations/index.mdx

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
pcx_content_type: how-to
3-
title: Add locations
3+
title: Locations
44
sidebar:
55
order: 1
6-
6+
label: Add locations
77
---
88

9-
import { GlossaryDefinition, Render } from "~/components"
9+
import { GlossaryDefinition, Render } from "~/components";
1010

1111
<Render file="gateway/add-locations" />
1212

@@ -26,18 +26,16 @@ Cloudflare will prefill the [**Source IPv4 Address**](/cloudflare-one/connection
2626

2727
You do not need to configure the IPv4 DNS endpoint if:
2828

29-
* Your network only uses IPv6.
30-
* Your users will send all DNS requests from this location using [DNS over HTTPS](#dns-over-https-doh) via a browser.
31-
* You will deploy the [WARP client](/cloudflare-one/connections/connect-devices/warp/).
29+
- Your network only uses IPv6.
30+
- Your users will send all DNS requests from this location using [DNS over HTTPS](#dns-over-https-doh) via a browser.
31+
- You will deploy the [WARP client](/cloudflare-one/connections/connect-devices/warp/).
3232

3333
:::note[Your IPv4 address is taken]
3434

35-
3635
When you try to configure a DNS location over IPv4, Gateway may display a **Your source IPv4 address is taken** error. This may mean someone else in the same network configured Gateway before you did. If your network supports IPv6, you can still use Gateway's DNS filtering by sending DNS queries over IPv6. You can also use the DNS over HTTPS hostname to send queries using a DNS over HTTPS client.
3736

3837
If you think someone else is wrongfully using this IPv4 address, [contact Cloudflare support](/support/contacting-cloudflare-support/#getting-help-with-an-issue).
3938

40-
4139
:::
4240

4341
### DNS over TLS (DoT)

src/content/docs/cloudflare-one/implementation-guides/index.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,12 @@ pcx_content_type: navigation
33
title: Implementation guides
44
sidebar:
55
order: 3
6+
group:
7+
hideIndex: true
68
head: []
79
description: View implementation guides for Cloudflare Zero Trust.
8-
910
---
1011

11-
import { DirectoryListing } from "~/components"
12+
import { DirectoryListing } from "~/components";
1213

1314
<DirectoryListing />

src/content/docs/cloudflare-one/insights/analytics/index.mdx

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,12 @@ pcx_content_type: navigation
33
title: Analytics
44
sidebar:
55
order: 1
6-
6+
group:
7+
hideIndex: true
78
---
89

9-
import { DirectoryListing } from "~/components"
10+
import { DirectoryListing } from "~/components";
1011

11-
The Analytics section of [Zero Trust](https://one.dash.cloudflare.com/) provides a summary of your Access application and Gateway DNS traffic.
12+
[Zero Trust](https://one.dash.cloudflare.com/) analytics provide a summary of your applications and traffic.
1213

1314
<DirectoryListing />

src/content/docs/cloudflare-one/insights/index.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,11 @@ pcx_content_type: navigation
33
title: Insights
44
sidebar:
55
order: 8
6-
6+
group:
7+
hideIndex: true
78
---
89

9-
import { DirectoryListing } from "~/components"
10+
import { DirectoryListing } from "~/components";
1011

1112
Cloudflare Zero Trust gives you comprehensive and in-depth visibility into your network. Whether you need data on network usage, on security threats blocked by Cloudflare Zero Trust, or on how many users have logged in to your applications this month, Zero Trust provides you with the right tools for the job.
1213

src/content/docs/cloudflare-one/policies/browser-isolation/index.mdx

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,16 @@ pcx_content_type: concept
33
title: Browser Isolation
44
sidebar:
55
order: 5
6-
76
---
87

8+
:::note
9+
Available as an add-on to Zero Trust Pay-as-you-go and Enterprise plans.
10+
:::
11+
912
Cloudflare Browser Isolation complements the [Secure Web Gateway](/cloudflare-one/policies/gateway/) and [Zero Trust Network Access](/cloudflare-one/connections/connect-networks/) solutions by executing active webpage content in a secure isolated browser. Executing active content remotely from the endpoint protects users from zero-day attacks and malware. In addition to protecting endpoints, Browser Isolation also protects users from phishing attacks by preventing user input on risky websites and controlling data transmission to sensitive web applications. You can further filter isolated traffic with Gateway [HTTP](/cloudflare-one/policies/gateway/http-policies/) and [DNS](/cloudflare-one/policies/gateway/dns-policies/) policies.
1013

