Skip to content

Commit f0716cd

Browse files
authored
Updating UI instructions for /cf1/policies/ (#26111)
1 parent ecbbedf commit f0716cd

31 files changed

+87
-86
lines changed

src/content/docs/cloudflare-one/access-controls/policies/external-evaluation.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ You can set up External Evaluation rules using any API service, but to get start
5656
4. Open the [Wrangler configuration file](/workers/wrangler/configuration/) in an editor and insert the following:
5757

5858
- `[[kv_namespaces]]`: Add the output generated in the previous step.
59-
- `<TEAM_NAME>`: your Cloudflare Zero Trust <GlossaryTooltip term="team name">team name</GlossaryTooltip>.
59+
- `<TEAM_NAME>`: your Cloudflare Cloudflare One <GlossaryTooltip term="team name">team name</GlossaryTooltip>.
6060

6161
<WranglerConfig>
6262

@@ -110,7 +110,7 @@ Other key formats (such as DSA) are not supported at this time.
110110

111111
### 4. Create an External Evaluation rule
112112

113-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Policies**.
113+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Policies**.
114114

115115
2. Edit an existing policy or select **Add a policy**.
116116

@@ -122,7 +122,7 @@ Other key formats (such as DSA) are not supported at this time.
122122

123123
4. Save the policy.
124124

125-
5. Go to **Access** > **Applications** and edit the application for which you want to apply the External Evaluation rule.
125+
5. Go to **Access controls** > **Applications** and edit the application for which you want to apply the External Evaluation rule.
126126

127127
6. In the **Policies** tab, add the policy that contains the External Evaluation rule.
128128

src/content/docs/cloudflare-one/access-controls/policies/mfa-requirements.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This feature is only available if you are using the following identity providers
1818

1919
To enforce an MFA requirement to an application:
2020

21-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
21+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Applications**.
2222

2323
2. Find the application for which you want to enforce MFA and select **Configure**. Alternatively, [create a new application](/cloudflare-one/access-controls/applications/http-apps/).
2424

src/content/docs/cloudflare-one/access-controls/policies/policy-management.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Access policies define the users who can log in to your Access applications. You
1313

1414
To create a reusable Access policy:
1515

16-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Policies**.
16+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Policies**.
1717
2. Select **Add a policy**.
1818
3. Enter a **Policy name**.
1919
4. Choose an [**Action**](/cloudflare-one/access-controls/policies/#actions) for the policy.
@@ -31,7 +31,7 @@ You can now add this policy to an [Access application](/cloudflare-one/access-co
3131

3232
To make changes to an existing Access policy:
3333

34-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Policies**.
34+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Policies**.
3535
2. Locate the policy you want to update and select **Configure**.
3636
3. Once you have made the necessary changes, select **Save**.
3737

@@ -41,7 +41,7 @@ The updated policy is now in effect for all associated Access applications.
4141

4242
To delete a reusable Access policy:
4343

44-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Policies** and locate the policy you want to delete.
44+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Policies** and locate the policy you want to delete.
4545
2. If the policy is used by an application, remove the policy from all associated applications.
4646
3. Select **Delete**.
4747
4. A pop-up message will ask you to confirm your decision to delete the policy. Select **Delete**.
@@ -58,7 +58,7 @@ The Access policy builder allows you to test your rules before saving any change
5858

5959
To test an individual Access policy:
6060

61-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Policies**.
61+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Policies**.
6262
2. Locate the policy you want to test and select **Configure**.
6363
3. Go to **Policy tester** and select **Test policies**.
6464

@@ -70,7 +70,7 @@ You can test your Access application policies against your user population befor
7070

7171
To test if users have access to an application:
7272

73-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Applications**.
73+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Access controls** > **Applications**.
7474
2. Locate the application you want to test and select **Configure**.
7575
3. Go to **Policies** > **Policy tester**.
7676
4. To test all active users in your organization, select **Test policies**.

src/content/docs/cloudflare-one/access-controls/policies/require-purpose-justification.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ The purpose justification screen will show for any new sessions of an applicatio
1515

