Skip to content
Merged
Show file tree
Hide file tree
Changes from 4 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 10 additions & 0 deletions public/__redirects
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,16 @@
/changelog/rss.xml /changelog/rss/index.xml 301
/api-shield/changelog/index.xml /changelog/rss/api-shield.xml 301
/cache/changelog/index.xml /changelog/rss/cache.xml 301
/cloudflare-one/changelog/index.xml changelog/rss/cloudflare-one.xml 301
/cloudflare-one/changelog/access/index.xml /changelog/rss/access.xml 301
/cloudflare-one/changelog/browser-isolation/index.xml /changelog/rss/browser-isolation.xml 301
/cloudflare-one/changelog/casb/index.xml /changelog/rss/casb.xml 301
/cloudflare-one/changelog/dex/index.xml /changelog/rss/dex.xml 301
/cloudflare-one/changelog/dlp/index.xml /changelog/rss/dlp.xml 301
/cloudflare-one/changelog/email-security/index.xml /changelog/rss/email-security.xml 301
/cloudflare-one/changelog/gateway/index.xml /changelog/rss/gateway.xml 301
/cloudflare-one/changelog/risk-score/index.xml /changelog/rss/risk-score.xml 301
/cloudflare-one/changelog/tunnel/index.xml /changelog/rss/cloudflare-tunnel.xml 301
/dns/changelog/index.xml /changelog/rss/dns.xml 301
/fundamentals/changelog/index.xml /changelog/rss/fundamentals.xml 301
/logs/changelog/index.xml /changelog/rss/logs.xml 301
Expand Down
33 changes: 27 additions & 6 deletions src/components/ProductChangelog.astro
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,8 @@ import { slug } from "github-slugger";
import RSSButton from "~/components/RSSButton.astro";
import AnchorHeading from "~/components/AnchorHeading.astro";
import { format } from "date-fns";
import ProductPills from "~/components/changelog/ProductPills.astro";

const props = z
.object({
product: reference("products"),
Expand All @@ -24,8 +26,10 @@ const props = z
const input = await props.parseAsync(Astro.props);
let filter: GetChangelogsOptions["filter"];
let rss: string;
let areaFeed: boolean
if ("product" in input) {
rss = `/changelog/rss/${input.product.id}.xml`;
areaFeed = false;
filter = (e) => {
return (
!e.data.hidden &&
Expand All @@ -35,6 +39,7 @@ if ("product" in input) {
};
} else {
rss = `/changelog/rss/${slug(input.area)}.xml`;
areaFeed = true;
const products = await getCollection("products", (e) => {
return e.data.product.group === input.area &&
input.hideEntry !== e.id;
Expand All @@ -53,12 +58,28 @@ const changelogs = await getChangelogs({ filter });


const { Content } = await render(entry);
return (
<AnchorHeading depth={2} title={format(entry.data.date, "yyyy-MM-dd")} />
<br/>
<strong>{entry.data.title}</strong>
<br/>
<Content />
// If areaFeed is true, add ProductPills
if (areaFeed === true) {
return (
<AnchorHeading depth={2} title={format(entry.data.date, "yyyy-MM-dd")} />
<ProductPills products={entry.data.products} />
<br />
<strong>{entry.data.title}</strong>
<br />
<Content />
);
}


// Default output
return (
<>
<AnchorHeading depth={2} title={format(entry.data.date, "yyyy-MM-dd")} />
<br />
<strong>{entry.data.title}</strong>
<br />
<Content />
</>
);
})
}
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,6 @@
title: Find security misconfigurations in your AWS cloud environment
description: CASB and DLP with Cloud Data Extraction for AWS cloud environments
date: 2024-11-22T11:00:00Z
products:
- dlp
---

import { Render } from "~/components";
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: Detect source code leaks with Data Loss Prevention
description: Added source code confidence levels to Data Loss Prevention
date: 2025-01-03T11:00:00Z
date: 2025-01-20T11:00:00Z
---

import { Render } from "~/components";
Expand All @@ -13,4 +13,6 @@ You can now detect source code leaks with Data Loss Prevention (DLP) with predef
product="cloudflare-one"
/>

DLP also supports confidence level for [source code profiles](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/#source-code).

For more details, refer to [DLP profiles](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/).
129 changes: 122 additions & 7 deletions src/content/docs/cloudflare-one/changelog/access.mdx
Original file line number Diff line number Diff line change
@@ -1,19 +1,134 @@
---
pcx_content_type: changelog
title: Access
release_notes_file_name:
- access
head:
- tag: title
content: Access Changelog
description: Review recent changes to Cloudflare Access.

---

import { ProductReleaseNotes, Render } from "~/components"
import { ProductChangelog } from "~/components";

{/* <!-- All changelog entries live in src/content/changelogs/access/. */}

<ProductChangelog product="access" hideEntry="2024-06-16-cloudflare-one" />

## 2025-02-12

**Access policies support filtering**

You can now filter Access policies by their action, selectors, rule groups, and assigned applications.

