Skip to content

Commit e34640a

Browse files
committed
Move certs page
1 parent eec9f25 commit e34640a

File tree

5 files changed

+7
-8
lines changed

5 files changed

+7
-8
lines changed
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ import { Details } from "~/components";
2929
<sup>*</sup> Only supported on Debian-based systems.
3030
</Details>
3131

32-
The WARP client can automatically install a Cloudflare certificate or [custom root certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/) on Windows, macOS, and Debian/Ubuntu Linux devices. On mobile devices and Red Hat-based systems, you will need to [install the certificate manually](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/manual-deployment/).
32+
The [WARP client](/cloudflare-one/connections/connect-devices/warp/) can automatically install a Cloudflare certificate or [custom root certificate](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/) on Windows, macOS, and Debian/Ubuntu Linux devices. On mobile devices and Red Hat-based systems, you will need to [install the certificate manually](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/manual-deployment/).
3333

34-
The certificate is required if you want to [apply HTTP policies to encrypted websites](/cloudflare-one/policies/gateway/http-policies/tls-decryption/), display custom block pages, and more.
34+
The certificate is required if you want to [apply HTTP policies to encrypted websites](/cloudflare-one/policies/gateway/http-policies/tls-decryption/), display custom [block pages](/cloudflare-one/policies/gateway/block-page/), and more.
3535

3636
## Install a certificate using WARP
3737

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: get-started
33
title: User-side certificates
44
sidebar:
5-
order: 4
5+
order: 3
66
banner:
77
content: The default global Cloudflare root certificate will expire on 2025-02-02. If you installed the default Cloudflare certificate before 2024-10-17, you must <a href="#generate-a-cloudflare-root-certificate">generate a new certificate</a> and activate it for your Zero Trust organization to avoid inspection errors.
88
---

src/content/docs/cloudflare-one/connections/connect-devices/warp/index.mdx

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ sidebar:
66
head:
77
- tag: title
88
content: About Cloudflare WARP
9-
109
---
1110

1211
The Cloudflare WARP client allows you to protect corporate devices by securely and privately sending traffic from those devices to Cloudflare's global network, where Cloudflare Gateway can apply advanced web filtering. The WARP client also makes it possible to apply advanced Zero Trust policies that check for a device's health before it connects to corporate applications.
@@ -15,14 +14,14 @@ Downloading and deploying the WARP client to your devices enhances the protectio
1514

1615
Here are a few ways in which the WARP client provides in-depth protection for your organization:
1716

18-
* **WARP lets you enforce security policies anywhere**.\
17+
- **WARP lets you enforce security policies anywhere**.
1918
With the WARP client deployed in the Gateway with WARP mode, Gateway policies are not location-dependent — they can be enforced anywhere.
2019

21-
* **WARP lets you enforce HTTP filtering and user-based policies**.\
20+
- **WARP lets you enforce HTTP filtering and user-based policies**.
2221
Download and install the WARP client to enable Gateway features such as [Anti-Virus scanning](/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/), [HTTP filtering](/cloudflare-one/policies/gateway/http-policies/), [Browser Isolation](/cloudflare-one/policies/gateway/http-policies/#isolate), and [identity-based policies](/cloudflare-one/policies/gateway/network-policies/).
2322

24-
* **WARP lets you have in-depth, application-specific insights**.\
23+
- **WARP lets you have in-depth, application-specific insights**.
2524
With WARP installed on your corporate devices, you can populate the [Zero Trust Shadow IT Discovery](/cloudflare-one/insights/analytics/access/) page with visibility down to the application and user level. This makes it easy to discover, analyze, and take action on any shadow IT your users may be using every day.
2625

27-
* **WARP allows you to build rich device posture rules.**\
26+
- **WARP allows you to build rich device posture rules.**
2827
The WARP client provides advanced Zero Trust protection by making it possible to check for [device posture](/cloudflare-one/identity/devices/). By setting up device posture checks, you can build Zero Trust policies that check for a device's location, disk encryption status, OS version, and more.

0 commit comments

Comments
 (0)