diff --git a/public/__redirects b/public/__redirects
index 0012aa1b84916a4..cfa37b44305cb10 100644
--- a/public/__redirects
+++ b/public/__redirects
@@ -998,6 +998,8 @@
/page-shield/use-dashboard/monitor-connections/ /page-shield/detection/monitor-connections-scripts/ 301
/page-shield/use-dashboard/monitor-scripts/ /page-shield/detection/monitor-connections-scripts/ 301
/support/firewall/tools/troubleshooting-page-shield/ /page-shield/troubleshooting/ 301
+/page-shield/reference/alerts/ /page-shield/alerts/alert-types/ 301
+/page-shield/detection/configure-alerts/ /page-shield/alerts/configure/ 301
# queues
/queues/configuration/ /queues/reference/configuration/ 301
diff --git a/src/content/docs/page-shield/reference/alerts.mdx b/src/content/docs/page-shield/alerts/alert-types.mdx
similarity index 73%
rename from src/content/docs/page-shield/reference/alerts.mdx
rename to src/content/docs/page-shield/alerts/alert-types.mdx
index 4813c9c2e2a9606..eb2db5e1d6ff935 100644
--- a/src/content/docs/page-shield/reference/alerts.mdx
+++ b/src/content/docs/page-shield/alerts/alert-types.mdx
@@ -1,30 +1,40 @@
---
-title: Page Shield alerts
+title: Alert types
pcx_content_type: reference
sidebar:
order: 3
- label: Alerts
+ label: Alert types
---
import { AvailableNotifications } from "~/components";
-You can configure alerts for resources detected in your domain. Refer to [Configure Page Shield alerts](/page-shield/detection/configure-alerts/) for instructions.
+You can configure alerts for resources detected in your domain. Refer to [Page Shield alerts](/page-shield/alerts/) for more information.
## New resource alerts
+:::note
+Requires a Business plan or higher.
+:::
+
+
+
## Code change alert
+:::note
+Requires an Enterprise plan with a paid add-on.
+:::
+
+
+
diff --git a/src/content/docs/page-shield/alerts/configure.mdx b/src/content/docs/page-shield/alerts/configure.mdx
new file mode 100644
index 000000000000000..bb3acfa2ff567ac
--- /dev/null
+++ b/src/content/docs/page-shield/alerts/configure.mdx
@@ -0,0 +1,12 @@
+---
+title: Configure a Page Shield alert
+pcx_content_type: how-to
+sidebar:
+ order: 2
+ label: Configure an alert
+description: Configure scoped or unscoped Page Shield alerts to get notified about relevant client-side changes on your zones.
+---
+
+import { Render } from "~/components";
+
+
diff --git a/src/content/docs/page-shield/alerts/index.mdx b/src/content/docs/page-shield/alerts/index.mdx
new file mode 100644
index 000000000000000..3462022816f93cb
--- /dev/null
+++ b/src/content/docs/page-shield/alerts/index.mdx
@@ -0,0 +1,64 @@
+---
+title: Page Shield alerts
+pcx_content_type: concept
+sidebar:
+ order: 5
+ group:
+ label: Alerting
+description: Page Shield alerts notify you when new scripts are detected
+ on your domain or when Page Shield detects resources that are likely
+ malicious.
+---
+
+import { Render } from "~/components";
+
+:::note
+New resource alerts require a Business plan or higher. Code change and malicious resource alerts require an Enterprise plan with a paid add-on. For details, refer to [Alert types](/page-shield/alerts/alert-types/).
+:::
+
+
+
+You can configure unscoped or scoped alerts:
+
+- **Unscoped alert**: An alert configured for all zones in your Cloudflare account. Unscoped alerts are trigged either daily, hourly, or immediately, depending on the [alert type](/page-shield/alerts/alert-types/).
