Skip to content

Commit a4da3fc

Browse files
committed
Add individual file type callouts
1 parent e704e53 commit a4da3fc

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

src/content/docs/cloudflare-one/policies/data-loss-prevention/dlp-policies/common-policies.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,9 @@ sidebar:
66
head:
77
- tag: title
88
content: Common DLP policies
9-
109
---
1110

12-
import { GlossaryTooltip, Render } from "~/components"
11+
import { GlossaryTooltip, Render } from "~/components";
1312

1413
The following in-line DLP policies are commonly used to secure data in uploaded and downloaded files.
1514

@@ -24,6 +23,8 @@ The **Allow** action functions as an implicit logger, providing visibility into
2423

2524
<Render file="gateway/policies/block-file-types" />
2625

26+
For more information on what file formats DLP will scan, refer to [Supported file types](/cloudflare-one/policies/data-loss-prevention/#supported-file-types).
27+
2728
## Block uploads/downloads for specific users
2829

2930
You can configure access on a per-user or group basis by adding [identity-based conditions](/cloudflare-one/policies/gateway/identity-selectors/) to your policies. The following example blocks only contractors from uploading/downloading Financial Information to file sharing apps.

src/content/docs/cloudflare-one/policies/gateway/http-policies/common-policies.mdx

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,9 @@ sidebar:
66
head:
77
- tag: title
88
content: Common HTTP policies
9-
109
---
1110

12-
import { Render } from "~/components"
11+
import { Render } from "~/components";
1312

1413
The following policies are commonly used to secure HTTP traffic.
1514

@@ -53,7 +52,7 @@ Gateway [evaluates Do Not Inspect policies first](/cloudflare-one/policies/gatew
5352

5453
:::note
5554

56-
You can select either individual applications or the entire Do Not Inspect set, which will update as new applications are added.
55+
You can select either individual applications or the entire Do Not Inspect set, which will update as new applications are added.
5756
:::
5857

5958
## Check device posture
@@ -97,6 +96,8 @@ When accessing origin servers with certificates not signed by a public certifica
9796

9897
<Render file="gateway/policies/block-file-types" />
9998

99+
For more information on supported file types, refer to [Download and Upload File Types](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types).
100+
100101
## Block Google services
101102

102103
To enable Gateway inspection for Google Drive traffic, you must [add the Cloudflare certificate to Google Drive](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#google-drive-for-desktop).

src/content/partials/cloudflare-one/gateway/policies/block-file-types.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,6 @@
66

77
Block the upload or download of files based on their type.
88

9-
For more information on supported file types, refer to [Download and Upload File Types](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types).
10-
119
| Selector | Operator | Value | Logic | Action |
1210
| ------------------ | -------- | --------------------------------------- | ----- | ------ |
1311
| Upload File Type | in | _Microsoft Office Word Document (docx)_ | And | Block |

0 commit comments

Comments
 (0)