Skip to content

Commit b304d01

Browse files
committed
Move troubleshooting
1 parent db4270c commit b304d01

File tree

47 files changed

+90
-52
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+90
-52
lines changed

public/__redirects

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2399,6 +2399,7 @@
23992399
/cloudflare-one/applications/configure-apps/* /cloudflare-one/access-controls/applications/http-apps/:splat 301
24002400
/cloudflare-one/applications/non-http/* /cloudflare-one/access-controls/applications/non-http/:splat 301
24012401
/cloudflare-one/applications/casb/casb-integrations/* /cloudflare-one/integrations/cloud-and-saas/:splat 301
2402+
/cloudflare-one/applications/casb/troubleshooting/* /cloudflare-one/integrations/cloud-and-saas/troubleshooting/:splat 301
24022403

24032404
# Learning paths
24042405

src/content/changelog/email-security-cf1/2025-04-01-casb-email-security.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,17 @@ description: Get two free CASB integrations with your Email Security subscriptio
44
date: 2025-04-01T23:22:49Z
55
---
66

7-
With Email Security, you get two free CASB integrations.
7+
With Email Security, you get two free CASB integrations.
88

9-
Use one SaaS integration for Email Security to sync with your directory of users, take actions on delivered emails, automatically provide EMLs for reclassification requests for clean emails, discover CASB findings and more.
9+
Use one SaaS integration for Email Security to sync with your directory of users, take actions on delivered emails, automatically provide EMLs for reclassification requests for clean emails, discover CASB findings and more.
1010

11-
With the other integration, you can have a separate SaaS integration for CASB findings for another SaaS provider.
11+
With the other integration, you can have a separate SaaS integration for CASB findings for another SaaS provider.
1212

13-
Refer to [Add an integration](/cloudflare-one/applications/casb/#add-an-integration) to learn more about this feature.
13+
Refer to [Add an integration](/cloudflare-one/integrations/cloud-and-saas/#add-an-integration) to learn more about this feature.
1414

1515
![CASB-EmailSecurity](~/assets/images/changelog/email-security/CASB-EmailSecurity.png)
1616

17-
This feature is available across these Email Security packages:
17+
This feature is available across these Email Security packages:
1818

19-
- **Enterprise**
20-
- **Enterprise + PhishGuard**
19+
- **Enterprise**
20+
- **Enterprise + PhishGuard**

src/content/docs/cloudflare-one/applications/app-library.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
import { Render, GlossaryTooltip } from "~/components";
99

10-
The Application Library allows users to manage their SaaS applications in Cloudflare Zero Trust by consolidating views across all relevant products: [Gateway](/cloudflare-one/traffic-policies/), [Access](/cloudflare-one/access-controls/policies/), and [Cloud Access Security Broker (CASB)](/cloudflare-one/applications/casb/). The App Library provides visibility and control for available applications, as well as the ability to view categorized hostnames and manage configuration for Access for SaaS and Gateway policies. For example, you can use the App Library to review how Gateway uses specific hostnames to match against application traffic.
10+
The Application Library allows users to manage their SaaS applications in Cloudflare Zero Trust by consolidating views across all relevant products: [Gateway](/cloudflare-one/traffic-policies/), [Access](/cloudflare-one/access-controls/policies/), and [Cloud Access Security Broker (CASB)](/cloudflare-one/integrations/cloud-and-saas/). The App Library provides visibility and control for available applications, as well as the ability to view categorized hostnames and manage configuration for Access for SaaS and Gateway policies. For example, you can use the App Library to review how Gateway uses specific hostnames to match against application traffic.
1111

1212
To access the App Library in [Zero Trust](https://one.dash.cloudflare.com/), go to **My team** > **App Library**. Each application card will list the number of hostnames associated with the application, the supported Zero Trust product usage, and the [app type](/cloudflare-one/traffic-policies/application-app-types/#app-types).
1313

@@ -30,7 +30,7 @@ The **Overview** tab shows details about an application, including:
3030

3131
### Findings
3232

33-
The **Findings** tab shows any connected [CASB integrations](/cloudflare-one/applications/casb/#manage-casb-integrations) for the selected application, as well as instances of any detected [posture findings](/cloudflare-one/applications/casb/manage-findings/#posture-findings) and [content findings](/cloudflare-one/applications/casb/manage-findings/#content-findings) for each integration.
33+
The **Findings** tab shows any connected [CASB integrations](/cloudflare-one/integrations/cloud-and-saas/#manage-casb-integrations) for the selected application, as well as instances of any detected [posture findings](/cloudflare-one/integrations/cloud-and-saas/manage-findings/#posture-findings) and [content findings](/cloudflare-one/integrations/cloud-and-saas/manage-findings/#content-findings) for each integration.
3434

