diff --git a/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx b/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx index 218fa56b98871f1..b13bcf088a9db25 100644 --- a/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx +++ b/src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/index.mdx @@ -404,8 +404,6 @@ Microsoft's [System Center Configuration Manager](https://learn.microsoft.com/en - `Enabled`: WARP network interface description is `(SCCM) Cloudflare WARP Interface Tunnel` for devices which have the [SCCM client](https://learn.microsoft.com/en-us/intune/configmgr/core/clients/deploy/deploy-clients-to-windows-computers) installed. Devices without the SCCM client will still use the default `Cloudflare WARP Interface Tunnel` description. WARP checks if the SCCM client is installed by looking for the SMS Agent Host (`ccmexec.exe`) Windows service. -After setting the network interface description, WARP will restart the SMS Agent Host (`ccmexec.exe`) so that changes can propagate to the SCCM server in a timely manner. - #### Example SCCM configuration Assume you want to push software updates from a cloud based [distribution point](https://learn.microsoft.com/en-us/intune/configmgr/core/servers/deploy/configure/boundary-groups-distribution-points) if the device is remote, but use on-prem servers if the device is on the office network. To set up these boundary groups: diff --git a/src/content/warp-releases/linux/beta/2025.6.824.1.yaml b/src/content/warp-releases/linux/beta/2025.6.824.1.yaml new file mode 100644 index 000000000000000..4595054fa97dc68 --- /dev/null +++ b/src/content/warp-releases/linux/beta/2025.6.824.1.yaml @@ -0,0 +1,34 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected. + - Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect. + - Improvement to managed network detection checks for faster switching between managed networks. + + **Known issues** + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). +version: 2025.6.824.1 +releaseDate: 2025-07-23T21:24:34.194Z +packageURL: https://downloads.cloudflareclient.com/v1/download/centos8-arm/version/2025.6.824.1 +packageSize: 52636230 +platformName: Linux +linuxPlatforms: + centos8-arm: 52636230 + noble-intel: 50974518 + bookworm-arm: 49841630 + focal-intel: 51493190 + centos8-intel: 53572222 + fedora35-arm: 52430708 + buster-arm: 50195866 + focal-arm: 50187524 + bullseye-intel: 51398148 + fedora34-intel: 54019369 + bookworm-intel: 51167848 + fedora34-arm: 52864538 + bullseye-arm: 50095998 + fedora35-intel: 53672865 + noble-arm: 50275664 + jammy-intel: 51175070 + jammy-arm: 49860826 + buster-intel: 51591844 diff --git a/src/content/warp-releases/linux/ga/2025.5.943.0.yaml b/src/content/warp-releases/linux/ga/2025.5.943.0.yaml new file mode 100644 index 000000000000000..3a1ec3f7914b6ac --- /dev/null +++ b/src/content/warp-releases/linux/ga/2025.5.943.0.yaml @@ -0,0 +1,33 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - WARP proxy mode now uses the operating system's DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. + - Fixed an issue affecting clients in Split Tunnel Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. + + **Known issues** + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). +version: 2025.5.943.0 +releaseDate: 2025-07-23T19:17:49.673Z +packageURL: https://downloads.cloudflareclient.com/v1/download/jammy-arm/version/2025.5.943.0 +packageSize: 44271222 +platformName: Linux +linuxPlatforms: + jammy-arm: 44271222 + buster-intel: 45887702 + fedora34-arm: 47307473 + focal-intel: 45800128 + bullseye-arm: 44499920 + bullseye-intel: 45713170 + fedora35-arm: 46915674 + fedora35-intel: 48084438 + noble-arm: 44634472 + fedora34-intel: 48392374 + bookworm-arm: 44255560 + noble-intel: 45349534 + focal-arm: 44569124 + buster-arm: 44577190 + centos8-arm: 47092201 + jammy-intel: 45512998 + bookworm-intel: 45509306 + centos8-intel: 48001094 diff --git a/src/content/warp-releases/macos/beta/2025.6.824.1.yaml b/src/content/warp-releases/macos/beta/2025.6.824.1.yaml new file mode 100644 index 000000000000000..a083d59fd1d7f45 --- /dev/null +++ b/src/content/warp-releases/macos/beta/2025.6.824.1.yaml @@ -0,0 +1,16 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected. + - Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect. + - Improvement to managed network detection checks for faster switching between managed networks. + + **Known issues** + - macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later. + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). +version: 2025.6.824.1 +releaseDate: 2025-07-24T12:28:40.940Z +packageURL: https://downloads.cloudflareclient.com/v1/download/macos/version/2025.6.824.1 +packageSize: 107463104 +platformName: macOS diff --git a/src/content/warp-releases/macos/ga/2025.5.943.0.yaml b/src/content/warp-releases/macos/ga/2025.5.943.0.yaml new