diff --git a/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx b/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx
index 766384c98cdd362..e8a18bdf972994b 100644
--- a/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx
+++ b/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx
@@ -5,6 +5,8 @@ sidebar:
order: 9
---
+import { DashButton} from "~/components"
+
Email Security allows you to configure Logpush to send detection data to an endpoint of your choice.
## Enable detection logs
@@ -23,12 +25,14 @@ Before you can enable audit logs for Email Security, you will have to enable log
Once you have configured your destination, you can set up audit logs for user action:
-1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/).
-2. Select **Analytics & Logs** > **Logpush**.
-3. Select **Audit logs**.
+1. In the Cloudflare dashboard, go to the **Logpush** page.
+
+
+2. Select your storage destination.
+3. Select the three dots > **Edit**.
4. Under **Configure logpush job**:
- - **Job name**: Enter the job name.
- - **If logs match**: Select **Filtered logs**:
+ - **Job name**: Enter the job name, if it is not already prepopulated.
+ - **If logs match** > Select **Filtered logs**:
- **Field**: Choose `ResourceType`.
- **Operator**: Choose `starts with`.
- **Value**: Enter `email_security`.
diff --git a/src/content/docs/magic-firewall/how-to/create-rate-limiting-rules.mdx b/src/content/docs/magic-firewall/how-to/create-rate-limiting-rules.mdx
index 323feffa39a14d1..4f9a9c2fb6663ab 100644
--- a/src/content/docs/magic-firewall/how-to/create-rate-limiting-rules.mdx
+++ b/src/content/docs/magic-firewall/how-to/create-rate-limiting-rules.mdx
@@ -7,6 +7,8 @@ sidebar:
text: Beta
---
+import { DashButton } from "~/components";
+
Rate limiting rules (beta) allow you to manage incoming traffic to your network for specific locations.
This guide will teach you how to create a rule for when incoming packets match, and in cases where your rate exceeds a certain value (in packets or bits).
@@ -19,8 +21,10 @@ For Advanced Magic Firewall customers, rate limiting (beta) is available by requ
To add a rule:
-1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
-2. On the sidebar, select **Magic Firewall** > **Rate limiting**.
+1. In the Cloudflare dashboard, go to the **Magic Firewall** page.
+
+
+2. On the sidebar, select **Rate limiting**.
3. Fill out the information for your new rule:
- Select the **Field**: At the moment, you can only choose a [colo name](https://developers.cloudflare.com/ruleset-engine/rules-language/fields/magic-firewall/).
- Select the **Operator**: Choose among **equals** or **is in**.
@@ -31,8 +35,10 @@ To add a rule:
To edit a rule:
-1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
-2. On the sidebar, select **Magic Firewall** > **Rate limiting**.
+1. In the Cloudflare dashboard, go to the **Magic Firewall** page.
+
+
+2. On the sidebar, select **Rate limiting**.
3. Locate the rule you want to edit in the list and select **View**.
4. Edit the rule with your changes and select **Add new rule**.
@@ -40,8 +46,10 @@ To edit a rule:
To delete an existing rule:
-1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login) and select your account.
-2. On the sidebar, select **Magic Firewall** > **Rate limiting**.
+1. In the Cloudflare dashboard, go to the **Magic Firewall** page.
+
+
+2. On the sidebar, select **Rate limiting**.
3. Locate the rule you want to delete from the list.
4. From the end of the row, select **Delete**.
5. Select **Delete** again to confirm deletion.
\ No newline at end of file
diff --git a/src/content/docs/magic-firewall/how-to/enable-ids.mdx b/src/content/docs/magic-firewall/how-to/enable-ids.mdx
index ef06a112b2c555b..dac0bb975f8df4e 100644
--- a/src/content/docs/magic-firewall/how-to/enable-ids.mdx
+++ b/src/content/docs/magic-firewall/how-to/enable-ids.mdx
@@ -8,7 +8,7 @@ head:
content: Enable Intrusion Detection System (IDS)
---
-import { TabItem, Tabs } from "~/components";
+import { TabItem, Tabs, DashButton } from "~/components";
Cloudflare's IDS takes advantage of the threat intelligence powered by our global network and extends the capabilities of the Cloudflare Firewall to monitor and protect your network from malicious actors.
@@ -20,9 +20,10 @@ This feature is available for Advanced Magic Firewall users. For access, contact
-1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account.
-2. Select **Magic Firewall** > **IDS**.
-3. Enable IDS.
+1. In the Cloudflare dashboard, go to the **Magic Firewall** page.
+
+
+2. Select **IDS** and turn on **IDS**.
diff --git a/src/content/docs/magic-firewall/packet-captures/collect-pcaps.mdx b/src/content/docs/magic-firewall/packet-captures/collect-pcaps.mdx
index 8306e36a567c2f8..e05ef578c23aa7d 100644
--- a/src/content/docs/magic-firewall/packet-captures/collect-pcaps.mdx
+++ b/src/content/docs/magic-firewall/packet-captures/collect-pcaps.mdx
@@ -5,7 +5,7 @@ sidebar:
order: 3
---
-import { Details, GlossaryTooltip, TabItem, Tabs } from "~/components";
+import { Details, GlossaryTooltip, TabItem, Tabs, DashButton } from "~/components";
After a packet capture is requested and the capture is collected, the output is contained within one or more files in PCAP file format. Before starting a `full` type packet capture, you must first follow instructions for [configuring a bucket](/magic-firewall/packet-captures/pcaps-bucket-setup/).
@@ -38,12 +38,16 @@ For help determining which data center to select for a packet capture, visit [ht
-1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
-2. Select **Magic Transit** or **Magic WAN**.
-3. In **Captures**, select **Start a capture**.
-4. Select the **Captures** tab > **Start a capture**.
