Skip to content

Commit d2feb83

Browse files
committed
Change order
1 parent e34640a commit d2feb83

File tree

2 files changed

+8
-9
lines changed
  • src/content/docs/cloudflare-one/connections/connect-devices

2 files changed

+8
-9
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/agentless/index.mdx

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,14 @@
22
pcx_content_type: concept
33
title: Agentless options
44
sidebar:
5-
order: 2
6-
5+
order: 3
76
---
87

98
If you are unable to install the WARP client on your devices (for example, Windows Server does not support the WARP client), you can use agentless options to enable a subset of Zero Trust features.
109

11-
* **[Gateway DNS policies](/cloudflare-one/connections/connect-devices/agentless/dns/)**
12-
* **[Gateway HTTP policies](/cloudflare-one/connections/connect-devices/agentless/pac-files/)** without user identity and device posture
13-
* **[Access policies](/cloudflare-one/policies/access/)** without device posture for [web applications](/cloudflare-one/applications/configure-apps/) and [browser-rendered](/cloudflare-one/applications/non-http/browser-rendering/) SSH and VNC connections
14-
* **[Remote Browser Isolation](/cloudflare-one/policies/browser-isolation/)** via an [Access policy](/cloudflare-one/policies/access/isolate-application/), [prefixed URLs](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/), or a [non-identity on-ramp](/cloudflare-one/policies/browser-isolation/setup/non-identity/)
15-
* **[Cloud Access Security Broker (CASB)](/cloudflare-one/applications/scan-apps/)**
16-
* **[Data Loss Prevention (DLP)](/cloudflare-one/applications/scan-apps/casb-dlp/)** for SaaS applications integrated with Cloudflare CASB
10+
- **[Gateway DNS policies](/cloudflare-one/connections/connect-devices/agentless/dns/)**
11+
- **[Gateway HTTP policies](/cloudflare-one/connections/connect-devices/agentless/pac-files/)** without user identity and device posture
12+
- **[Access policies](/cloudflare-one/policies/access/)** without device posture for [web applications](/cloudflare-one/applications/configure-apps/) and [browser-rendered](/cloudflare-one/applications/non-http/browser-rendering/) SSH and VNC connections
13+
- **[Remote Browser Isolation](/cloudflare-one/policies/browser-isolation/)** via an [Access policy](/cloudflare-one/policies/access/isolate-application/), [prefixed URLs](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/), or a [non-identity on-ramp](/cloudflare-one/policies/browser-isolation/setup/non-identity/)
14+
- **[Cloud Access Security Broker (CASB)](/cloudflare-one/applications/scan-apps/)**
15+
- **[Data Loss Prevention (DLP)](/cloudflare-one/applications/scan-apps/casb-dlp/)** for SaaS applications integrated with Cloudflare CASB

src/content/docs/cloudflare-one/connections/connect-devices/user-side-certificates/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: get-started
33
title: User-side certificates
44
sidebar:
5-
order: 3
5+
order: 2
66
banner:
77
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
88
---

0 commit comments

Comments
 (0)