Skip to content

Commit dcc8b70

Browse files
committed
Create (and update) managed ruleset partials
1 parent 83baaf2 commit dcc8b70

File tree

10 files changed

+53
-40
lines changed

10 files changed

+53
-40
lines changed

src/content/docs/ruleset-engine/managed-rulesets/deploy-managed-ruleset.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Use the following workflow to deploy a managed ruleset to a phase at the zone le
2222

2323
### Example
2424

25-
<Render file="api-managed-rules-zone-example" product="waf" />
25+
<Render file="managed-rulesets/api-zone-example" product="waf" />
2626

2727
In this example, the managed ruleset executes the behavior configured by Cloudflare. To customize the behavior of managed rulesets, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).
2828

@@ -37,6 +37,6 @@ Use the following workflow to deploy a managed ruleset to a phase at the account
3737

3838
### Example
3939

40-
<Render file="api-managed-rules-account-example" product="waf" />
40+
<Render file="managed-rulesets/api-account-example" product="waf" />
4141

4242
In this example, the managed ruleset executes the behavior configured by Cloudflare. To customize the behavior of managed rulesets, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).

src/content/docs/waf/account/managed-rulesets/deploy-api.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The [WAF Managed Rules](/waf/managed-rules/#managed-rulesets) page includes the
2121

2222
## Example
2323

24-
<Render file="api-managed-rules-account-example" />
24+
<Render file="managed-rulesets/api-account-example" />
2525

2626
## Next steps
2727

src/content/docs/waf/managed-rules/deploy-api.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ The [WAF Managed Rules](/waf/managed-rules/#managed-rulesets) page includes the
1919

2020
## Example
2121

22-
<Render file="api-managed-rules-zone-example" />
22+
<Render file="managed-rulesets/api-zone-example" />
2323

2424
## Next steps
2525

src/content/docs/waf/managed-rules/reference/cloudflare-managed-ruleset.mdx

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,10 @@ pcx_content_type: configuration
33
title: Cloudflare Managed Ruleset
44
sidebar:
55
order: 2
6-
76
---
87

8+
import { Render } from "~/components";
9+
910
Created by the Cloudflare security team, this ruleset provides fast and effective protection for all of your applications. The ruleset is updated frequently to cover new vulnerabilities and reduce false positives.
1011

1112
Cloudflare recommends that you enable the rules whose tags correspond to your technology stack. For example, if you use WordPress, enable the rules tagged with `wordpress`.
@@ -14,33 +15,35 @@ Cloudflare’s [WAF changelog](/waf/change-log/) allows you to monitor ongoing c
1415

1516
:::note
1617

17-
1818
Some rules in the Cloudflare Managed Ruleset are disabled by default, intending to strike a balance between providing the right protection and reducing the number of false positives.
1919

2020
It is not recommended that you enable all the available rules using overrides, since it may affect legitimate traffic, unless you are running a proof of concept (PoC) to understand what kind of requests the WAF can block.
2121

22-
2322
:::
2423

2524
## Configure in the dashboard
2625

2726
You can configure the following settings of the Cloudflare Managed Ruleset in the Cloudflare dashboard:
2827

29-
* **Set the action to perform.** When you define an action for the ruleset, you override the default action defined for each rule. The available actions are: *Managed Challenge*, *Block*, *JS Challenge*, *Log*, and *Interactive Challenge*. To remove the action override, set the ruleset action to *Default*.
30-
* **Override the action performed by individual rules or rules with specific tags.** The available actions are: *Managed Challenge*, *Block*, *JS Challenge*, *Log*, and *Interactive Challenge*.
31-
* **Disable specific rules or rules with specific tags.**
32-
* **Customize the filter expression.** With a custom expression, the Cloudflare Managed Ruleset applies only to a subset of the incoming requests.
33-
* **Configure [payload logging](/waf/managed-rules/payload-logging/configure/)**.
28+
- **Set the action to perform.** When you define an action for the ruleset, you override the default action defined for each rule. The available actions are: _Managed Challenge_, _Block_, _JS Challenge_, _Log_, and _Interactive Challenge_. To remove the action override, set the ruleset action to _Default_.
29+
- **Override the action performed by individual rules or rules with specific tags.** The available actions are: _Managed Challenge_, _Block_, _JS Challenge_, _Log_, and _Interactive Challenge_.
30+
- **Disable specific rules or rules with specific tags.**
31+
- **Customize the filter expression.** With a custom expression, the Cloudflare Managed Ruleset applies only to a subset of the incoming requests.
32+
- **Configure [payload logging](/waf/managed-rules/payload-logging/configure/)**.
3433

3534
For details on configuring a managed ruleset in the dashboard, refer to [Configure a managed ruleset](/waf/managed-rules/deploy-zone-dashboard/#configure-a-managed-ruleset).
3635

