You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this example, the managed ruleset executes the behavior configured by Cloudflare. To customize the behavior of managed rulesets, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).
28
28
@@ -37,6 +37,6 @@ Use the following workflow to deploy a managed ruleset to a phase at the account
In this example, the managed ruleset executes the behavior configured by Cloudflare. To customize the behavior of managed rulesets, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).
Copy file name to clipboardExpand all lines: src/content/docs/waf/managed-rules/reference/cloudflare-managed-ruleset.mdx
+16-13Lines changed: 16 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,9 +3,10 @@ pcx_content_type: configuration
3
3
title: Cloudflare Managed Ruleset
4
4
sidebar:
5
5
order: 2
6
-
7
6
---
8
7
8
+
import { Render } from"~/components";
9
+
9
10
Created by the Cloudflare security team, this ruleset provides fast and effective protection for all of your applications. The ruleset is updated frequently to cover new vulnerabilities and reduce false positives.
10
11
11
12
Cloudflare recommends that you enable the rules whose tags correspond to your technology stack. For example, if you use WordPress, enable the rules tagged with `wordpress`.
@@ -14,33 +15,35 @@ Cloudflare’s [WAF changelog](/waf/change-log/) allows you to monitor ongoing c
14
15
15
16
:::note
16
17
17
-
18
18
Some rules in the Cloudflare Managed Ruleset are disabled by default, intending to strike a balance between providing the right protection and reducing the number of false positives.
19
19
20
20
It is not recommended that you enable all the available rules using overrides, since it may affect legitimate traffic, unless you are running a proof of concept (PoC) to understand what kind of requests the WAF can block.
21
21
22
-
23
22
:::
24
23
25
24
## Configure in the dashboard
26
25
27
26
You can configure the following settings of the Cloudflare Managed Ruleset in the Cloudflare dashboard:
28
27
29
-
***Set the action to perform.** When you define an action for the ruleset, you override the default action defined for each rule. The available actions are: *Managed Challenge*, *Block*, *JS Challenge*, *Log*, and *Interactive Challenge*. To remove the action override, set the ruleset action to *Default*.
30
-
***Override the action performed by individual rules or rules with specific tags.** The available actions are: *Managed Challenge*, *Block*, *JS Challenge*, *Log*, and *Interactive Challenge*.
31
-
***Disable specific rules or rules with specific tags.**
32
-
***Customize the filter expression.** With a custom expression, the Cloudflare Managed Ruleset applies only to a subset of the incoming requests.
-**Set the action to perform.** When you define an action for the ruleset, you override the default action defined for each rule. The available actions are: _Managed Challenge_, _Block_, _JS Challenge_, _Log_, and _Interactive Challenge_. To remove the action override, set the ruleset action to _Default_.
29
+
-**Override the action performed by individual rules or rules with specific tags.** The available actions are: _Managed Challenge_, _Block_, _JS Challenge_, _Log_, and _Interactive Challenge_.
30
+
-**Disable specific rules or rules with specific tags.**
31
+
-**Customize the filter expression.** With a custom expression, the Cloudflare Managed Ruleset applies only to a subset of the incoming requests.
For details on configuring a managed ruleset in the dashboard, refer to [Configure a managed ruleset](/waf/managed-rules/deploy-zone-dashboard/#configure-a-managed-ruleset).
36
35
37
36
## Configure via API
38
37
39
-
To enable the Cloudflare Managed Ruleset for a given zone via API, create a rule with `execute` action in the entry point ruleset for the `http_request_firewall_managed` phase. For more information on deploying a managed ruleset, refer to [Deploy a managed ruleset](/ruleset-engine/managed-rulesets/deploy-managed-ruleset/).
38
+
To enable the Cloudflare Managed Ruleset for a given zone via API, create a rule with `execute` action in the entry point ruleset for the `http_request_firewall_managed` phase.
39
+
40
+
### Example
40
41
41
-
To configure the Cloudflare Managed Ruleset via API, create [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) using the Rulesets API. You can perform the following configurations:
Copy file name to clipboardExpand all lines: src/content/docs/waf/managed-rules/reference/exposed-credentials-check.mdx
+5-11Lines changed: 5 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -154,14 +154,10 @@ This example deploys the Cloudflare Exposed Credentials Check Managed Ruleset to
154
154
}'
155
155
```
156
156
157
-
### Next steps
158
-
159
-
To configure the Exposed Credentials Check Managed Ruleset via API, create [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) using the Rulesets API. You can perform the following configurations:
160
-
161
-
- Specify the action to perform for all the rules in the ruleset by creating a ruleset override.
162
-
- Disable or customize the action of individual rules by creating rule overrides for those rules.
163
-
164
-
For examples of creating overrides using the API, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).
:::note[Checking for exposed credentials in custom rules]
167
163
@@ -171,6 +167,4 @@ For more information, refer to [Create a custom rule checking for exposed creden
171
167
172
168
:::
173
169
174
-
### More resources
175
-
176
-
For more information on working with managed rulesets via API, refer to [Work with managed rulesets](/ruleset-engine/managed-rulesets/) in the Ruleset Engine documentation.
Copy file name to clipboardExpand all lines: src/content/docs/waf/managed-rules/reference/sensitive-data-detection.mdx
+8-12Lines changed: 8 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ sidebar:
5
5
order: 5
6
6
---
7
7
8
-
import { RuleID } from"~/components";
8
+
import { Render, RuleID } from"~/components";
9
9
10
10
:::note
11
11
Available to customers on Enterprise plans.
@@ -150,18 +150,14 @@ This example deploys the Cloudflare Sensitive Data Detection managed ruleset to
150
150
}'
151
151
```
152
152
153
-
### Next steps
153
+
<Render
154
+
file="managed-rulesets/api-next-steps"
155
+
params={{
156
+
rulesetName: "Cloudflare Sensitive Data Detection managed ruleset",
157
+
}}
158
+
/>
154
159
155
-
To configure Cloudflare Sensitive Data Detection using the API, create [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) using the Rulesets API. You can perform the following configurations:
156
-
157
-
- Turn on or off individual rules by creating rule overrides for those rules.
158
-
- Turn on or off all rules with specific tags by creating tag overrides.
159
-
160
-
For examples of creating overrides using the API, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).
161
-
162
-
### More resources
163
-
164
-
For more information on working with managed rulesets via API, refer to [Work with managed rulesets](/ruleset-engine/managed-rulesets/) in the Ruleset Engine documentation.
For more information on working with managed rulesets via API, refer to [Work with managed rulesets](/ruleset-engine/managed-rulesets/) in the Ruleset Engine documentation.
To configure the {props.rulesetName} via API, create [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) using the Rulesets API. You can perform the following configurations:
9
+
10
+
- Specify the action to perform for all the rules in the ruleset by creating a ruleset override.
11
+
- Disable or customize the action of individual rules by creating rule overrides for those rules.
12
+
13
+
For examples of creating overrides using the API, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).
0 commit comments