+
+- **Scoped alert**: An alert scoped to one or more zones. You must configure [policies](/page-shield/policies/) for the zones you select to receive any notifications. Scoped alerts are triggered immediately. Policy violations will not trigger an alert. For more information, refer to [Scoped alerts](#scoped-alerts).
+
+ :::note
+ Cloudflare only takes into account [policies in allow mode](/page-shield/policies/#policy-actions) for scoped alerts.
+ :::
+
+For alerts sent at regular intervals, you might experience a delay between adding a new script and receiving an alert.
+
+For instructions on configuring alerts, refer to [Configure a Page Shield alert](/page-shield/alerts/configure/).
+
+## Scoped alerts
+
+:::note
+Applies to Enterprise customers with a paid add-on.
+:::
+
+If you have configured [allow policies](/page-shield/policies/#policy-actions) in a zone — policies which allow specific scripts and connections and block everything else — you can filter alert notifications according to those policies. These alerts are called scoped alerts.
+
+When you create a scoped alert using the **Policies of these zones** alert filter, you will only receive the most relevant notifications based on the values of the allow policies you configured.
+
+For each scoped alert, Page Shield does the following:
+
+1. Check which allow policies in a zone are enabled.
+2. For every enabled policy, compare the URL of the new or changed resource against the allowed sources in the policy.
+3. If the resource is allowed by the policy, check if the new or modified resource should trigger the current Page Shield alert.
+4. If the alert should trigger, send an alert notification to the configured destinations.
+
+When you create a scoped alert you will not receive notifications for resources blocked by an allow policy. These are [policy violations](/page-shield/policies/violations/) that you can review in the dashboard, through GraphQL, or via Logpush.
+
+:::note
+
+You will not receive notifications for a scoped alert in the following cases:
+
+- No configured policies in the zone
+- Policy configured in log mode
+- Policy is not enabled
+
+:::
+
+For unscoped alerts, you will receive alerts for resources detected in all your zones, and you may receive alerts about resources that are blocked by one of your configured allow policies.
diff --git a/src/content/docs/page-shield/detection/configure-alerts.mdx b/src/content/docs/page-shield/detection/configure-alerts.mdx
deleted file mode 100644
index 4d718ba24c3d981..000000000000000
--- a/src/content/docs/page-shield/detection/configure-alerts.mdx
+++ /dev/null
@@ -1,51 +0,0 @@
----
-title: Configure Page Shield alerts
-pcx_content_type: how-to
-sidebar:
- order: 5
- label: Configure alerts
-description: Configure Page Shield alerts to get notified when new scripts are
- detected on your domain or when Page Shield detects resources that are likely
- malicious.
----
-
-import { Render } from "~/components";
-
-:::note
-Only available to customers on a Business or Enterprise plan.
-:::
-
-
-
-
-
-## Alerts on policies
-
-:::note
-Applies to Enterprise customers with a paid add-on.
-:::
-
-If you have configured [allow policies](/page-shield/policies/#policy-actions) in a zone (policies which allow specific scripts and connections and block everything else), you can filter alert notifications according to those policies.
-
-When you set the **Policies of these zones** filter in a Page Shield alert, you will only receive the most relevant notifications based on the values of the allow policies you configured.
-
-For each alert configured with a filter, Page Shield will do the following:
-
-1. Check which allow policies in a zone are enabled.
-2. For every enabled policy, compare the URL of the new or changed resource against the allowed sources in the policy.
-3. If the resource is allowed by the policy, check if the new or modified resource should trigger the current Page Shield alert.
-4. If the alert should trigger, send an alert notification to the configured destinations.
-
-When you set the **Policies of these zones** filter in an alert you will not receive notifications for resources blocked by an allow policy. These are [policy violations](/page-shield/policies/violations/) that you can review in the dashboard, through GraphQL, or via Logpush.
