You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/access-controls/policies/mfa-requirements.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ This feature is only available if you are using the following identity providers
18
18
19
19
To enforce an MFA requirement to an application:
20
20
21
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
21
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Applications**.
22
22
23
23
2. Find the application for which you want to enforce MFA and select **Configure**. Alternatively, [create a new application](/cloudflare-one/access-controls/applications/http-apps/).
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/data-loss-prevention/dlp-policies/index.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,9 +25,9 @@ DLP scans will not start until you [create a DLP policy](#2-create-a-dlp-policy)
25
25
26
26
## 2. Create a DLP policy
27
27
28
-
DLP Profiles may be used alongside other Zero Trust rules in a [Gateway HTTP policy](/cloudflare-one/traffic-policies/http-policies/). To start logging or blocking traffic, create a policy for DLP:
28
+
DLP Profiles may be used alongside other Cloudflare One rules in a [Gateway HTTP policy](/cloudflare-one/traffic-policies/http-policies/). To start logging or blocking traffic, create a policy for DLP:
29
29
30
-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Gateway** > **Firewall policies**. Select **HTTP**.
30
+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Traffic policies** > **Firewall policies**. Select **HTTP**.
31
31
32
32
2. Select **Add a policy**.
33
33
@@ -57,7 +57,7 @@ Different sites will send requests in different ways. For example, some sites wi
57
57
58
58
## 4. View DLP logs
59
59
60
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Logs** > **Gateway** > **HTTP**.
60
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Logs** > **HTTP logs**.
61
61
2. Select **Filter**.
62
62
3. Choose an item under one of the following filters:
63
63
-**DLP Profiles** shows the requests which matched a specific DLP profile.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/data-loss-prevention/dlp-policies/logging-options.mdx
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,9 +19,10 @@ To generate a public/private key pair in the command line, refer to [these instr
19
19
20
20
### Upload the public key to Cloudflare
21
21
22
-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
23
-
2. In the **DLP Payload Encryption public key** field, paste your public key.
24
-
3. Select **Save**.
22
+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Traffic policies** > **Traffic settings**.
23
+
2. In the **Set a DLP payload and prompt encryption public key** field, select **Edit**.
24
+
3. Paste your public key.
25
+
4. Select **Save**.
25
26
26
27
:::note
27
28
The matching private key is required to view logs. If you lose your private key, you will need to [generate](#1-generate-a-key-pair) and [upload](#2-upload-the-public-key-to-cloudflare) a new public key. The payload of new requests will be encrypted with the new public key.
@@ -35,7 +36,7 @@ DLP can log the payload of matched HTTP requests in your Cloudflare logs.
35
36
36
37
You can enable payload logging for any Allow or Block HTTP policy that uses the [_DLP Profile_](/cloudflare-one/traffic-policies/http-policies/#dlp-profile) selector.
37
38
38
-
1. Go to **Gateway** > **Firewall policies** > **HTTP**.
39
+
1. Go to **Traffic policies** > **Firewall policies** > **HTTP**.
39
40
2. Edit an existing Allow or Block DLP policy, or [create a new policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy).
40
41
3. In the policy builder, scroll down to **Configure policy settings** and turn on **Log the payload of matched rules**.
41
42
4. Select **Save**.
@@ -46,7 +47,7 @@ Data Loss Prevention will now store a portion of the payload for HTTP requests t
46
47
47
48
To view DLP payload logs:
48
49
49
-
1. Go to **Logs** > **Gateway** > **HTTP**.
50
+
1. Go to **Insights** > **Logs** > **HTTP request logs**.
50
51
2. Go to the DLP log you are interested in reviewing and expand the row.
51
52
3. Select **Decrypt payload log**.
52
53
4. Enter your private key and select **Decrypt**.
@@ -85,7 +86,7 @@ DLP can detect and log the prompt topic sent to an AI tool.
