Skip to content

Commit ec3b46f

Browse files
committed
Rename CAC --> app granular controls
1 parent 3a27369 commit ec3b46f

File tree

4 files changed

+5
-5
lines changed

4 files changed

+5
-5
lines changed

src/content/docs/cloudflare-one/policies/data-loss-prevention/detection-entries.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ Your new document entry will replace the original document entry. If your file u
135135

136136
## AI prompt topics
137137

138-
DLP uses [Cloud App Control](/cloudflare-one/policies/gateway/http-policies/#cloud-app-control) to detect and categorize prompts and responses submitted to generative AI tools. Cloud App Control analyzes prompts for both content and user intent. Supported prompt topic detections include:
138+
DLP uses [Application Granular Controls](/cloudflare-one/policies/gateway/http-policies/#application-granular-controls) to detect and categorize prompts and responses submitted to generative AI tools. Application Granular Controls analyzes prompts for both content and user intent. Supported prompt topic detections include:
139139

140140
| Detection entry | Description |
141141
| ------------------------------------- | ------------------------------------------------------------------------------------------------ |

src/content/docs/cloudflare-one/policies/data-loss-prevention/dlp-policies/logging-options.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ DLP can detect and log the prompt topic sent to an AI tool.
8383

8484
### Turn on AI prompt content logging for a DLP policy
8585

86-
You can enable payload logging for any Allow or Block HTTP policy that uses the [_Application_](/cloudflare-one/policies/gateway/http-policies/#application) selector with a supported [Cloud App Control](/cloudflare-one/policies/gateway/http-policies/#cloud-app-control) application.
86+
You can enable payload logging for any Allow or Block HTTP policy that uses the [_Application_](/cloudflare-one/policies/gateway/http-policies/#application) selector with a supported [Application Granular Controls](/cloudflare-one/policies/gateway/http-policies/#application-granular-controls) application.
8787

8888
1. Go to **Gateway** > **Firewall policies** > **HTTP**.
8989
2. Edit an existing Allow or Block DLP policy, or [create a new policy](/cloudflare-one/policies/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy).

src/content/docs/cloudflare-one/policies/gateway/application-app-types.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Gateway sorts applications into the following app type groups:
4949

5050
## Application controls
5151

52-
With [Cloud App Control](/cloudflare-one/policies/gateway/http-policies/#cloud-app-control), you can choose specific actions and operations to match application traffic. Supported applications and operations include:
52+
With [Application Granular Controls](/cloudflare-one/policies/gateway/http-policies/#application-granular-controls), you can choose specific actions and operations to match application traffic. Supported applications and operations include:
5353

5454
<Details header="ChatGPT (app ID `1199`)" open = {true}>
5555

src/content/docs/cloudflare-one/policies/gateway/http-policies/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -420,9 +420,9 @@ The review approval status of an application from [Shadow IT Discovery](/cloudfl
420420
When using Terraform to create a policy with the [Do Not Inspect](#do-not-inspect) action, you must use the `app.hosts_ids` and `app.supports_ids` selectors. For example, to create a Do Not Inspect policy for Google Cloud Platform traffic, create a policy with both `any(app.hosts_ids[*] in {1245})` and `any(app.supports_ids[*] in {1245})`.
421421
:::
422422

423-
#### Cloud App Control
423+
#### Application Granular Controls
424424

425-
When using the _is_ operator with the _Application_ selector, you can use Cloud App Control to choose specific actions and operations to match application traffic. For example, you can block file uploads to ChatGPT without blocking all ChatGPT traffic:
425+
When using the _is_ operator with the _Application_ selector, you can use Application Granular Controls to choose specific actions and operations to match application traffic. For example, you can block file uploads to ChatGPT without blocking all ChatGPT traffic:
426426

427427
| Selector | Operator | Value | Controls | Action |
428428
| ----------- | -------- | --------- | -------- | ------ |

0 commit comments

Comments
 (0)