1616
Configuring a purpose justification screen is done as part of configuring an Access policy.
1717

18-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
18+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
1919
2. Choose an application and select **Configure**.
2020
3. Go to **Policies**.
2121
4. Choose an **Allow** policy and select **Configure**.

src/content/docs/cloudflare-one/access-controls/policies/temporary-auth.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ With Cloudflare Access, you can require that users obtain approval before they c
1010

1111
## Set up temporary authentication
1212

13-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
13+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Access controls** > **Applications**.
1414
2. Choose a **Self-hosted** or **SaaS** application and select **Configure**.
1515
3. Choose an **Allow** policy and select **Configure**.
1616
4. Under **Additional settings**, turn on [**Purpose justification**](/cloudflare-one/access-controls/policies/require-purpose-justification/).

src/content/docs/cloudflare-one/data-loss-prevention/dlp-policies/index.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ DLP scans will not start until you [create a DLP policy](#2-create-a-dlp-policy)
2525

2626
## 2. Create a DLP policy
2727

28-
DLP Profiles may be used alongside other Zero Trust rules in a [Gateway HTTP policy](/cloudflare-one/traffic-policies/http-policies/). To start logging or blocking traffic, create a policy for DLP:
28+
DLP Profiles may be used alongside other Cloudflare One rules in a [Gateway HTTP policy](/cloudflare-one/traffic-policies/http-policies/). To start logging or blocking traffic, create a policy for DLP:
2929

30-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Gateway** > **Firewall policies**. Select **HTTP**.
30+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Traffic policies** > **Firewall policies**. Select **HTTP**.
3131

3232
2. Select **Add a policy**.
3333

@@ -57,7 +57,7 @@ Different sites will send requests in different ways. For example, some sites wi
5757

5858
## 4. View DLP logs
5959

60-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Logs** > **Gateway** > **HTTP**.
60+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Logs** > **HTTP logs**.
6161
2. Select **Filter**.
6262
3. Choose an item under one of the following filters:
6363
- **DLP Profiles** shows the requests which matched a specific DLP profile.

src/content/docs/cloudflare-one/data-loss-prevention/dlp-policies/logging-options.mdx

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,10 @@ To generate a public/private key pair in the command line, refer to [these instr
1919

2020
### Upload the public key to Cloudflare
2121

22-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
23-
2. In the **DLP Payload Encryption public key** field, paste your public key.
24-
3. Select **Save**.
22+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Traffic policies** > **Traffic settings**.
23+
2. In the **Set a DLP payload and prompt encryption public key** field, select **Edit**.
24+
3. Paste your public key.
25+
4. Select **Save**.
2526

2627
:::note
2728
The matching private key is required to view logs. If you lose your private key, you will need to [generate](#1-generate-a-key-pair) and [upload](#2-upload-the-public-key-to-cloudflare) a new public key. The payload of new requests will be encrypted with the new public key.
@@ -35,7 +36,7 @@ DLP can log the payload of matched HTTP requests in your Cloudflare logs.
3536

3637
You can enable payload logging for any Allow or Block HTTP policy that uses the [_DLP Profile_](/cloudflare-one/traffic-policies/http-policies/#dlp-profile) selector.
3738

38-
1. Go to **Gateway** > **Firewall policies** > **HTTP**.
39+
1. Go to **Traffic policies** > **Firewall policies** > **HTTP**.
3940
2. Edit an existing Allow or Block DLP policy, or [create a new policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy).
4041
3. In the policy builder, scroll down to **Configure policy settings** and turn on **Log the payload of matched rules**.
4142
4. Select **Save**.
@@ -46,7 +47,7 @@ Data Loss Prevention will now store a portion of the payload for HTTP requests t
4647

4748
To view DLP payload logs:
4849

49-
1. Go to **Logs** > **Gateway** > **HTTP**.
50+
1. Go to **Insights** > **Logs** > **HTTP request logs**.
5051
2. Go to the DLP log you are interested in reviewing and expand the row.
5152
3. Select **Decrypt payload log**.
5253
4. Enter your private key and select **Decrypt**.
@@ -85,7 +86,7 @@ DLP can detect and log the prompt topic sent to an AI tool.
8586