3736
## Configure via API
3837

39-
To enable the Cloudflare Managed Ruleset for a given zone via API, create a rule with `execute` action in the entry point ruleset for the `http_request_firewall_managed` phase. For more information on deploying a managed ruleset, refer to [Deploy a managed ruleset](/ruleset-engine/managed-rulesets/deploy-managed-ruleset/).
38+
To enable the Cloudflare Managed Ruleset for a given zone via API, create a rule with `execute` action in the entry point ruleset for the `http_request_firewall_managed` phase.
39+
40+
### Example
4041

41-
To configure the Cloudflare Managed Ruleset via API, create [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) using the Rulesets API. You can perform the following configurations:
42+
<Render file="managed-rulesets/api-zone-example" />
4243

43-
* Specify the action to perform for all the rules in the ruleset by creating a ruleset override.
44-
* Disable or customize the action of individual rules by creating rule overrides for those rules.
44+
<Render
45+
file="managed-rulesets/api-next-steps"
46+
params={{ rulesetName: "Cloudflare Managed Ruleset" }}
47+
/>
4548

46-
For examples of creating overrides using the API, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).
49+
<Render file="managed-rulesets/api-more-resources" />

src/content/docs/waf/managed-rules/reference/exposed-credentials-check.mdx

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -154,14 +154,10 @@ This example deploys the Cloudflare Exposed Credentials Check Managed Ruleset to
154154
}'
155155
```
156156

157-
### Next steps
158-
159-
To configure the Exposed Credentials Check Managed Ruleset via API, create [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) using the Rulesets API. You can perform the following configurations:
160-
161-
- Specify the action to perform for all the rules in the ruleset by creating a ruleset override.
162-
- Disable or customize the action of individual rules by creating rule overrides for those rules.
163-
164-
For examples of creating overrides using the API, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).
157+
<Render
158+
file="managed-rulesets/api-next-steps"
159+
params={{ rulesetName: "Exposed Credentials Check Managed Ruleset" }}
160+
/>
165161

166162
:::note[Checking for exposed credentials in custom rules]
167163

@@ -171,6 +167,4 @@ For more information, refer to [Create a custom rule checking for exposed creden
171167

172168
:::
173169

174-
### More resources
175-
176-
For more information on working with managed rulesets via API, refer to [Work with managed rulesets](/ruleset-engine/managed-rulesets/) in the Ruleset Engine documentation.
170+
<Render file="managed-rulesets/api-more-resources" />

src/content/docs/waf/managed-rules/reference/sensitive-data-detection.mdx

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 5
66
---
77

8-
import { RuleID } from "~/components";
8+
import { Render, RuleID } from "~/components";
99

1010
:::note
1111
Available to customers on Enterprise plans.
@@ -150,18 +150,14 @@ This example deploys the Cloudflare Sensitive Data Detection managed ruleset to
150150
}'
151151
```
152152

153-
### Next steps
153+
<Render
154+
file="managed-rulesets/api-next-steps"
155+
params={{
156+
rulesetName: "Cloudflare Sensitive Data Detection managed ruleset",
157+
}}
158+
/>
154159

155-
To configure Cloudflare Sensitive Data Detection using the API, create [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) using the Rulesets API. You can perform the following configurations:
156-
157-
- Turn on or off individual rules by creating rule overrides for those rules.
158-
- Turn on or off all rules with specific tags by creating tag overrides.
159-
160-
For examples of creating overrides using the API, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).
161-
162-
### More resources
163-
164-
For more information on working with managed rulesets via API, refer to [Work with managed rulesets](/ruleset-engine/managed-rulesets/) in the Ruleset Engine documentation.
160+
<Render file="managed-rulesets/api-more-resources" />
165161

166162
## Review detected leaks
167163

File renamed without changes.
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
{}
3+
---
4+
5+
### More resources
6+
7+
For more information on working with managed rulesets via API, refer to [Work with managed rulesets](/ruleset-engine/managed-rulesets/) in the Ruleset Engine documentation.
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
params:
3+
- rulesetName
4+
---
5+
6+
### Next steps
7+
8+
To configure the {props.rulesetName} via API, create [overrides](/ruleset-engine/managed-rulesets/override-managed-ruleset/) using the Rulesets API. You can perform the following configurations:
9+
10+
- Specify the action to perform for all the rules in the ruleset by creating a ruleset override.
11+
- Disable or customize the action of individual rules by creating rule overrides for those rules.
12+
13+
For examples of creating overrides using the API, refer to [Override a managed ruleset](/ruleset-engine/managed-rulesets/override-managed-ruleset/).
File renamed without changes.

0 commit comments

Comments
 (0)