-5. Choose the type of capture you want to perform, and select **Next**.
-6. Fill out the required fields to begin the capture and then select **Start**.
+1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
+
+ To set up a packet capture in Magic Transit:
+
+ To set up a packet capture in Magic WAN:
+
+2. In **Captures**, select **Start a capture**.
+3. Select the **Captures** tab > **Start a capture**.
+4. Choose the type of capture you want to perform, and select **Next**.
+5. Fill out the required fields to begin the capture and then select **Start**.
The main **Packet captures** page displays a list of captures.
@@ -163,10 +167,13 @@ The response is a JSON body that contains the details of the job running to buil
-1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
-2. Select **Magic Transit** or **Magic WAN**.
-3. In **Packet captures**, select **Start a capture**.
-4. Select the **Captures** tab.
+1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
+
+ To set up a packet capture in Magic Transit:
+
+ To set up a packet capture in Magic WAN:
+2. In **Packet captures**, select **Start a capture**.
+3. Select the **Captures** tab.
@@ -218,11 +225,14 @@ After your request finishes processing, you can download your packet captures.
-1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
-2. Select **Magic Transit** or **Magic WAN**.
-3. In **Packet captures**, select **Start a capture**.
-4. Select the **Captures** tab.
-5. Locate your packet capture you want to download, and select **Download**.
+1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
+
+ To set up a packet capture in Magic Transit:
+
+ To set up a packet capture in Magic WAN:
+2. In **Packet captures**, select **Start a capture**.
+3. Select the **Captures** tab.
+4. Locate your packet capture you want to download, and select **Download**.
Packet captures are available to download when the **Status** displays **Success**.
@@ -251,10 +261,13 @@ curl https://api.cloudflare.com/client/v4/accounts/{account_id}/pcaps/{pcap_id}/
-1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
-2. Select **Magic Transit** or **Magic WAN**.
-3. In **Packet captures**, select **Start a capture**.
-4. Select the **Captures** tab.
+1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
+
+ To set up a packet capture in Magic Transit:
+
+ To set up a packet capture in Magic WAN:
+2. In **Packet captures**, select **Start a capture**.
+3. Select the **Captures** tab.
The list of packet captures associated with your account displays.
diff --git a/src/content/docs/magic-firewall/packet-captures/pcaps-bucket-setup.mdx b/src/content/docs/magic-firewall/packet-captures/pcaps-bucket-setup.mdx
index d55e6df827607d2..647eb6c0cbf9784 100644
--- a/src/content/docs/magic-firewall/packet-captures/pcaps-bucket-setup.mdx
+++ b/src/content/docs/magic-firewall/packet-captures/pcaps-bucket-setup.mdx
@@ -5,7 +5,7 @@ sidebar:
order: 2
---
-import { GlossaryTooltip, TabItem, Tabs } from "~/components";
+import { GlossaryTooltip, TabItem, Tabs, DashButton } from "~/components";
Before you can begin a full packet capture, you must first configure a bucket that Cloudflare can use to upload your files. Setting up a bucket is not required for sample packet captures.
@@ -17,13 +17,16 @@ Learn how to set up a bucket for use with full packet captures.
-1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
-2. Select **Magic Transit** or **Magic WAN**.
-3. From the **Packet captures** page, select the **Buckets** tab.
-4. Select **Add a bucket**.
-5. Under **Bucket configuration**, select a bucket service and select **Next**.
-6. Enter the information related to your bucket for your service provider.
-7. When you are done, select **Next**.
+1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
+
+ To set up a bucket in Magic Transit:
+
+ To set up a bucket in Magic WAN:
+2. Select the **Buckets** tab.
+3. Select **Add a bucket**.
+4. Under **Bucket configuration**, select a bucket service and select **Next**.
+5. Enter the information related to your bucket for your service provider.
+6. When you are done, select **Next**.
The **Prove ownership** step of the **Bucket configuration** displays.
@@ -126,10 +129,13 @@ View a list of all buckets configured on your account.
-1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
-2. Select **Magic Transit** or **Magic WAN**.
-3. In **Packet captures**, select **Start a capture**.
-4. Select the **Buckets** tab.
+1. In the Cloudflare dashboard, go to the **Packet captures** page in Magic Transit or Magic WAN.
+
+ To set up a packet capture in Magic Transit:
+
+ To set up a packet capture in Magic WAN:
+2. In **Packet captures**, select **Start a capture**.
+3. Select the **Buckets** tab.
The list of buckets associated with your account displays.
@@ -169,8 +175,11 @@ To start collecting packet captures with R2, you first need to configure it prop
### Create bucket and API token
-1. Log in to your [Cloudflare dashboard](https://dash.cloudflare.com/login), and select you account.
-2. Select **R2** > **Create bucket**.
+1. In the Cloudflare dashboard, go to the **R2** page.
+
+
+
+2. Select **Create bucket**.
3. Give your bucket a name > **Create bucket**.
4. Go to the R2 Overview page, and select **Manage R2 API Tokens**.
5. Select **Create API Token**.
@@ -212,4 +221,4 @@ The [response](/api/resources/magic_transit/subresources/pcaps/subresources/owne
### Validate bucket ownership
-Refer to the [Validate a bucket](#validate-a-bucket) API instructions for more details on the entire process to [validate your R2 bucket](/api/resources/magic_transit/subresources/pcaps/subresources/ownership/methods/validate/). When specifying the R2 destination for this validation, exclude the secret and access keys from the URL.
+Refer to the [Validate a bucket](#validate-a-bucket) API instructions for more details on the entire process to [validate your R2 bucket](/api/resources/magic_transit/subresources/pcaps/subresources/ownership/methods/validate/). When specifying the R2 destination for this validation, exclude the secret and access keys from the URL.
\ No newline at end of file