Skip to content

Commit a3ef542

Browse files
Apply suggestions from code review
1 parent e27526f commit a3ef542

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

src/content/changelogs/page-shield.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ entries:
88
- publish_date: "2024-12-02"
99
title: Alerts based on customer-defined policies
1010
description: |-
11-
You can now scope all Page Shield's alert types to selected zones and their associated policies, alerting only on the resources that have been explicitly allowed.
11+
You can now scope all of Page Shield's alert types to selected zones and their associated policies, alerting only on the resources that have been explicitly allowed.
1212
1313
- publish_date: "2024-09-30"
1414
title: New machine learning (ML) scores for detected scripts

src/content/docs/page-shield/detection/configure-alerts.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ When you set the **Policies of these zones** filter in a Page Shield alert, you
3232
For each alert configured with a filter, Page Shield will do the following:
3333

3434
1. Check which allow policies in a zone are enabled.
35-
2. For every enabled policy, compare the URL of the new/changed resource against the allowed sources in the policy.
36-
3. If the resource is allowed by the policy, check if the new/modified resource should trigger the current Page Shield alert.
35+
2. For every enabled policy, compare the URL of the new or changed resource against the allowed sources in the policy.
36+
3. If the resource is allowed by the policy, check if the new or modified resource should trigger the current Page Shield alert.
3737
4. If the alert should trigger, send an alert notification to the configured destinations.
3838

3939
:::note

0 commit comments

Comments
 (0)