Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 1 addition & 1 deletion src/components/changelog/ProductPills.astro
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ const { products } = await props.parseAsync(Astro.props);
const data = await getEntries(products);
---

<div class="flex flex-row gap-2">
<div class="flex flex-row flex-wrap gap-2">
{
data.map((product) => (
<a href={product.data.product.url} class="no-underline">
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
---
title: Find security misconfigurations in your AWS cloud environment
description: CASB and DLP with Cloud Data Extraction for AWS cloud environments
date: 2024-11-22T11:00:00Z
products:
- dlp
---

import { Render } from "~/components";

You can now use CASB to find security misconfigurations in your AWS cloud environment using [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/).

You can also [connect your AWS compute account](/cloudflare-one/applications/casb/casb-integrations/aws-s3/#compute-account) to extract and scan your S3 buckets for sensitive data while avoiding egress fees. CASB will scan any objects that exist in the bucket at the time of configuration.

<Render file="casb/aws-compute-account" product="cloudflare-one" />
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
---
title: Troubleshoot tunnels with diagnostic logs
description: View tunnel diagnostic logs
date: 2024-12-19T11:00:00Z
---

import { Render } from "~/components";

The latest `cloudflared` build [2024.12.2](https://github.com/cloudflare/cloudflared/releases/tag/2024.12.2) introduces the ability to collect all the diagnostic logs needed to troubleshoot a `cloudflared` instance.

A diagnostic report collects data from a single instance of `cloudflared` running on the local machine and outputs it to a `cloudflared-diag` file.

<Render file="tunnel/tunnel-diag-file" product="cloudflare-one" />

For more information, refer to [Diagnostic logs](/cloudflare-one/connections/connect-networks/troubleshoot-tunnels/diag-logs/).
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
---
title: Detect source code leaks with Data Loss Prevention
description: Added source code confidence levels to Data Loss Prevention
date: 2025-01-03T11:00:00Z
---

import { Render } from "~/components";

You can now detect source code leaks with Data Loss Prevention (DLP) with predefined checks against common programming languages.

<Render
file="data-loss-prevention/programming-language-list"
product="cloudflare-one"
/>

For more details, refer to [DLP profiles](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/).
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
---
title: Increased transparency for phishing email submissions
description: New Email reclassifications tab
date: 2024-12-19T11:00:00Z
---

import { Render } from "~/components";

You now have more transparency about team and user submissions for phishing emails through a **Reclassification** tab in the Zero Trust dashboard.

Reclassifications happen when users or admins [submit a phish](/cloudflare-one/email-security/phish-submissions/) to Email Security. Cloudflare reviews and - in some cases - reclassifies these emails based on improvements to our machine learning models.

This new tab increases your visibility into this process, allowing you to view what submissions you have made and what the outcomes of those submissions are.

![Use the Reclassification area to review submitted phishing emails](~/assets/images/changelog/email-security/reclassifications-tab.png)
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
---
title: Block files that are password-protected, compressed, or otherwise unscannable.
description: Unscannable files for Download and Upload File Types selectors
date: 2025-02-03T11:00:00Z
products:
- dlp
---

import { Render } from "~/components";

Gateway HTTP policies can now block files that are password-protected, compressed, or otherwise unscannable.

These unscannable files are now matched with the [Download and Upload File Types traffic selectors](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types) for HTTP policies:

<Render file="gateway/policies/unscannable-files" product="cloudflare-one" />

To get started inspecting and modifying behavior based on these and other rules, refer to [HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/).
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
---
title: Generate customized terrform files for building cloud network on-ramps
description: Download cloud onramp terraform
date: 2024-12-05T11:00:00Z
---

import { Render } from "~/components";

You can now generate customized terraform files for building cloud network on-ramps to [Magic WAN](/magic-wan/).

[Magic Cloud](/magic-cloud-networking/) can scan and discover existing network resources and generate the required terraform files to automate cloud resource deployment using their existing infrastructure-as-code workflows for cloud automation.