3535
### Policies
3636

src/content/docs/cloudflare-one/applications/casb/manage-findings.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Findings are security issues detected within SaaS and cloud applications that in
1414

1515
## Prerequisites
1616

17-
- You have [added](/cloudflare-one/applications/casb/#add-an-integration) a CASB integration.
17+
- You have [added](/cloudflare-one/integrations/cloud-and-saas/#add-an-integration) a CASB integration.
1818
- Your scan has surfaced at least one security finding.
1919

2020
## Posture findings
@@ -127,7 +127,7 @@ CASB supports remediation for findings from the [Microsoft 365 integration](/clo
127127

128128
### Configure remediation permissions
129129

130-
Before you can remediate findings, [add a new integration](/cloudflare-one/applications/casb/#add-an-integration) and choose _Read-Write mode_ during setup. Alternatively, you can update an existing integration:
130+
Before you can remediate findings, [add a new integration](/cloudflare-one/integrations/cloud-and-saas/#add-an-integration) and choose _Read-Write mode_ during setup. Alternatively, you can update an existing integration:
131131

132132
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
133133
2. Choose your integration, then select **Configure**.

src/content/docs/cloudflare-one/data-loss-prevention/dlp-profiles/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ A DLP profile is a collection of regular expressions and [detection entries](/cl
1717
product="cloudflare-one"
1818
/>
1919

20-
You can now use this profile in a [DLP policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy) or [CASB integration](/cloudflare-one/applications/casb/casb-dlp/).
20+
You can now use this profile in a [DLP policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy) or [CASB integration](/cloudflare-one/integrations/cloud-and-saas/casb-dlp/).
2121

2222
## Build a custom profile
2323

2424
<Render file="data-loss-prevention/custom-profile" product="cloudflare-one" />
2525

26-
You can now use this profile in a [DLP policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy) or [CASB integration](/cloudflare-one/applications/casb/casb-dlp/).
26+
You can now use this profile in a [DLP policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy) or [CASB integration](/cloudflare-one/integrations/cloud-and-saas/casb-dlp/).

src/content/docs/cloudflare-one/data-loss-prevention/dlp-profiles/integration-profiles.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
:::note
99

10-
Integration profiles require [Cloudflare CASB](/cloudflare-one/applications/casb/).
10+
Integration profiles require [Cloudflare CASB](/cloudflare-one/integrations/cloud-and-saas/).
1111
:::
1212

1313
Cloudflare DLP integration profiles enable data loss prevention support for third-party data classification providers. Data classification information is retrieved from the third-party platform and populated into a DLP Profile. You can then enable detection entries in the profile and create a DLP policy to allow or block matching data.

src/content/docs/cloudflare-one/data-loss-prevention/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,9 @@ To get started, refer to [Scan HTTP traffic with DLP](/cloudflare-one/data-loss-
3030

3131
## Data at rest
3232

33-
Data Loss Prevention complements [Cloudflare CASB](/cloudflare-one/applications/casb/) to detect sensitive data stored in your SaaS applications. Unlike data in transit scans which read files sent through Cloudflare Gateway, CASB retrieves files directly via the API. Therefore, Gateway and WARP settings (such as [Do Not Inspect](/cloudflare-one/traffic-policies/http-policies/#do-not-inspect) policies and [Split Tunnel](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/) configurations) will not affect data at rest scans.
33+
Data Loss Prevention complements [Cloudflare CASB](/cloudflare-one/integrations/cloud-and-saas/) to detect sensitive data stored in your SaaS applications. Unlike data in transit scans which read files sent through Cloudflare Gateway, CASB retrieves files directly via the API. Therefore, Gateway and WARP settings (such as [Do Not Inspect](/cloudflare-one/traffic-policies/http-policies/#do-not-inspect) policies and [Split Tunnel](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/) configurations) will not affect data at rest scans.
3434

35-
To get started, refer to [Scan SaaS applications with DLP](/cloudflare-one/applications/casb/casb-dlp/).
35+
To get started, refer to [Scan SaaS applications with DLP](/cloudflare-one/integrations/cloud-and-saas/casb-dlp/).
3636