file mode 100644 index 000000000000000..a5fa17351cfb718 --- /dev/null +++ b/src/content/warp-releases/macos/ga/2025.5.943.0.yaml @@ -0,0 +1,16 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - WARP proxy mode now uses the operating system's DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. + - Fixed an issue affecting clients in Split Tunnel Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. + - For macOS deployments, the WARP client can now be managed using an `mdm.xml` file placed in `/Library/Application Support/Cloudflare/mdm.xml`. This new configuration option offers an alternative to the still supported method of deploying a managed plist through an MDM solution. + + **Known issues** + - macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later. + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). +version: 2025.5.943.0 +releaseDate: 2025-07-23T20:41:33.758Z +packageURL: https://downloads.cloudflareclient.com/v1/download/macos/version/2025.5.943.0 +packageSize: 96660802 +platformName: macOS diff --git a/src/content/warp-releases/windows/beta/2025.6.824.1.yaml b/src/content/warp-releases/windows/beta/2025.6.824.1.yaml new file mode 100644 index 000000000000000..de8a1fa1010b86a --- /dev/null +++ b/src/content/warp-releases/windows/beta/2025.6.824.1.yaml @@ -0,0 +1,27 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - Improvements to better manage multi-user pre-login registrations. + - Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected. + - Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect. + - Improvement to managed network detection checks for faster switching between managed networks. + + **Known issues** + - For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum [Windows 11 24H2 version KB5062553](https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd) or higher for resolution. + + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). + + - Devices with `KB5055523` installed may receive a warning about `Win32/ClickFix.ABA` being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to [version 1.429.19.0](https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0) or later. + + - DNS resolution may be broken when the following conditions are all true: + - WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode. + - A custom DNS server address is configured on the primary network adapter. + - The custom DNS server address on the primary network adapter is changed while WARP is connected. + + To work around this issue, reconnect the WARP client by toggling off and back on. +version: 2025.6.824.1 +releaseDate: 2025-07-24T12:28:40.970Z +packageURL: https://downloads.cloudflareclient.com/v1/download/windows/version/2025.6.824.1 +packageSize: 133984256 +platformName: Windows diff --git a/src/content/warp-releases/windows/ga/2025.5.943.0.yaml b/src/content/warp-releases/windows/ga/2025.5.943.0.yaml new file mode 100644 index 000000000000000..90f60bf167153c4 --- /dev/null +++ b/src/content/warp-releases/windows/ga/2025.5.943.0.yaml @@ -0,0 +1,26 @@ +releaseNotes: |- + This release contains minor fixes and improvements. + + **Changes and improvements** + - WARP proxy mode now uses the operating system's DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect. + - Changes to the [SCCM VPN boundary support](/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#sccm-vpn-boundary-support) feature to no longer restart the SMS Agent Host (`ccmexec.exe`) service. + - Fixed an issue affecting clients in Split Tunnel Include mode, where access to split-tunneled traffic was blocked after reconnecting the client. + + **Known issues** + - For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum [Windows 11 24H2 version KB5062553](https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd) or higher for resolution. + + - Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to [Route traffic to fallback server](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/local-domains/#route-traffic-to-fallback-server). + + - Devices with `KB5055523` installed may receive a warning about `Win32/ClickFix.ABA` being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to [version 1.429.19.0](https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0) or later. + + - DNS resolution may be broken when the following conditions are all true: + - WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode. + - A custom DNS server address is configured on the primary network adapter. + - The custom DNS server address on the primary network adapter is changed while WARP is connected. + + To work around this issue, reconnect the WARP client by toggling off and back on. +version: 2025.5.943.0 +releaseDate: 2025-07-23T20:41:54.836Z +packageURL: https://downloads.cloudflareclient.com/v1/download/windows/version/2025.5.943.0 +packageSize: 129724416 +platformName: Windows