Skip to content

Commit f0a3db4

Browse files
authored
[DLP] AI prompt logs fast follow (#24678)
1 parent 3d2131a commit f0a3db4

File tree

7 files changed

+25
-6
lines changed

7 files changed

+25
-6
lines changed

src/content/docs/cloudflare-one/applications/app-library.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The **Policies** tab shows any [Gateway](/cloudflare-one/policies/gateway/) and
3838

3939
### Usage
4040

41-
The **Usage** tab shows any logs for [Gateway traffic requests](/cloudflare-one/insights/logs/gateway-logs/), [Access authentication events](/cloudflare-one/insights/logs/audit-logs/#authentication-logs), and [Shadow IT Discovery user sessions](/cloudflare-one/insights/analytics/shadow-it-discovery/) sent to the selected application. This section requires logs to be turned on for each feature.
41+
The **Usage** tab shows any logs for [Gateway traffic requests](/cloudflare-one/insights/logs/gateway-logs/), [Access authentication events](/cloudflare-one/insights/logs/audit-logs/#authentication-logs), [Shadow IT Discovery user sessions](/cloudflare-one/insights/analytics/shadow-it-discovery/), and [generative AI prompt logs](/cloudflare-one/policies/data-loss-prevention/dlp-policies/logging-options/#view-prompt-logs) sent to the selected application. This section requires logs to be turned on for each feature.
4242

4343
The Shadow IT Discovery dashboard will provide more details for discovered applications. To access Shadow IT Discovery in [Zero Trust](https://one.dash.cloudflare.com/), go to **Analytics**, then select **Shadow IT Discovery**.
4444

src/content/docs/cloudflare-one/applications/casb/casb-integrations/openai.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This integration covers the following OpenAI products:
1515
- GPTs (custom GPTs)
1616

1717
:::note
18-
Before you begin, ensure that OpenAI has enabled ChatGPT Enterprise Compliance API access for your organization. You will need an Admin API key issued for your organization, your Organization ID, and your Workspace ID. These are available in your [ChatGPT Admin Settings](https://chatgpt.com/admin/settings).
18+
Before you begin, ensure that OpenAI has enabled ChatGPT Enterprise Compliance API access for your organization. You will need a Project API key issued for your organization, your Organization ID, and your Workspace ID. These are available in your [OpenAI Project API Keys](https://platform.openai.com/settings/organization/projects).
1919

2020
If Compliance API access is not yet turned on for your organization, refer to [Enable Compliance API access](#enable-combliane-api-access).
2121
:::
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
pcx_content_type: navigation
3+
title: AI prompt logs
4+
external_link: /cloudflare-one/policies/data-loss-prevention/dlp-policies/logging-options/#log-generative-ai-prompt-content
5+
sidebar:
6+
order: 5
7+
---

src/content/docs/cloudflare-one/insights/analytics/shadow-it-discovery.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
pcx_content_type: reference
33
title: Shadow IT SaaS analytics
44
sidebar:
5-
order: 5
5+
order: 4
66
---
77

88
import { Render } from "~/components";

src/content/docs/cloudflare-one/policies/data-loss-prevention/dlp-policies/logging-options.mdx

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To view DLP payload logs:
4848

4949
1. Go to **Logs** > **Gateway** > **HTTP**.
5050
2. Go to the DLP log you are interested in reviewing and expand the row.
51-
3. Select **Decrypt Payload Log**.
51+
3. Select **Decrypt payload log**.
5252
4. Enter your private key and select **Decrypt**.
5353

5454
You will see the [ID of the matched DLP Profile](/api/resources/zero_trust/subresources/dlp/subresources/profiles/methods/list/) followed by the decrypted payload.
@@ -92,6 +92,18 @@ You can enable payload logging for any Allow or Block HTTP policy that uses the
9292

9393
Data Loss Prevention will now store the user prompt and AI model response for requests that match this policy.
9494

95+
### View prompt logs
96+
97+
To view generative AI prompt log details:
98+
99+
1. Go to **Logs** > **Gateway** > **HTTP**.
100+
2. Go to the DLP log you are interested in reviewing and expand the row.
101+
3. Select **Decrypt payload log**.
102+
4. Enter your private key and select **Decrypt**.
103+
5. In **Summary** > **GenAI prompt captured**, select **View prompt**.
104+
105+
Gateway logs will provide a summary of the conversation, including the topic and AI model used, and the user prompt and AI model's raw response if available. A text prompt must be present for DLP to capture the prompt.
106+
95107
## Send DLP forensic copies to Logpush destination
96108

97109
:::note[Availability]

src/content/docs/learning-paths/holistic-ai-security/monitor-ai-use/review-out-of-band-ai.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@ sidebar:
66
order: 3
77
---
88

9-
If your organization does not use the Cloudflare device client, or does not proxy HTTP traffic, you can still get valuable data about shadow AI usage if you use the Google Workspace, Microsoft 365, or GitHub integrations for the Cloudflare Cloud Access Security Broker (CASB).
9+
If your organization does not use the Cloudflare device client, or does not proxy HTTP traffic, you can still get valuable data about shadow AI usage if you use the [Google Workspace](/cloudflare-one/applications/casb/casb-integrations/google-workspace/), [Microsoft 365](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/), or [GitHub](/cloudflare-one/applications/casb/casb-integrations/github/) integrations for the Cloudflare Cloud Access Security Broker (CASB).
1010

1111
The CASB provides detailed information about your SaaS environment, including changes to sensitive data, content, and application settings. It works even if your users do not have the Cloudflare device client installed. By using CASB integrations with your core Single Sign-On (SSO) provider, you can see if users have authenticated to any third-party applications. This offers a clear, non-invasive way to understand tool usage across your organization without needing to deploy a client.

src/content/docs/learning-paths/holistic-ai-security/secure-approved-ai-models-tools/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sidebar:
1010

1111
As you decide which AI tools to sanction within your organization, you can develop security controls with the expectation of consistent use.
1212

13-
Cloudflare supports API-based cloud access security broker (CASB) integrations with popular AI services like OpenAI (ChatGPT), Anthropic (Claude), and Google Gemini. These integrations allow you to report on AI tool usage and flag sensitive data with Data Loss Prevention (DLP) Profiles.
13+
Cloudflare supports API-based cloud access security broker (CASB) integrations with popular AI services like [OpenAI (ChatGPT)](/cloudflare-one/applications/casb/casb-integrations/openai/), [Anthropic (Claude)](/cloudflare-one/applications/casb/casb-integrations/anthropic/), and [Google Gemini](/cloudflare-one/applications/casb/casb-integrations/google-workspace/gemini/). These integrations allow you to report on AI tool usage and flag sensitive data with Data Loss Prevention (DLP) Profiles.
1414

1515
Since these integrations are out-of-bound connections to SaaS applications, they do not require inline user traffic to create detections. This means you can immediately gain visibility into how your employees are using sanctioned AI tools without having to install the Cloudflare device client on every user's machine.
1616

0 commit comments

Comments
 (0)