3737
## Supported file types
3838

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
pcx_content_type: navigation
33
title: Scan SaaS apps
4-
external_link: /cloudflare-one/applications/casb/casb-dlp/
4+
external_link: /cloudflare-one/integrations/cloud-and-saas/casb-dlp/
55
sidebar:
66
order: 2
77
---

src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api.mdx

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To use Email Security, you will need to have:
3737

3838
To enable Microsoft integration:
3939

40-
1. **Configure policy**: Choose how [CASB](/cloudflare-one/applications/casb/) interacts with your data. Select **Read-only mode** or **Read-Write mode**. It is recommended that you choose **Read-Write mode**.
40+
1. **Configure policy**: Choose how [CASB](/cloudflare-one/integrations/cloud-and-saas/) interacts with your data. Select **Read-only mode** or **Read-Write mode**. It is recommended that you choose **Read-Write mode**.
4141
2. **Name integration**: Add your integration name, then select **Continue**.
4242
3. **Authorize integration**:
4343
- Select **Authorize**. Selecting **Authorize** will take you to the Microsoft Sign in page where you will have to enter your email address.
@@ -94,8 +94,11 @@ To view the integration for each connected domain:
9494

9595
Once you have set up Email Security to scan through your inbox, Email Security will display detailed information about your inbox. Refer to [Monitor your inbox](/cloudflare-one/email-security/email-monitoring/) to learn more.
9696

97-
<Render file="email-security/post-verification-setup" product="cloudflare-one" />
97+
<Render
98+
file="email-security/post-verification-setup"
99+
product="cloudflare-one"
100+
/>
98101

99102
## Next steps
100103

101-
<Render file="email-security/enable-logs" product="cloudflare-one" />
104+
<Render file="email-security/enable-logs" product="cloudflare-one" />

src/content/docs/cloudflare-one/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Secure your organization with Cloudflare Zero Trust — a cloud security model t
3333

3434
Cloudflare Zero Trust is part of Cloudflare One, our name for the Secure Access Service Edge (SASE) platform that protects enterprise applications, users, devices, and networks.
3535

36-
By progressively adopting Cloudflare One, organizations can move away from a patchwork of hardware appliances and point solutions, and instead consolidate security and networking through a unified control plane that includes products like [Cloudflare Access](/cloudflare-one/access-controls/policies/), [Secure Web Gateway (SWG)](/cloudflare-one/traffic-policies/), [Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/), [Data Loss Prevention (DLP)](/cloudflare-one/data-loss-prevention/), [Remote Browser Isolation (RBI)](/cloudflare-one/remote-browser-isolation/), [Cloud Access Security Broker (CASB)](/cloudflare-one/applications/casb/), and [Email Security](/cloudflare-one/email-security/).
36+
By progressively adopting Cloudflare One, organizations can move away from a patchwork of hardware appliances and point solutions, and instead consolidate security and networking through a unified control plane that includes products like [Cloudflare Access](/cloudflare-one/access-controls/policies/), [Secure Web Gateway (SWG)](/cloudflare-one/traffic-policies/), [Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/), [Data Loss Prevention (DLP)](/cloudflare-one/data-loss-prevention/), [Remote Browser Isolation (RBI)](/cloudflare-one/remote-browser-isolation/), [Cloud Access Security Broker (CASB)](/cloudflare-one/integrations/cloud-and-saas/), and [Email Security](/cloudflare-one/email-security/).
3737

3838
Refer to our [SASE reference architecture](/reference-architecture/architectures/sase/) to learn how to plan, deploy, and manage SASE architecture with Cloudflare.
3939

@@ -85,7 +85,7 @@ Mitigate the impact of attacks by executing all browser code in the cloud and se
8585

8686
</RelatedProduct>
8787

88-
<RelatedProduct header="Cloud Access Security Broker (CASB)" href="/cloudflare-one/applications/casb/" product="casb">
88+
<RelatedProduct header="Cloud Access Security Broker (CASB)" href="/cloudflare-one/integrations/cloud-and-saas/" product="casb">
8989

9090
Protect users and sensitive data at rest in SaaS applications and cloud environments, scan for misconfigurations, and detect insider threats as well as unsanctioned application usage to prevent data leaks and compliance violations.
9191

0 commit comments

Comments
 (0)