85
86
86
87
You can enable payload logging for any Allow or Block HTTP policy that uses the [_Application_](/cloudflare-one/traffic-policies/http-policies/#application) selector with a supported [Application Granular Controls](/cloudflare-one/traffic-policies/http-policies/#application-granular-controls) application.
87
88
88
-
1. Go to **Gateway** > **Firewall policies** > **HTTP**.
89
+
1. Go to **Traffic policies** > **Firewall policies** > **HTTP**.
89
90
2. Edit an existing Allow or Block DLP policy, or [create a new policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy).
90
91
3. In the policy builder, scroll down to **Configure policy settings** and turn on **Capture generative AI prompt content in logs**.
91
92
4. Select **Save**.
@@ -96,7 +97,7 @@ Data Loss Prevention will now store the user prompt and AI model response for re
96
97
97
98
To view generative AI prompt log details:
98
99
99
-
1. Go to **Logs** > **Gateway** > **HTTP**.
100
+
1. Go to **Insights** > **Logs** > **HTTP request logs**.
100
101
2. Go to the DLP log you are interested in reviewing and expand the row.
101
102
3. Select **Decrypt payload log**.
102
103
4. Enter your private key and select **Decrypt**.
@@ -114,16 +115,15 @@ Gateway allows you to send copies of entire HTTP requests matched in HTTP Allow
114
115
115
116
To set up the DLP Forensic Copy Logpush job:
116
117
117
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Logs** > **Logpush**.
118
-
2. If this is your first Logpush job, select **Add a Logpush job**. Otherwise, select **Go to logpush configurations**.
119
-
3. In Logpush, select **Create a Logpush job**.
120
-
4. Choose a [Logpush destination](/logs/logpush/logpush-job/enable-destinations/).
121
-
5. In **Configure logpush job**, choose the _DLP forensic copies_ dataset. Select **Create Logpush job**.
122
-
6. Return to Zero Trust and go to **Gateway** > **Firewall policies** > **HTTP**.
123
-
7. Edit an existing Allow or Block policy, or [create a new policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy). Your policy does not need to include a DLP profile.
124
-
8. In the policy builder, scroll down to **Configure policy settings** and turn on **Send DLP forensic copies to storage**.
125
-
9. Select a storage destination. Gateway will list any configured Logpush jobs or integrations that can receive HTTP requests.
126
-
10. Select **Save policy**.
118
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** >**Logs**, and select **Manage Logpush**.
119
+
2. In Logpush, select **Create a Logpush job**.
120
+
3. Choose a [Logpush destination](/logs/logpush/logpush-job/enable-destinations/).
121
+
4. In **Configure logpush job**, choose the _DLP forensic copies_ dataset. Select **Create Logpush job**.
122
+
5. Return to Cloudflare One and go to **Traffic policies** > **Firewall policies** > **HTTP**.
123
+
6. Edit an existing Allow or Block policy, or [create a new policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy). Your policy does not need to include a DLP profile.
124
+
7. In the policy builder, scroll down to **Configure policy settings** and turn on **Send DLP forensic copies to storage**.
125
+
8. Select a storage destination. Gateway will list any configured Logpush jobs or integrations that can receive HTTP requests.
126
+
9. Select **Save policy**.
127
127
128
128
DLP will now send a copy of HTTP requests that match this policy to your Logpush destination.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/data-loss-prevention/dlp-profiles/advanced-settings.mdx
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ This page lists the profile settings available when configuring a [predefined](/
13
13
14
14
To edit profile settings for an existing predefined or custom DLP profile:
15
15
16
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **DLP profiles**.
16
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **Profiles**.
17
17
2. Choose a profile, then select **Edit**.
18
18
3. In **Settings**, configure the [settings](#available-settings) for your profile.
19
19
4. Select **Save profile**.
@@ -44,7 +44,7 @@ DLP redacts any matched text, then submits the context as an AI text embedding v
44
44
45
45
To use AI context analysis:
46
46
47
-
1.Turn on**AI context analysis** in a DLP profile.