-
-:::note
-
-You will not receive notifications for alerts configured with a **Policies of these zones** filter in the following cases:
-
-- No configured policies in the zone
-- Policy configured in log mode
-- Policy is not enabled
-
-:::
-
-For alerts without a **Policies of these zones** filter, you will receive alerts for resources detected in all your zones, and you may receive alerts about resources that are blocked by one of your configured allow policies.
diff --git a/src/content/docs/page-shield/detection/index.mdx b/src/content/docs/page-shield/detection/index.mdx
index 55060237e2c3c3a..6ac8f48204c9a7d 100644
--- a/src/content/docs/page-shield/detection/index.mdx
+++ b/src/content/docs/page-shield/detection/index.mdx
@@ -1,12 +1,12 @@
---
-title: Detection and alerting
+title: Detection
pcx_content_type: navigation
sidebar:
order: 4
group:
hideIndex: true
head: []
-description: Learn more about Page Shield's detection and alerting features.
+description: Learn more about Page Shield's detection features.
---
import { DirectoryListing } from "~/components";
diff --git a/src/content/docs/page-shield/detection/review-changed-scripts.mdx b/src/content/docs/page-shield/detection/review-changed-scripts.mdx
index cd6c353971c6f03..1e8f24bc2679219 100644
--- a/src/content/docs/page-shield/detection/review-changed-scripts.mdx
+++ b/src/content/docs/page-shield/detection/review-changed-scripts.mdx
@@ -5,17 +5,15 @@ sidebar:
order: 4
head: []
description: Learn how to review scripts on your domain after receiving a code change alert.
-
---
:::note
-
Available as a paid add-on for customers on an Enterprise plan.
:::
Page Shield analyzes the JavaScript dependencies in the pages of your domain over time.
-You can configure a notification for [code change alerts](/page-shield/reference/alerts/#code-change-alert) to receive a daily notification about changed scripts in your domain.
+You can configure a notification for [code change alerts](/page-shield/alerts/alert-types/#code-change-alert) to receive a daily notification about changed scripts in your domain.
When you receive such a notification:
diff --git a/src/content/docs/page-shield/detection/review-malicious-scripts.mdx b/src/content/docs/page-shield/detection/review-malicious-scripts.mdx
index bcc107512ab23f6..13eabcbb9af1169 100644
--- a/src/content/docs/page-shield/detection/review-malicious-scripts.mdx
+++ b/src/content/docs/page-shield/detection/review-malicious-scripts.mdx
@@ -38,7 +38,7 @@ To review the scripts considered malicious:
4. Based on the displayed information, and with the help of the [last seen/first seen fields in the script details](/page-shield/detection/monitor-connections-scripts/#view-details), review and update the pages where the malicious script was detected.
-You can configure alerts for detected malicious scripts. Refer to [Page Shield alerts](/page-shield/reference/alerts/) for more information on the available alert types.
+You can configure alerts for detected malicious scripts. Refer to [Page Shield alerts](/page-shield/alerts/) for more information.
## Review malicious connections
diff --git a/src/content/docs/page-shield/get-started.mdx b/src/content/docs/page-shield/get-started.mdx
index da1729487c56be6..d919d72a81ebc93 100644
--- a/src/content/docs/page-shield/get-started.mdx
+++ b/src/content/docs/page-shield/get-started.mdx
@@ -31,11 +31,13 @@ Depending on your plan, you may be able to also review the connections made by s
## Configure alerts
-:::note
-Only available to customers on a Business or Enterprise plan.
-:::
-
-
+
diff --git a/src/content/docs/page-shield/how-it-works/malicious-script-detection.mdx b/src/content/docs/page-shield/how-it-works/malicious-script-detection.mdx
index 1785fba034ce9d0..affdf981ff2695e 100644
--- a/src/content/docs/page-shield/how-it-works/malicious-script-detection.mdx
+++ b/src/content/docs/page-shield/how-it-works/malicious-script-detection.mdx
@@ -34,7 +34,7 @@ In addition to the integrity score, Page Shield will also provide individual sco
- **Crypto mining**
- **Malware**
-You can configure [Malicious Script Alerts](/page-shield/reference/alerts/). You will receive an alert notification as soon as Cloudflare detects JavaScript code classified as malicious in your domain.
