diff --git a/src/content/docs/page-shield/detection/monitor-connections-scripts.mdx b/src/content/docs/page-shield/detection/monitor-connections-scripts.mdx
index 87cb023c4afb49..e205f70c9eb78e 100644
--- a/src/content/docs/page-shield/detection/monitor-connections-scripts.mdx
+++ b/src/content/docs/page-shield/detection/monitor-connections-scripts.mdx
@@ -5,6 +5,8 @@ sidebar:
order: 2
---
+import { Render } from "~/components";
+
Once you [activate Page Shield](/page-shield/get-started/), the **Monitors** dashboard will show which resources (scripts and connections) are running on your domain, as well as the cookies recently detected in HTTP traffic.
If you notice unexpected scripts or connections on the dashboard, check them for signs of malicious activity. Enterprise customers with a paid add-on will have their [connections and scripts classified as potentially malicious](/page-shield/how-it-works/malicious-script-detection/) based on threat feeds. You should also check for any new or unexpected cookies.
@@ -54,15 +56,23 @@ You can filter the data in these dashboards using different criteria, and print
Only available to customers on Business and Enterprise plans.
:::
-To view the details of an item, select **Details** next to the item.
+To view the details of an item, select **Details** next to it.
+
+### Script and connection details
The details of each connection or script include:
- **Last seen**: How long ago the resource was last detected (in the last 30 days).
- **First seen at**: The date and time when the resource was first detected.
-- **Page URLs**: The most recent pages where the resource was detected (up to ten pages).
-- **First page URL**: The page where the resource was first detected.
-- **Host**: The host where the script is being loaded or the connection is being made.
+- **Seen on host**: The host where the script is being loaded or the connection is being made.
+- **Seen on pages**: The most recent pages where the resource was detected (up to ten pages).
+- **First seen on**: The page where the resource was first detected.
+
+The script details also include the last 10 script versions detected by Page Shield.
+
+
+
+### Cookie details
The details of each cookie include:
diff --git a/src/content/docs/page-shield/detection/review-malicious-scripts.mdx b/src/content/docs/page-shield/detection/review-malicious-scripts.mdx
index 51baeef1675c83..bcc107512ab23f 100644
--- a/src/content/docs/page-shield/detection/review-malicious-scripts.mdx
+++ b/src/content/docs/page-shield/detection/review-malicious-scripts.mdx
@@ -6,11 +6,11 @@ sidebar:
head: []
description: Learn how to review scripts and connections that Page Shield
considered malicious.
-
---
-:::note
+import { Render } from "~/components";
+:::note
Only available to Enterprise customers with a paid add-on.
:::
@@ -26,10 +26,13 @@ To review the scripts considered malicious:
3. Select **Details** for each script considered malicious. The script details will contain:
- * **Malicious Code**: Whether Cloudflare's internal systems consider the script malicious or not, and what is the score of the current script version (1-99).
- * **Malicious URL**: Whether the script URL is known to be malicious according to threat intelligence feeds.
- * **Malicious domain**: Whether the script's domain is known to be malicious according to threat intelligence feeds.
- * **Malicious category**: The categorization of the script considered malicious according to threat intelligence feeds.
+ - **Malicious code analysis**: Scores between 1-99 classifying how malicious the current script version is, where 1 means definitely malicious and 99 means definitely not malicious.
+ - **Code behavior analysis**: Scores classifying the behavior of the current script version in terms of code obfuscation and data exfiltration. The scores vary between 1-99, where 1 means definitely malicious and 99 means definitely not malicious.
+ - **Threat intelligence**: Whether the script URL and/or domain is known to be malicious according to threat intelligence feeds. If the script is considered malicious according to the feeds, Page Shield will list the associated threat [categories](/page-shield/how-it-works/malicious-script-detection/#malicious-script-and-connection-categories). If threat intelligence feeds do not have any information about the script URL or domain, the dashboard will show **Not present**.
+
+ The script details also include the last 10 script versions detected by Page Shield.
+
+
For more information, refer to [Malicious script and connection detection](/page-shield/how-it-works/malicious-script-detection/).
@@ -47,9 +50,9 @@ To review the connections considered malicious:
3. Select **Details** for each connection considered malicious. The connection details will contain:
- * **URL match**: Whether the connection's target URL is known to be malicious according to threat intelligence feeds. This field requires that you configure Page Shield to analyze the [full URI](/page-shield/reference/settings/#connection-target-details) of outgoing connections.
- * **Domain match**: Whether the connection's target domain is known to be malicious according to threat intelligence feeds.
- * **Category**: The categorization of the connection considered malicious according to threat intelligence feeds.
+ - **URL match**: Whether the connection's target URL is known to be malicious according to threat intelligence feeds. This field requires that you configure Page Shield to analyze the [full URI](/page-shield/reference/settings/#connection-target-details) of outgoing connections.
+ - **Domain match**: Whether the connection's target domain is known to be malicious according to threat intelligence feeds.
+ - **Category**: The categorization of the connection considered malicious according to threat intelligence feeds.
For more information, refer to [Malicious script and connection detection](/page-shield/how-it-works/malicious-script-detection/).
diff --git a/src/content/partials/page-shield/scripts-hash-note.mdx b/src/content/partials/page-shield/scripts-hash-note.mdx
new file mode 100644
index 00000000000000..ab5cd5772d8373
--- /dev/null
+++ b/src/content/partials/page-shield/scripts-hash-note.mdx
@@ -0,0 +1,7 @@
+---
+{}
+---
+
+:::note
+The **Hash** value shown in the script details for each script version is an internal identifier. This differs from the file content hash defined by [Subresource Integrity (SRI)](https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity) that is required to be used in [Page Shield policies](/page-shield/policies/).
+:::