47
+
1.Choose the**Confidence threshold** in a DLP profile.
48
48
2.[Add the profile](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy) to a DLP policy.
49
49
3. When configuring the DLP policy, turn on [payload logging](/cloudflare-one/data-loss-prevention/dlp-policies/logging-options/#log-the-payload-of-matched-rules).
50
50
@@ -54,15 +54,16 @@ AI context analysis results will appear in the payload section of your [DLP logs
54
54
55
55
Confidence thresholds indicate how confident Cloudflare DLP is in a DLP detection. DLP determines the confidence by inspecting the content for proximity keywords around the detection.
56
56
57
-
Confidence threshold is set on the DLP profile. When you select a confidence threshold in Zero Trust, you will see which DLP entries will be affected by the confidence threshold. Entries that do not reflect a confidence threshold in Zero Trust are not yet supported or are not applicable.
57
+
Confidence threshold is set on the DLP profile. When you select a confidence threshold in Cloudflare One, you will see which DLP entries will be affected by the confidence threshold. Entries that do not reflect a confidence threshold in Cloudflare One are not yet supported or are not applicable.
58
58
59
59
DLP confidence detections consist of Low, Medium, and High confidence thresholds. DLP will default to Low confidence detections, which are based on regular expressions, require few keywords, and will trigger more often. Medium and High confidence detections require more keywords, will trigger less often, and have a higher likelihood of accuracy.
60
60
61
61
To change the confidence threshold of a DLP profile:
62
62
63
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **DLP profiles**.
63
+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **Profiles**.
64
64
2. Select the profile, then select **Edit**.
65
65
3. In **Settings** > **Confidence threshold**, choose a new confidence threshold from the dropdown menu.
66
+
4. Select **Save profile**.
66
67
67
68
Setting the confidence to Low will also consider Medium and High confidence detections as matches. Setting the confidence to Medium or High will filter out lower confidence detections.
3. To configure permissions, in **Settings** > **Browser Isolation** > select **Manage** next to Permissions. You can add authentication methods and [rules](/cloudflare-one/access-controls/policies/) to control who can access the remote browser.
16
+
3. To configure permissions, in **Browser isolation** > **Browser isolation settings** > select **Manage** next to **Manage remote browser permissions**. You can add authentication methods and [rules](/cloudflare-one/access-controls/policies/) to control who can access the remote browser.
17
17
18
18
4. Under **Policies** > Access Policies > select **Create new policy**.
19
19
@@ -31,7 +31,7 @@ Your application will now be served in an isolated browser for users matching yo
31
31
32
32
To open links using Browser Isolation:
33
33
34
-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Browser Isolation**.
34
+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Browser isolation**.
35
35
2. Select **Launch isolated browser**. Turn **Clientless web isolation** on.
36
36
3. In **Launch browser**, enter the URL link, and then select **Launch**. Your URL will open in a secure isolated browser.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/remote-browser-isolation/setup/index.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Setup instructions vary depending on how you want to connect your devices to Clo
24
24
25
25
To configure Browser Isolation policies:
26
26
27
-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Gateway** > **Firewall policies** > **HTTP**.
27
+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Traffic policies** > **Firewall policies** > **HTTP**.
28
28
2. Select **Add a policy** and enter a name for the policy.
29
29
3. Use the HTTP policy [selectors](/cloudflare-one/traffic-policies/http-policies/#selectors) and [operators](/cloudflare-one/traffic-policies/http-policies/#comparison-operators) to specify the websites or content you want to isolate.
30
30
4. For **Action**, choose either [_Isolate_](/cloudflare-one/remote-browser-isolation/isolation-policies/#isolate) or [_Do not Isolate_](/cloudflare-one/remote-browser-isolation/isolation-policies/#do-not-isolate).
0 commit comments