+You can [configure Malicious Script Alerts](/page-shield/alerts/configure/). You will receive an alert notification as soon as Cloudflare detects JavaScript code classified as malicious in your domain.
## Malicious URL checks
@@ -42,7 +42,7 @@ Page Shield will search for the URLs of your JavaScript dependencies in threat i
The Page Shield dashboards display the scripts that were considered malicious at the top of the scripts list.
-You can [configure Malicious URL Alerts](/page-shield/reference/alerts/) to receive an alert notification as soon as Cloudflare detects a script from a malicious URL in your domain.
+You can [configure Malicious URL Alerts](/page-shield/alerts/configure/) to receive an alert notification as soon as Cloudflare detects a script from a malicious URL in your domain.
Depending on your current configuration, Page Shield can also search for malicious URLs in the URLs of outgoing connections made by scripts in your domain. To enable this check, you must [allow Page Shield to use the full URLs of outgoing connections](/page-shield/reference/settings/#connection-target-details) instead of only the hostname in Page Shield settings.
@@ -54,7 +54,7 @@ A domain previously reported as malicious can later be reported as non-malicious
Page Shield will also check the target domains of connections made by scripts in your domain's pages, following the same approach described for scripts.
-You can configure [Malicious Domain Alerts](/page-shield/reference/alerts/) to receive an alert notification as soon as Cloudflare detects a malicious script loaded from a known malicious domain in your domain.
+You can [configure Malicious Domain Alerts](/page-shield/alerts/configure/) to receive an alert notification as soon as Cloudflare detects a malicious script loaded from a known malicious domain in your domain.
---
diff --git a/src/content/docs/page-shield/index.mdx b/src/content/docs/page-shield/index.mdx
index 4913a83348b2bb5..47782b2ba4df2bc 100644
--- a/src/content/docs/page-shield/index.mdx
+++ b/src/content/docs/page-shield/index.mdx
@@ -64,11 +64,7 @@ Learn how to [get started](/page-shield/get-started/).
Detects any changes in the scripts loaded in your pages.
-
+
Receive notifications about newly detected scripts, scripts loaded from
unknown domains, new scripts considered malicious, or code changes in your
existing scripts.
diff --git a/src/content/docs/page-shield/policies/index.mdx b/src/content/docs/page-shield/policies/index.mdx
index aeed76d825e7631..f1e3d52ff45d022 100644
--- a/src/content/docs/page-shield/policies/index.mdx
+++ b/src/content/docs/page-shield/policies/index.mdx
@@ -38,3 +38,5 @@ Refer to the following pages for instructions on creating a policy in Page Shiel
- [Create a policy in the dashboard](/page-shield/policies/create-dashboard/)
- [Page Shield API: Create a policy](/page-shield/reference/page-shield-api/#create-a-policy)
+
+Once you have configured one or more allow policies in a zone you can filter alert notifications according to those policies. These alerts are called [scoped alerts](/page-shield/alerts/#scoped-alerts).