1114
Remote browsing is invisible to the user who continues to use their browser normally without changing their preferred browser and habits. Every open tab and window is automatically isolated. When the user closes the isolated browser, their session is automatically deleted.
1215

13-
## Feature availability
14-
15-
Browser Isolation is available as an add-on to Zero Trust Pay-as-you-go and Enterprise plans.
16-
1716
## Privacy
1817

19-
Cloudflare Browser Isolation is a security product. In order to serve transparent isolated browsing and block web based threats our network decrypts Internet traffic using the [Cloudflare Root CA](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/). Traffic logs are retained as per the [Zero Trust](/cloudflare-one/insights/logs/) documentation.
18+
Cloudflare Browser Isolation is a security product. In order to serve transparent isolated browsing and block web based threats our network decrypts Internet traffic using the [Cloudflare root CA](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/). Traffic logs are retained as per the [Zero Trust](/cloudflare-one/insights/logs/) documentation.

src/content/docs/cloudflare-one/policies/browser-isolation/setup/index.mdx

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ pcx_content_type: how-to
33
title: Set up Browser Isolation
44
sidebar:
55
order: 1
6-
6+
label: Get started
77
---
88

99
Browser Isolation is enabled through Secure Web Gateway HTTP policies. By default, no traffic is isolated until you have added an Isolate policy to your HTTP policies.
@@ -12,8 +12,6 @@ Browser Isolation is enabled through Secure Web Gateway HTTP policies. By defaul
1212

1313
Setup instructions vary depending on how you want to connect your devices to Cloudflare. Refer to the links below to view the setup guide for each deployment option.
1414

15-
16-
1715
| Connection | Mode | Description |
1816
| ----------------------------------------------------------------------------------------------------------- | ------------ | -------------------------------------------------------------------------------------------------------------------- |
1917
| [Gateway with WARP](/cloudflare-one/policies/gateway/initial-setup/http/) | In-line | Apply identity-based HTTP policies to traffic proxied through the WARP client. |
@@ -22,16 +20,14 @@ Setup instructions vary depending on how you want to connect your devices to Clo
2220
| [Magic WAN](/cloudflare-one/policies/browser-isolation/setup/non-identity/) | In-line | Apply non-identity HTTP policies to traffic connected through a GRE or IPsec tunnel. |
2321
| [Clientless remote browser](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/) | Prefixed URL | Render web pages in a remote browser when users go to `https://<your-team-name>.cloudflareaccess.com/browser/<URL>`. |
2422

25-
26-
2723
## 2. Build an Isolation policy
2824

2925
To configure Browser Isolation policies:
3026

3127
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Gateway** > **Firewall Policies** > **HTTP**.
3228
2. Select **Add a policy** and enter a name for the policy.
3329
3. Use the HTTP policy [selectors](/cloudflare-one/policies/gateway/http-policies/#selectors) and [operators](/cloudflare-one/policies/gateway/http-policies/#comparison-operators) to specify the websites or content you want to isolate.
34-
4. For **Action**, choose either [*Isolate*](/cloudflare-one/policies/browser-isolation/isolation-policies/#isolate) or [*Do not Isolate*](/cloudflare-one/policies/browser-isolation/isolation-policies/#do-not-isolate).
30+
4. For **Action**, choose either [_Isolate_](/cloudflare-one/policies/browser-isolation/isolation-policies/#isolate) or [_Do not Isolate_](/cloudflare-one/policies/browser-isolation/isolation-policies/#do-not-isolate).
3531
5. (Optional) Configure [settings](/cloudflare-one/policies/browser-isolation/isolation-policies/#policy-settings) for an Isolate policy.
3632
6. Select **Create policy**.
3733

@@ -41,26 +37,26 @@ Next, [verify that your policy is working](#3-check-if-a-web-page-is-isolated).
4137