8687
You can enable payload logging for any Allow or Block HTTP policy that uses the [_Application_](/cloudflare-one/traffic-policies/http-policies/#application) selector with a supported [Application Granular Controls](/cloudflare-one/traffic-policies/http-policies/#application-granular-controls) application.
8788

88-
1. Go to **Gateway** > **Firewall policies** > **HTTP**.
89+
1. Go to **Traffic policies** > **Firewall policies** > **HTTP**.
8990
2. Edit an existing Allow or Block DLP policy, or [create a new policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy).
9091
3. In the policy builder, scroll down to **Configure policy settings** and turn on **Capture generative AI prompt content in logs**.
9192
4. Select **Save**.
@@ -96,7 +97,7 @@ Data Loss Prevention will now store the user prompt and AI model response for re
9697

9798
To view generative AI prompt log details:
9899

99-
1. Go to **Logs** > **Gateway** > **HTTP**.
100+
1. Go to **Insights** > **Logs** > **HTTP request logs**.
100101
2. Go to the DLP log you are interested in reviewing and expand the row.
101102
3. Select **Decrypt payload log**.
102103
4. Enter your private key and select **Decrypt**.
@@ -114,16 +115,15 @@ Gateway allows you to send copies of entire HTTP requests matched in HTTP Allow
114115

115116
To set up the DLP Forensic Copy Logpush job:
116117

117-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Logs** > **Logpush**.
118-
2. If this is your first Logpush job, select **Add a Logpush job**. Otherwise, select **Go to logpush configurations**.
119-
3. In Logpush, select **Create a Logpush job**.
120-
4. Choose a [Logpush destination](/logs/logpush/logpush-job/enable-destinations/).
121-
5. In **Configure logpush job**, choose the _DLP forensic copies_ dataset. Select **Create Logpush job**.
122-
6. Return to Zero Trust and go to **Gateway** > **Firewall policies** > **HTTP**.
123-
7. Edit an existing Allow or Block policy, or [create a new policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy). Your policy does not need to include a DLP profile.
124-
8. In the policy builder, scroll down to **Configure policy settings** and turn on **Send DLP forensic copies to storage**.
125-
9. Select a storage destination. Gateway will list any configured Logpush jobs or integrations that can receive HTTP requests.
126-
10. Select **Save policy**.
118+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** >**Logs**, and select **Manage Logpush**.
119+
2. In Logpush, select **Create a Logpush job**.
120+
3. Choose a [Logpush destination](/logs/logpush/logpush-job/enable-destinations/).
121+
4. In **Configure logpush job**, choose the _DLP forensic copies_ dataset. Select **Create Logpush job**.
122+
5. Return to Cloudflare One and go to **Traffic policies** > **Firewall policies** > **HTTP**.
123+
6. Edit an existing Allow or Block policy, or [create a new policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy). Your policy does not need to include a DLP profile.
124+
7. In the policy builder, scroll down to **Configure policy settings** and turn on **Send DLP forensic copies to storage**.
125+
8. Select a storage destination. Gateway will list any configured Logpush jobs or integrations that can receive HTTP requests.
126+
9. Select **Save policy**.
127127

128128
DLP will now send a copy of HTTP requests that match this policy to your Logpush destination.
129129

src/content/docs/cloudflare-one/data-loss-prevention/dlp-profiles/advanced-settings.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This page lists the profile settings available when configuring a [predefined](/
1313

1414
To edit profile settings for an existing predefined or custom DLP profile:
1515

16-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **DLP profiles**.
16+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **Profiles**.
1717
2. Choose a profile, then select **Edit**.
1818
3. In **Settings**, configure the [settings](#available-settings) for your profile.
1919
4. Select **Save profile**.
@@ -44,7 +44,7 @@ DLP redacts any matched text, then submits the context as an AI text embedding v
4444