diff --git a/src/content/docs/security-center/security-insights/index.mdx b/src/content/docs/security-center/security-insights/index.mdx
index 81c9b97449eb654..6d8685b9635744a 100644
--- a/src/content/docs/security-center/security-insights/index.mdx
+++ b/src/content/docs/security-center/security-insights/index.mdx
@@ -27,7 +27,7 @@ Listed below are the specific insights currently available:
| [Domains without 'Always Use HTTPS'](/ssl/edge-certificates/additional-options/always-use-https/) | HTTP requests to this domain may not redirect to its HTTPS equivalent. |
| [Domains without HSTS](/ssl/edge-certificates/additional-options/http-strict-transport-security/) | HTTP Strict Transport Security (`HSTS`), is a header which allows a website to specify and enforce security policy in client web browsers. This policy enforcement protects secure websites from downgrade attacks SSL stripping and cookie hijacking. |
| [Exposed RDP Servers](/cloudflare-one/connections/connect-networks/use-cases/rdp/) | We detect an RDP server that is exposed to the public Internet. |
-| [Get notified of malicious client-side scripts](/page-shield/detection/configure-alerts/) | We detect that Page Shield alerts are not configured. You will not receive notifications when we detect potential malicious scripts executing in your client-side environment. |
+| [Get notified of malicious client-side scripts](/page-shield/alerts/) | We detect that Page Shield alerts are not configured. You will not receive notifications when we detect potential malicious scripts executing in your client-side environment. |
| [Increased body response size detected on API endpoints](/api-shield/management-and-monitoring/endpoint-labels/) | Investigate changes, abuse, or successful attacks that may have led to this increase in response body size. |
| [Increased errors detected on API endpoints](/api-shield/management-and-monitoring/endpoint-labels/) | Investigate changes, abuse, or successful attacks that may have led to this increase in errors. |
| [Increased latency detected on API endpoints](/api-shield/management-and-monitoring/endpoint-labels/) | Investigate changes, abuse, or successful attacks that may have led to this increase in response latency. |
diff --git a/src/content/docs/security/settings.mdx b/src/content/docs/security/settings.mdx
index 9966ba8d8c7c2c8..5184f825f29b742 100644
--- a/src/content/docs/security/settings.mdx
+++ b/src/content/docs/security/settings.mdx
@@ -73,7 +73,7 @@ The API abuse module includes features and settings from [API Shield](/api-shiel
In the **Client-side abuse** security module you can perform the following tasks:
- Turn [continuous script monitoring](/page-shield/how-it-works/) on or off (previously you turned [Page Shield](/page-shield/) on or off).
-- Create a [client-side resource alert](/page-shield/reference/alerts/) (also known as a Page Shield alert).
+- Create a [client-side resource alert](/page-shield/alerts/) (also known as a Page Shield alert).
- Set the [reporting endpoint](/page-shield/reference/settings/#reporting-endpoint) to use your hostname instead of a Cloudflare-owned endpoint (only for Enterprise customers with a paid add-on).
- Adjust the [data logged in client-side abuse reports](/page-shield/reference/settings/#connection-target-details) (only the hostname or the full URI).
@@ -85,31 +85,31 @@ The client-side abuse module includes features and settings from [Page Shield](/
This section allows you to configure multiple security-related settings. The following table links to additional information about each setting:
-| Setting | Location in previous dashboard navigation |
-| ----------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------- |
-| [Endpoint labels](/api-shield/management-and-monitoring/endpoint-labels/) | **Security** > **Settings** > **Labels** |
-| [Session identifiers](/api-shield/management-and-monitoring/session-identifiers/#rule-form) | **Security** > **API Shield** > **Settings** |
-| [Schemas default action](/api-shield/security/schema-validation/#change-the-global-default-action-of-schema-validation) | **Security** > **API Shield** > **Schema Validation** |
-| [Uploaded schemas](/api-shield/security/schema-validation/) | **Security** > **API Shield** > **Schema Validation** |
-| [Learned schemas](/api-shield/security/schema-validation/) | **Security** > **API Shield** > **Schema Validation** |