4238
Users can see if a webpage is isolated by using one of the following methods:
4339

44-
* Select the padlock in the address bar and check for the presence of a Cloudflare Root CA.
45-
* Right-click the web page and view the context menu options.
40+
- Select the padlock in the address bar and check for the presence of a Cloudflare Root CA.
41+
- Right-click the web page and view the context menu options.
4642

4743
### Normal browsing
4844

49-
* A non-Cloudflare root certificate indicates that Cloudflare did not proxy this web page.
45+
- A non-Cloudflare root certificate indicates that Cloudflare did not proxy this web page.
5046

5147
![Website does not present a Cloudflare root certificate](~/assets/images/cloudflare-one/rbi/non-cloudflare-root-ca.png)
5248

53-
* The right-click context menu will have all of the normal options.
49+
- The right-click context menu will have all of the normal options.
5450

5551
![Normal right-click menu in browser](~/assets/images/cloudflare-one/rbi/non-isolated-browser.png)
5652

5753
### Isolated browsing
5854

59-
* A Cloudflare root certificate indicates traffic was proxied through Cloudflare Gateway.
55+
- A Cloudflare root certificate indicates traffic was proxied through Cloudflare Gateway.
6056

6157
![Website presents a Cloudflare root certificate](~/assets/images/cloudflare-one/rbi/cloudflare-gateway-root-ca.png)
6258

63-
* The right-click context menu will be simplified.
59+
- The right-click context menu will be simplified.
6460

6561
![Simplified right-click menu in browser](~/assets/images/cloudflare-one/rbi/isolated-browser.png)
6662

src/content/docs/cloudflare-one/policies/data-loss-prevention/dlp-policies/index.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,24 +3,24 @@ pcx_content_type: how-to
33
title: Scan HTTP traffic
44
sidebar:
55
order: 1
6-
6+
label: Create DLP policies
77
---
88

99
You can scan HTTP traffic for sensitive data through Secure Web Gateway policies. To perform DLP filtering, first configure a DLP profile with the data patterns you want to detect, and then build a Gateway HTTP policy to allow or block the sensitive data from leaving your organization. Gateway will parse and scan your HTTP traffic for strings matching the keywords or regular expressions (regexes) specified in the DLP profile.
1010

1111
## Prerequisites
1212

13-
* Set up [Gateway HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/).
14-
* HTTP filtering requires turning on the [Gateway proxy](/cloudflare-one/policies/gateway/proxy/#enable-the-gateway-proxy) for TCP traffic.
15-
* Turn on [TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#enable-tls-decryption).
13+
- Set up [Gateway HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/).
14+
- HTTP filtering requires turning on the [Gateway proxy](/cloudflare-one/policies/gateway/proxy/#enable-the-gateway-proxy) for TCP traffic.
15+
- Turn on [TLS decryption](/cloudflare-one/policies/gateway/http-policies/tls-decryption/#enable-tls-decryption).
1616

1717
## 1. Configure a DLP profile
1818

1919
Refer to [Configure a DLP profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/). We recommend getting started with a predefined profile.
2020

2121
:::caution[Important]
2222

23-
DLP scans will not start until you [create a DLP policy](#2-create-a-dlp-policy).
23+
DLP scans will not start until you [create a DLP policy](#2-create-a-dlp-policy).
2424
:::
2525

2626
## 2. Create a DLP policy
@@ -59,8 +59,8 @@ Different sites will send requests in different ways. For example, some sites wi
5959
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Logs** > **Gateway** > **HTTP**.
6060
2. Select **Filter**.
6161
3. Choose an item under one of the following filters:
62-
* **DLP Profiles** shows the requests which matched a specific DLP profile.
63-
* **Policy** shows the requests which matched a specific DLP policy.
62+
- **DLP Profiles** shows the requests which matched a specific DLP profile.
63+
- **Policy** shows the requests which matched a specific DLP policy.
6464

6565
You can expand an individual row to view details about the request. To see the data that triggered the DLP policy, [configure payload logging](/cloudflare-one/policies/data-loss-prevention/dlp-policies/payload-logging/).
6666

0 commit comments

Comments
 (0)