## 2025-02-11

**Private self-hosted applications and reusable policies GA**

[Private self-hosted applications](/cloudflare-one/applications/non-http/self-hosted-private-app/) and [reusable Access policies](/cloudflare-one/policies/access/policy-management/) are now generally available (GA) for all customers.

## 2025-01-21

**Access Applications support private hostnames/IPs and reusable Access policies.**

Cloudflare Access self-hosted applications can now be defined by [private IPs](/cloudflare-one/applications/non-http/self-hosted-private-app/), [private hostnames](/cloudflare-one/applications/non-http/self-hosted-private-app/) (on port 443) and [public hostnames](/cloudflare-one/applications/configure-apps/self-hosted-public-app/). Additionally, we made Access policies into their own object which can be reused across multiple applications. These updates involved significant updates to the overall Access dashboard experience. The updates will be slowly rolled out to different customer cohorts. If you are an Enterprise customer and would like early access, reach out to your account team.

## 2025-01-15

**Logpush for SSH command logs**

Enterprise customers can now use Logpush to export SSH command logs for Access for Infrastructure targets.

## 2024-12-04

**SCIM GA for Okta and Microsoft Entra ID**

Cloudflare's SCIM integrations with [Okta](/cloudflare-one/identity/idp-integration/okta/#synchronize-users-and-groups) and [Microsoft Entra ID](/cloudflare-one/identity/idp-integration/entra-id/#synchronize-users-and-groups) (formerly AzureAD) are now out of beta and generally available (GA) for all customers. These integrations can be used for Access and Gateway policies and Zero Trust user management. Note: This GA release does not include [Dashboard SSO SCIM](/fundamentals/setup/account/account-security/scim-setup/) support.

## 2024-10-23

**SSH with Access for Infrastructure**

Admins can now use [Access for Infrastructure](/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/) to manage privileged access to SSH servers. Access for Infrastructure provides improved control and visibility over who accessed what service and what they did during their SSH session. Access for Infrastructure also eliminates the risk and overhead associated with managing SSH keys by using short-lived SSH certificates to access SSH servers.

## 2024-08-26

**Reduce automatic seat deprovisioning minimum to 1 month, down from 2 months.**

Admins can now configure Zero Trust seats to [automatically expire](/cloudflare-one/identity/users/seat-management/#enable-seat-expiration) after 1 month of user inactivity. The previous minimum was 2 months.

## 2024-06-06

**Scalability improvements to the App Launcher**

Applications now load more quickly for customers with a large number of applications or complex policies.

## 2024-04-28

**Add option to bypass CORS to origin server**

Access admins can [defer all CORS enforcement to their origin server](/cloudflare-one/identity/authorization-cookie/cors/#bypass-options-requests-to-origin) for specific Access applications.

## 2024-04-15

**Zero Trust User identity audit logs**

All user identity changes via SCIM or Authentication events are logged against a user's registry identity.

## 2024-02-22

**Access for SaaS OIDC Support**

Access for SaaS applications can be setup with OIDC as an authentication method. OIDC and SAML 2.0 are now both fully supported.

## 2024-02-22

**WARP as an identity source for Access**

Allow users to log in to Access applications with their WARP session identity. Users need to reauthenticate based on default session durations. WARP authentication identity must be turned on in your device enrollment permissions and can be enabled on a per application basis.

## 2023-12-20

**Unique Entity IDs in Access for SaaS**

All new Access for SaaS applications have unique Entity IDs. This allows for multiple integrations with the same SaaS provider if required. The unique Entity ID has the application audience tag appended. Existing apps are unchanged.

## 2023-12-15

**Default relay state support in Access for SaaS**

Allows Access admins to set a default relay state on Access for SaaS apps.

## 2023-09-15

**App launcher supports tags and filters**

Access admins can now tag applications and allow users to filter by those tags in the App Launcher.

## 2023-09-15

**App launcher customization**

Allow Access admins to configure the App Launcher page within Zero Trust.

## 2023-09-15

**View active Access user identities in the dashboard and API**

Access admins can now view the full contents of a user's identity and device information for all active application sessions.

## 2023-09-08

**Custom OIDC claims for named IdPs**

Access admins can now add custom claims to the existing named IdP providers. Previously this was locked to the generic OIDC provider.

## 2023-08-02

**Azure AD authentication contexts**

Support Azure AD authentication contexts directly in Access policies.

