Skip to content

Commit f2d0e86

Browse files
authored
[CF1] UI instruction updates (#26134)
* move mtls * update links * move tanium * gateway block page * split out app launcher customization * fix links * fix links * cleanup chart * ui updates * Update src/content/glossary/cloudflare-one.yaml * proxy
1 parent b92d393 commit f2d0e86

File tree

12 files changed

+31
-31
lines changed

12 files changed

+31
-31
lines changed

src/content/docs/cloudflare-one/data-loss-prevention/detection-entries.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,8 @@ To select which Exact Data Match columns to use, you will need to [reupload any
5252
<Details header="Upload an Exact Data Match dataset">
5353

5454
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **Detection entries**.
55-
2. Go to **Datasets**.
56-
3. Select **Add a dataset**. In **Exact Data Match (EDM)**, choose **Select**.
55+
2. From the **Datasets** tab, select **Add a dataset**.
56+
3. Select **Exact Data Match (EDM)**.
5757
4. Upload your dataset file. Select **Next**.
5858
5. Review and choose the detected columns you want to include. Select **Next**.
5959
6. Name your dataset. Optionally, add a description. Select **Next**.
@@ -66,8 +66,8 @@ DLP will encrypt your dataset and save its hash.
6666
<Details header="Upload a Custom Wordlist dataset">
6767

6868
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Data loss prevention** > **Detection entries**.
69-
2. Go to **Datasets**.
70-
3. Select **Add a dataset**. In **Custom Wordlist (CWL)**, choose **Select**.
69+
2. From the **Datasets** tab, select **Add a dataset**.
70+
3. Select **Custom Wordlist (CWL)**.
7171
4. Name your dataset. Optionally, add a description.
7272
5. (Optional) In **Settings**, turn on **Enforce case sensitivity** to require matched values to contain exact capitalization.
7373
6. In **Upload file**, choose your dataset file.

src/content/docs/cloudflare-one/insights/logs/gateway-logs/manage-pii.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Cloudflare Gateway can log the following types of PII:
2323

2424
Enabling this setting means Cloudflare Gateway will log activity without storing any employee PII. Changes to this setting will not change PII storage of any previous logs. This means if Exclude PII is enabled and then disabled, there will be no PII data for logs captured while Exclude PII was enabled. The PII data will be unavailable to all roles within your Zero Trust organization, including the Super Admin.
2525

26-
To enable or disable this setting, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Settings** > **Network** > **Exclude PII**.
26+
To enable or disable this setting, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Traffic policies** > **Traffic settings** > **Exclude personally identifiable information (PII) from logs**.
2727

2828
## Redact PII
2929

src/content/docs/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/ssh-infrastructure-access.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ To turn off SSH command logging, delete your uploaded public key:
129129
<Tabs>
130130
<TabItem label="Dashboard">
131131

132-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network** > **SSH encryption public key**.
132+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Traffic policies** > **Traffic settings** > **SSH log encryption public key**.
133133

134134
2. Select **Remove**.
135135

src/content/docs/cloudflare-one/remote-browser-isolation/setup/non-identity.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,6 @@ If you want to apply Isolate policies based on user identity, you will need to e
1919
- Configure your browser to forward traffic to a Gateway proxy endpoint with [PAC files](/cloudflare-one/team-and-resources/devices/agentless/pac-files/).
2020
- Connect your enterprise site router to Gateway with the [anycast GRE or IPsec tunnel on-ramp to Magic WAN](/magic-wan/zero-trust/cloudflare-gateway/).
2121
3. Enable non-identity browser isolation:
22-
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Browser isolation** > *Browser isolation settings**.
23-
2. Turn on **Non-identity on-ramp support**.
22+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Browser isolation** > **Browser isolation settings**.
23+
2. Turn on **Allow isolated HTTP traffic when user identity is unknown**.
2424
4. Build a non-identity [HTTP policy](/cloudflare-one/remote-browser-isolation/isolation-policies/) to isolate websites in a remote browser.

src/content/docs/cloudflare-one/reusable-components/posture-checks/warp-client-checks/require-warp.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ Cloudflare One enables you to restrict access to your applications to devices ru
3131

