Skip to content

Commit e2e6e3f

Browse files
Update src/content/docs/cloudflare-one/traffic-policies/enable-ids.mdx
Co-authored-by: marciocloudflare <[email protected]>
1 parent 947d775 commit e2e6e3f

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/content/docs/cloudflare-one/traffic-policies/enable-ids.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Cloudflare's Intrusion Detection System (IDS) is an Advanced Magic Firewall feat
1515
With Cloudflare's global anycast network, you get:
1616

1717
- Cloudflare's entire global network capacity is now the capacity of your IDS.
18-
- Built in redundancy and failover. Every server runs Cloudflare's IDS software, and traffic is automatically attracted to the closest network location to its source.
18+
- Built-in redundancy and failover. Every server runs Cloudflare's IDS software, and traffic is automatically attracted to the closest network location to its source.
1919
- Continuous deployment for improvements to Cloudflare's IDS capabilities.
2020

2121
Refer to [Enable IDS](/cloudflare-one/traffic-policies/enable-ids/#enable-ids) for more information on enabling IDS and creating new rulesets. After IDS is enabled, your traffic will be scanned to find malicious traffic. The detections are logged to destinations that can be configured from the dashboard. Refer to [Use Logpush with IDS](/cloudflare-one/insights/logs/use-logpush-with-ids) for instructions on configuring a destination to receive the detections. Additionally, all traffic that is analyzed can be accessed via [network analytics](/analytics/network-analytics/). Refer to [GraphQL Analytics](/magic-firewall/tutorials/graphql-analytics/) to query the analytics data.

0 commit comments

Comments
 (0)