<Render file="changelog-note" />
## 2023-06-23

{/* <!-- All changelog entries live in src/content/changelogs/access.yaml. For more details, refer to https://developers.cloudflare.com/style-guide/documentation-content-strategy/content-types/changelog/#yaml-file --> */}
**Custom block pages for Access applications**

<ProductReleaseNotes />
Allow Access admins to customize the block pages presented by Access to end users.
18 changes: 11 additions & 7 deletions src/content/docs/cloudflare-one/changelog/browser-isolation.mdx
Original file line number Diff line number Diff line change
@@ -1,19 +1,23 @@
---
pcx_content_type: changelog
title: Browser Isolation
release_notes_file_name:
- browser-isolation
head:
- tag: title
content: Browser Isolation Changelog
description: Review recent changes to Cloudflare Browser Isolation.

---

import { ProductReleaseNotes, Render } from "~/components"
import { ProductChangelog } from "~/components";

{/* <!-- All changelog entries live in src/content/changelogs/browser-isolation/. */}

<ProductChangelog
product="browser-isolation"
hideEntry="2024-06-16-cloudflare-one"
/>

<Render file="changelog-note" />
## 2024-03-21

{/* <!-- All changelog entries live in src/content/changelogs/browser-isolation.yaml. For more details, refer to https://developers.cloudflare.com/style-guide/documentation-content-strategy/content-types/changelog/#yaml-file --> */}
**Removed third-party cookie dependencies**

<ProductReleaseNotes />
Removed dependency on third-party cookies in the isolated browser, fixing an issue that previously caused intermittent disruptions for users maintaining multi-site, cross-tab sessions in the isolated browser.
27 changes: 20 additions & 7 deletions src/content/docs/cloudflare-one/changelog/casb.mdx
Original file line number Diff line number Diff line change
@@ -1,19 +1,32 @@
---
pcx_content_type: changelog
title: CASB
release_notes_file_name:
- casb
head:
- tag: title
content: CASB Changelog
description: Review recent changes to Cloudflare CASB.

---

import { ProductReleaseNotes, Render } from "~/components"
import { ProductChangelog } from "~/components";

{/* <!-- All changelog entries live in src/content/changelogs/casb/. */}

<ProductChangelog product="casb" hideEntry="2024-06-16-cloudflare-one" />

## 2024-06-03

**Atlassian Bitbucket integration**

You can now scan your Bitbucket Cloud workspaces for a variety of contextualized security issues such as source code exposure, admin misconfigurations, and more.

## 2024-05-23

**Data-at-rest DLP for Box and Dropbox**

You can now scan your [Box](/cloudflare-one/applications/casb/casb-integrations/box/#data-loss-prevention-optional) and [Dropbox](/cloudflare-one/applications/casb/casb-integrations/dropbox/#data-loss-prevention-optional) files for DLP matches.

<Render file="changelog-note" />
## 2024-04-16

{/* <!-- All changelog entries live in src/content/changelogs/casb.yaml. For more details, refer to https://developers.cloudflare.com/style-guide/documentation-content-strategy/content-types/changelog/#yaml-file --> */}
**Export CASB findings to CSV**

<ProductReleaseNotes />
You can now export all top-level CASB findings or every instance of your findings to CSV.
37 changes: 30 additions & 7 deletions src/content/docs/cloudflare-one/changelog/dex.mdx
Original file line number Diff line number Diff line change
@@ -1,19 +1,42 @@
---
pcx_content_type: changelog
title: Digital Experience Monitoring
release_notes_file_name:
- dex
head:
- tag: title
content: Digital Experience Monitoring Changelog
description: Review recent changes to Digital Experience Monitoring.

---

import { ProductReleaseNotes, Render } from "~/components"
import { ProductChangelog } from "~/components";

{/* <!-- All changelog entries live in src/content/changelogs/dex/. */}

<ProductChangelog product="dex" hideEntry="2024-06-16-cloudflare-one" />

## 2025-01-24

**IP visibility**

[IP visibility](/cloudflare-one/insights/dex/ip-visibility/) enables admins to inspect the different IP addresses associated with an end-user device. IP types available for review on the Cloudflare dashboard include: the device's private IP, the public IP assigned to the device by the ISP, and the router's (that the device is connected to) private IP.

## 2024-12-19

**Remote captures**

Admins can now collect packet captures (PCAPs) and WARP diagnostic logs from end-user devices. For more information, refer to [Remote captures](/cloudflare-one/insights/dex/remote-captures/).

## 2024-05-20

**Last seen ISP**

Admins can view the last ISP seen for a device by going to **My Team** > **Devices**. Requires setting up a [traceroute test](/cloudflare-one/insights/dex/tests/traceroute/).

## 2024-05-13

<Render file="changelog-note" />
**DEX alerts**

{/* <!-- All changelog entries live in src/content/changelogs/dex.yaml. For more details, refer to https://developers.cloudflare.com/style-guide/documentation-content-strategy/content-types/changelog/#yaml-file --> */}
Admins can now set [DEX alerts](/cloudflare-one/insights/dex/notifications/) using [Cloudflare Notifications](/notifications/). Three new DEX alert types:

<ProductReleaseNotes />
- Device connectivity anomaly
- Test latency
- Test low availability
Loading
Loading