3232
## 1. Enable the WARP check
3333

34-
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
35-
2. Ensure that **Proxy** is enabled.
34+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Traffic policies** > **Traffic settings**.
35+
2. Ensure that *Allow Secure Web Gateway to proxy traffic** is enabled.
3636
3. Go to **Reusable components** > **Posture checks**.
3737
4. In **WARP client checks**, select **Add a check**.
3838
5. Select **WARP**, then select **Save**.

src/content/docs/cloudflare-one/team-and-resources/devices/warp/troubleshooting/troubleshooting-guide.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ The [WARP Diagnostics Analyzer](/cloudflare-one/team-and-resources/devices/warp/
129129

130130
After you run a [DEX remote capture](#option-a-collect-logs-via-the-cloudflare-dashboard) for WARP diagnostics:
131131

132-
1. Go to **DEX** > **Remote captures**.
132+
1. Go to **Insights** > **Digital experience** and select the **Diagnotics** tab.
133133
2. Find your capture in the list of captures.
134134
3. Select the three-dot icon next to **Status** > select **View WARP Diag** to generate an AI summary.
135135

src/content/docs/cloudflare-one/traffic-policies/egress-policies/dedicated-egress-ips.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ An account can have any number of additional dedicated egress IPs. To request ad
2020
To start routing traffic through dedicated egress IPs:
2121

2222
1. Contact your account team to obtain a dedicated egress IP.
23-
2. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
24-
3. In **Firewall**, turn on **Proxy**.
23+
2. In [Zero Trust](https://one.dash.cloudflare.com), go to **Traffic policies** > **Traffic settings**.
24+
3. Turn on **Allow Secure Web Gateway to proxy traffic**.
2525
4. Select **TCP**.
2626
5. (Optional) Select **UDP**. This will allow HTTP/3 traffic to egress with your dedicated IPs.
2727

src/content/docs/cloudflare-one/traffic-policies/http-policies/file-sandboxing.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,8 @@ flowchart TD
4949

5050
To begin quarantining downloaded files, turn on file sandboxing:
5151

52-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Network**.
53-
2. In **Firewall**, turn on **File sandboxing**.
52+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Traffic policies** > **Traffic settings**.
53+
2. Turn on **File sandboxing**.
5454
3. (Optional) To block requests containing [non-scannable files](#non-scannable-files), select **Block requests for files that cannot be scanned**.
5555

5656
You can now create [Quarantine HTTP policies](/cloudflare-one/traffic-policies/http-policies/#quarantine) to determine what files to scan in the sandbox.

src/content/docs/cloudflare-one/traffic-policies/network-policies/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -318,7 +318,7 @@ The inferred network protocol based on Cloudflare's [protocol detection](/cloudf
318318
<Render file="gateway/selectors/protocol" product="cloudflare-one" />
319319

320320
:::note
321-
To enable Gateway filtering on TCP and UDP, go to **Settings** > **Network** > **Proxy**. Network policies apply to all enabled protocols unless you use the **Protocol** selector within a policy.
321+
To enable Gateway filtering on TCP and UDP, go to **Traffic policies** > **Traffic settings** > **Allow Secure Web Gateway to proxy traffic**. Network policies apply to all enabled protocols unless you use the **Protocol** selector within a policy.
322322
:::
323323

324324
### Proxy Endpoint

src/content/docs/learning-paths/secure-internet-traffic/configure-device-agent/enable-proxy.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ import { Render } from "~/components";
1111

1212
## Enable the proxy
1313

14-
1. Go to **Settings** > **Network**.
15-
2. Enable **Proxy** for TCP.
14+
1. Go to **Traffic policies** > **Traffic settings**.
15+
2. Enable **Allow Secure Web Gateway to proxy traffic** for TCP.
1616
3. (Recommended) To proxy all port `443` traffic, including internal DNS queries, select **UDP**.
1717
4. (Optional) To scan file uploads and downloads for malware, [enable anti-virus scanning](/cloudflare-one/traffic-policies/http-policies/antivirus-scanning/).
1818

0 commit comments

Comments
 (0)