<Render file="terraform-setup-scenarios" product="magic-cloud-networking" />

For more details, refer to [Set up with Terraform](/magic-cloud-networking/cloud-on-ramps/#set-up-with-terraform).
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
---
title: Search for custom rules using rule name and/or ID
description: New UI improvements for Magic Firewall
date: 2024-10-02T11:00:00Z
---

The Magic Firewall dashboard now allows you to search custom rules using the rule name and/or ID.

1. Log into the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
2. Go to **Analytics & Logs** > **Network Analytics**.
3. Select **Magic Firewall**.
4. Add a filter for **Rule ID**.

![Search for firewall rules with rule IDs](~/assets/images/changelog/magic-firewall/search-with-rule-id.png)

Additionally, the rule ID URL link has been added to Network Analytics.

For more details abour rules, refer to [Add rules](/magic-firewall/how-to/add-rules/).
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
---
title: Try out Magic Network Monitoring
description: The free version of Magic Network Monitoring is available to all customers
date: 2024-09-24T11:00:00Z
---

The free version of Magic Network Monitoring (MNM) is now available to everyone with a Cloudflare account by default.

1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com), and select your account.
2. Go to **Analytics & Logs** > **Magic Monitoring**.

![Try out the free version of Magic Network Monitoring](~/assets/images/changelog/magic-network-monitoring/get-started.png)

For more details, refer to the [Get started guide](/magic-network-monitoring/get-started/).
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
---
title: Configure your Magic WAN Connector to connect via static IP assigment
description: Local console access for bootstrapping Magic WAN Connector
date: 2025-02-14T11:00:00Z
---

You can now locally configure your [Magic WAN Connector](/magic-wan/configuration/connector/) to work in a static IP configuration.

This local method does not require having access to a DHCP Internet connection. However, it does require being comfortable with using tools to access the serial port on Magic WAN Connector as well as using a serial terminal client to access the Connector's environment.

For more details, refer to [WAN with a static IP address](/magic-wan/configuration/connector/configure-hardware-connector/#bootstrap-via-serial-console).
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
---
title: Establish BGP peering over Direct CNI circuits
description: BGP support for Cloudflare Network Interconnect (CNI)
date: 2024-12-17T11:00:00Z
products:
- magic-transit
- magic-wan
---

import { Render } from "~/components";

<Render file="bgp-peering-overview" product="network-interconnect" />
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
---
title: Exchange user risk scores with Okta
description: Okta risk exchange
date: 2024-06-17T11:00:00Z
---

import { Render } from "~/components";

Beyond the controls in [Zero Trust](/cloudflare-one/), you can now [exchange user risk scores](/cloudflare-one/insights/risk-score/#send-risk-score-to-okta) with Okta to inform SSO-level policies.

<Render file="send-risk-scores-okta" product="cloudflare-one" />
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@
---
title: Explore product updates for Cloudflare One
description: New changelog format for Cloudflare One
products:
- access
- browser-isolation
- casb
- cloudflare-tunnel
- dex
- dlp
- email-security
- gateway
- magic-cloud-networking
- magic-firewall
- magic-network-monitoring
- magic-transit
- magic-wan
- network-interconnect
- risk-score
date: 2024-06-16T11:00:00Z
---

import { Details } from "~/components";

Welcome to your new home for product updates on [Cloudflare One](/cloudflare-one/).

Our [new changelog](/changelog/) lets you read about changes in much more depth, offering in-depth examples, images, code samples, and even gifs.

If you are looking for older product updates, refer to the following locations.