-| [Token configuration](/api-shield/security/jwt-validation/#add-a-token-validation-configuration) | **Security** > **API Shield** > **Settings** |
-| [Client-side resource alerts](/page-shield/detection/configure-alerts/#rule-form) | **Security** > **Page Shield** > **Settings**
Account Home > **Notifications** |
-| [Reporting endpoint](/page-shield/reference/settings/#reporting-endpoint) | **Security** > **Page Shield** > **Settings** |
-| [Data processing](/page-shield/reference/settings/#connection-target-details) | **Security** > **Page Shield** > **Settings** |
-| [IP lists](/waf/tools/lists/custom-lists/#ip-lists) | Account Home > **Manage Account** > **Configurations** |
-| [Custom username and password location](/waf/detections/leaked-credentials/#custom-detection-locations) | **Security** > **Settings** |
-| [Custom content location](/waf/detections/malicious-uploads/#custom-scan-expressions) | **Security** > **Settings** |
-| [Custom sensitive data deployment](/waf/managed-rules/reference/sensitive-data-detection/#configure-in-the-dashboard) | **Security** > **Sensitive Data** |
-| [Block definitely automated traffic](/bots/get-started/super-bot-fight-mode/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
-| [Block likely bots](/bots/get-started/super-bot-fight-mode/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
+| Setting | Location in previous dashboard navigation |
+| ----------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
+| [Endpoint labels](/api-shield/management-and-monitoring/endpoint-labels/) | **Security** > **Settings** > **Labels** |
+| [Session identifiers](/api-shield/management-and-monitoring/session-identifiers/#rule-form) | **Security** > **API Shield** > **Settings** |
+| [Schemas default action](/api-shield/security/schema-validation/#change-the-global-default-action-of-schema-validation) | **Security** > **API Shield** > **Schema Validation** |
+| [Uploaded schemas](/api-shield/security/schema-validation/) | **Security** > **API Shield** > **Schema Validation** |
+| [Learned schemas](/api-shield/security/schema-validation/) | **Security** > **API Shield** > **Schema Validation** |
+| [Token configuration](/api-shield/security/jwt-validation/#add-a-token-validation-configuration) | **Security** > **API Shield** > **Settings** |
+| [Client-side resource alerts](/page-shield/alerts/configure/) | **Security** > **Page Shield** > **Settings**
Account Home > **Notifications** |
+| [Reporting endpoint](/page-shield/reference/settings/#reporting-endpoint) | **Security** > **Page Shield** > **Settings** |
+| [Data processing](/page-shield/reference/settings/#connection-target-details) | **Security** > **Page Shield** > **Settings** |
+| [IP lists](/waf/tools/lists/custom-lists/#ip-lists) | Account Home > **Manage Account** > **Configurations** |
+| [Custom username and password location](/waf/detections/leaked-credentials/#custom-detection-locations) | **Security** > **Settings** |
+| [Custom content location](/waf/detections/malicious-uploads/#custom-scan-expressions) | **Security** > **Settings** |
+| [Custom sensitive data deployment](/waf/managed-rules/reference/sensitive-data-detection/#configure-in-the-dashboard) | **Security** > **Sensitive Data** |
+| [Block definitely automated traffic](/bots/get-started/super-bot-fight-mode/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
+| [Block likely bots](/bots/get-started/super-bot-fight-mode/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
| [Managed `robots.txt`](/bots/additional-configurations/managed-robots-txt/) | **Security** > **Bots** > **Configure Bot Fight Mode
Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
-| [Allow verified bots](/bots/get-started/super-bot-fight-mode/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
-| [Static resource protection](/bots/additional-configurations/static-resources/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
-| [Optimize for WordPress](/bots/troubleshooting/wordpress-loopback-issue/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
-| [JavaScript detections](/bots/additional-configurations/javascript-detections/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
-| [Auto-update machine learning model](/bots/reference/machine-learning-models/) | **Security** > **Bots** > **Configure Bot Management** |