4545
To use AI context analysis:
4646

47-
1. Turn on **AI context analysis** in a DLP profile.
47+
1. Choose the **Confidence threshold** in a DLP profile.
4848
2. [Add the profile](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy) to a DLP policy.
4949
3. When configuring the DLP policy, turn on [payload logging](/cloudflare-one/data-loss-prevention/dlp-policies/logging-options/#log-the-payload-of-matched-rules).
5050

@@ -54,15 +54,16 @@ AI context analysis results will appear in the payload section of your [DLP logs
5454

5555
Confidence thresholds indicate how confident Cloudflare DLP is in a DLP detection. DLP determines the confidence by inspecting the content for proximity keywords around the detection.
5656

57-
Confidence threshold is set on the DLP profile. When you select a confidence threshold in Zero Trust, you will see which DLP entries will be affected by the confidence threshold. Entries that do not reflect a confidence threshold in Zero Trust are not yet supported or are not applicable.
57+
Confidence threshold is set on the DLP profile. When you select a confidence threshold in Cloudflare One, you will see which DLP entries will be affected by the confidence threshold. Entries that do not reflect a confidence threshold in Cloudflare One are not yet supported or are not applicable.
5858

5959
DLP confidence detections consist of Low, Medium, and High confidence thresholds. DLP will default to Low confidence detections, which are based on regular expressions, require few keywords, and will trigger more often. Medium and High confidence detections require more keywords, will trigger less often, and have a higher likelihood of accuracy.
6060

6161
To change the confidence threshold of a DLP profile:
6262

63-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **DLP profiles**.
63+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **Profiles**.
6464
2. Select the profile, then select **Edit**.
6565
3. In **Settings** > **Confidence threshold**, choose a new confidence threshold from the dropdown menu.
66+
4. Select **Save profile**.
6667

6768
Setting the confidence to Low will also consider Medium and High confidence detections as matches. Setting the confidence to Medium or High will filter out lower confidence detections.
6869

src/content/docs/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Clientless Web Isolation allows users to securely browse high risk or sensitive
1313

1414
<Render file="clientless-browser-isolation" product="cloudflare-one" />
1515

16-
3. To configure permissions, in **Settings** > **Browser Isolation** > select **Manage** next to Permissions. You can add authentication methods and [rules](/cloudflare-one/access-controls/policies/) to control who can access the remote browser.
16+
3. To configure permissions, in **Browser isolation** > **Browser isolation settings** > select **Manage** next to **Manage remote browser permissions**. You can add authentication methods and [rules](/cloudflare-one/access-controls/policies/) to control who can access the remote browser.
1717

1818
4. Under **Policies** > Access Policies > select **Create new policy**.
1919

@@ -31,7 +31,7 @@ Your application will now be served in an isolated browser for users matching yo
3131

3232
To open links using Browser Isolation:
3333

34-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Browser Isolation**.
34+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Browser isolation**.
3535
2. Select **Launch isolated browser**. Turn **Clientless web isolation** on.
3636
3. In **Launch browser**, enter the URL link, and then select **Launch**. Your URL will open in a secure isolated browser.
3737

src/content/docs/cloudflare-one/remote-browser-isolation/setup/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Setup instructions vary depending on how you want to connect your devices to Clo
2424

2525
To configure Browser Isolation policies:
2626

27-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Gateway** > **Firewall policies** > **HTTP**.
27+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Traffic policies** > **Firewall policies** > **HTTP**.
2828
2. Select **Add a policy** and enter a name for the policy.
2929
3. Use the HTTP policy [selectors](/cloudflare-one/traffic-policies/http-policies/#selectors) and [operators](/cloudflare-one/traffic-policies/http-policies/#comparison-operators) to specify the websites or content you want to isolate.
3030
4. For **Action**, choose either [_Isolate_](/cloudflare-one/remote-browser-isolation/isolation-policies/#isolate) or [_Do not Isolate_](/cloudflare-one/remote-browser-isolation/isolation-policies/#do-not-isolate).

0 commit comments

Comments
 (0)