<Details header="Older product updates" open = {true}>

- [Access](/cloudflare-one/changelog/access/)
- [Browser Isolation](/cloudflare-one/changelog/browser-isolation/)
- [CASB](/cloudflare-one/changelog/casb/)
- [Cloudflare Tunnel](/cloudflare-one/changelog/tunnel/)
- [Data Loss Prevention](/cloudflare-one/changelog/dlp/)
- [Digital Experience Monitoring](/cloudflare-one/changelog/dex/)
- [Email Security](/cloudflare-one/changelog/email-security/)
- [Gateway](/cloudflare-one/changelog/gateway/)
- [Magic Cloud Networking](/magic-cloud-networking/changelog/)
- [Magic Firewall](/magic-firewall/changelog/)
- [Magic Network Monitoring](/magic-network-monitoring/changelog/)
- [Magic Transit](/magic-transit/changelog/)
- [Magic WAN](/magic-wan/changelog/)
- [Network Interconnect](/network-interconnect/changelog/)
- [Risk score](/cloudflare-one/changelog/risk-score/)
- [Zero Trust WARP Client](/cloudflare-one/changelog/warp/)

</Details>
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
---
title: WARP client for macOS (version 2025.2.460.1)
description: WARP client for macOS (version 2025.2.460.1)
date: 2025-03-13T11:00:00Z
---

A new beta release for the macOS WARP client is now available on the [Downloads page](/cloudflare-one/connections/connect-devices/warp/download-warp/beta-releases/). This release contains significant improvements to our captive portal / public Wi-Fi detection logic. If you have experienced captive portal issues in the past, re-test and give this version a try.

**Changes and improvements**

- Improved [captive portal detection](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals/) to make more public networks compatible and have faster detection.
- Improved error messages shown in the app.
- WARP tunnel protocol details can now be viewed using the `warp-cli tunnel stats`
command.
- Fixed issue with device revocation and re-registration when switching
configurations.

**Known issues**

- macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP
client may not behave as expected. Cloudflare recommends the use of macOS 15.3
or later.
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
---
title: WARP client for Windows (version 2025.2.460.1)
description: WARP client for Windows (version 2025.2.460.1)
date: 2025-02-03T11:00:00Z
---

A new beta release for the Windows WARP client is now available on the [Downloads page](/cloudflare-one/connections/connect-devices/warp/download-warp/beta-releases/). This release contains significant improvements to our captive portal / public Wi-Fi detection logic. If you have experienced captive portal issues in the past, re-test and give this version a try.

**Changes and improvements**

- Improved [captive portal detection](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/captive-portals/) to make more public networks compatible
and have faster detection.
- Improved error messages shown in the app.
- Added the ability to control if the WARP interface IPs are [registered with
DNS servers](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#warp-interface-ip-dns-registration) or not.
- Removed DNS logs view from the Windows client GUI. DNS logs can be viewed as
part of `warp-diag` or by viewing the log file on the user's local directory.
- Fixed issue that would result in a user receiving multiple re-authentication
requests when waking their device from sleep.
- WARP tunnel protocol details can now be viewed using the `warp-cli tunnel stats`
command.
- Improvements to [Windows multi-user](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-multiuser/) including support for fast user
switching. If you are interested in testing this feature, reach out to
your Cloudflare account team.
- Fixed issue with device revocation and re-registration when switching
configurations.
- Fixed issue where DEX tests would run during certain sleep states where the
networking stack was not fully up. This would result in failures that would be
ignored.

**Known issues**

- DNS resolution may be broken when the following conditions are all true:

- WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
- A custom DNS server address is configured on the primary network adapter.
- The custom DNS server address on the primary network adapter is changed while WARP is connected.

To work around this issue, reconnect the WARP client by toggling off and back on.
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,10 @@ import { Render } from "~/components";

<Render
file="casb/integration-description"
params={{ integrationName: "Amazon Web Services (AWS) S3", integrationAccountType: "AWS account" }}
params={{
integrationName: "Amazon Web Services (AWS) S3",
integrationAccountType: "AWS account",
}}
/>

## Integration prerequisites
Expand All @@ -32,13 +35,7 @@ You can connect an AWS compute account to your CASB integration to perform [Data

### Add a compute account

To connect a compute account to your AWS integration:

1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Integrations**.
2. Find and select your AWS integration.
3. Select **Open connection instructions**.
4. Follow the instructions provided to connect a new compute account.
5. Select **Refresh**.
<Render file="casb/aws-compute-account" />

You can only connect one computer account to an integration. To remove a compute account, select **Manage compute accounts**.

Expand Down
Loading