Skip to content

Commit b920011

Browse files
authored
Merge branch 'cloudflare:production' into lucas/flux-seed
2 parents 1032cef + c87eebe commit b920011

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

src/content/docs/page-shield/how-it-works/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Enabling Page Shield adds a <GlossaryTooltip term="content security policy (CSP)
1818

1919
The **Monitors** dashboard shows the list of active scripts, connections, and cookies. The **All Reported Scripts** and **All Reported Connections** dashboards show the full list of detected scripts and connections in your domain, respectively, including infrequent and inactive ones.
2020

21-
Since Page Shield monitoring is based on sampling, there may be a small delay between deploying a script or cookie and having its data displayed in Page Shield's dashboards.
21+
Page Shield adds a CSP report-only HTTP header used to monitor webpage resources to a sample of sent responses. This means that there may be a [small delay](/page-shield/troubleshooting/#why-do-i-not-see-scripts-after-i-activated-page-shield) between deploying a script or cookie and having its data displayed in Page Shield's dashboards.
2222

2323
Enterprise customers with a paid add-on have access to additional classification mechanisms based on threat feeds to determine if a script, or a connection made by a script, is malicious. For more information, refer to [Malicious script and connection detection](/page-shield/how-it-works/malicious-script-detection/).
2424

src/content/docs/page-shield/reference/csp-header.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ content-security-policy-report-only: script-src 'none'; connect-src 'none'; repo
2222

2323
:::note[Notes]
2424

25-
Cloudflare adds the CSP report-only HTTP header used to monitor webpages resources to a sample of sent responses.
25+
Cloudflare adds the CSP report-only HTTP header used to monitor webpage resources to a sample of sent responses.
2626

2727
Configuring [log policies](/page-shield/policies/) will add other CSP report-only headers to responses. Cloudflare will not perform any sampling for these report-only headers related to customer-defined policies.
2828

src/content/docs/waf/detections/malicious-uploads/example-rules.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,10 @@ This custom rule example blocks requests addressed at `/upload` with uploaded co
4040

4141
This custom rule example blocks requests with uploaded content objects over 15 MB in size (the current content scanning limit):
4242

43-
- Expression: `any(cf.waf.content_scan.obj_sizes[*] >= 15000000)`
43+
- Expression: `any(cf.waf.content_scan.obj_sizes[*] >= 15728640)`
4444
- Action: _Block_
4545

46-
In this example, you must also test for equality because currently any file over 15 MB will be handled internally as if it had a size of 15 MB. This means that using the `>` (greater than) [comparison operator](/ruleset-engine/rules-language/operators/#comparison-operators) would not work for this particular rule — you should use `>=` (greater than or equal) instead.
46+
In this example, you must also test for equality because currently any file over 15 MB will be handled internally as if it had a size of 15 MB (15,728,640 bytes). This means that using the `>` (greater than) [comparison operator](/ruleset-engine/rules-language/operators/#comparison-operators) would not work for this particular rule — you should use `>=` (greater than or equal) instead.
4747

4848
---
4949

0 commit comments

Comments
 (0)