-| [Enable Security.txt](/security-center/infrastructure/security-file/) | **Security** > **Settings** |
-| [Challenge Passage](/cloudflare-challenges/challenge-types/challenge-pages/#challenge-passage) | **Security** > **Settings** |
-| [Browser Integrity Check](/waf/tools/browser-integrity-check/) | **Security** > **Settings** |
-| [Replace insecure JavaScript libraries](/waf/tools/replace-insecure-js-libraries/) | **Security** > **Settings** |
-| [Security Level](/waf/tools/security-level/) | **Security** > **Settings** |
+| [Allow verified bots](/bots/get-started/super-bot-fight-mode/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
+| [Static resource protection](/bots/additional-configurations/static-resources/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
+| [Optimize for WordPress](/bots/troubleshooting/wordpress-loopback-issue/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
+| [JavaScript detections](/bots/additional-configurations/javascript-detections/) | **Security** > **Bots** > **Configure Super Bot Fight Mode
Security** > **Bots** > **Configure Bot Management** |
+| [Auto-update machine learning model](/bots/reference/machine-learning-models/) | **Security** > **Bots** > **Configure Bot Management** |
+| [Enable Security.txt](/security-center/infrastructure/security-file/) | **Security** > **Settings** |
+| [Challenge Passage](/cloudflare-challenges/challenge-types/challenge-pages/#challenge-passage) | **Security** > **Settings** |
+| [Browser Integrity Check](/waf/tools/browser-integrity-check/) | **Security** > **Settings** |
+| [Replace insecure JavaScript libraries](/waf/tools/replace-insecure-js-libraries/) | **Security** > **Settings** |
+| [Security Level](/waf/tools/security-level/) | **Security** > **Settings** |
diff --git a/src/content/partials/page-shield/alerts-configure.mdx b/src/content/partials/page-shield/alerts-configure.mdx
index c3d9d2dea30788c..45d3fad81791e69 100644
--- a/src/content/partials/page-shield/alerts-configure.mdx
+++ b/src/content/partials/page-shield/alerts-configure.mdx
@@ -2,14 +2,13 @@
{}
---
-To set up alerts:
+To configure an alert:
-1. Go to **Security** > **Page Shield**.
-2. In the **Settings** tab, select **Manage alerts**.
-3.
- Select an [alert type](/page-shield/reference/alerts/).
+1. Go to Account Home > **Notifications**.
+2. Choose **Add** and then select **Page Shield** in the **Product** dropdown.
+3. Select an [alert type](/page-shield/alerts/alert-types/).
4. Enter the notification name and description.
-5. (Optional) If you are an Enterprise customer with a paid add-on, you can [define the zones for which you want to filter alerts](/page-shield/detection/configure-alerts/#alerts-on-policies) based on the configured policies in **Policies of these zones**.
+5. (Optional) If you are an Enterprise customer with a paid add-on, you can [define the zones for which you want to filter alerts](/page-shield/alerts/#scoped-alerts) in **Policies of these zones**. This option requires that you define [allow policies](/page-shield/policies/#policy-actions) in the selected zones.
6. Select one or more notification destinations (notification email, webhooks, and connected notification services).
7. Select **Create**.
diff --git a/src/content/partials/page-shield/alerts-intro.mdx b/src/content/partials/page-shield/alerts-intro.mdx
index 6af38edbc4a903a..72d58e0e80a4643 100644
--- a/src/content/partials/page-shield/alerts-intro.mdx
+++ b/src/content/partials/page-shield/alerts-intro.mdx
@@ -1,8 +1,8 @@
---
-{}
-
+params:
+ - availabilityDetails?
---
-Once you have activated Page Shield, you can set up multiple alerts for your domain.
+import { Render } from "~/components";
-Cloudflare sends alerts at regular intervals, so you might experience a delay between adding a new script and receiving an alert.
+Once you have activated Page Shield, you can set up one or more alerts informing you of relevant client-side changes on your zones. {props.availabilityDetails}
diff --git a/src/content/plans/index.json b/src/content/plans/index.json
index 41f22ff6aa36cd8..77b783d19ea7741 100644
--- a/src/content/plans/index.json
+++ b/src/content/plans/index.json
@@ -1929,7 +1929,7 @@
"ent_plus": "Yes"
},
"f_new_script_new_domain_alerts": {
- "title": "New Resources Alerts\n\nand New Domain Alerts",
+ "title": "New Resources Alerts\nand New Domain Alerts",
"summary": "Business and above",
"free": "No",
"pro": "No",