diff --git a/src/content/docs/api-shield/get-started.mdx b/src/content/docs/api-shield/get-started.mdx index 5332686f4aeec67..800dc52859a7f1b 100644 --- a/src/content/docs/api-shield/get-started.mdx +++ b/src/content/docs/api-shield/get-started.mdx @@ -9,6 +9,8 @@ sidebar: import { GlossaryTooltip, Render, Steps } from "~/components" + + This guide will help you set up API Shield to identify and address API security best practices. :::note diff --git a/src/content/docs/api-shield/index.mdx b/src/content/docs/api-shield/index.mdx index 2d12f7fe6fcc133..e80018debf4a850 100644 --- a/src/content/docs/api-shield/index.mdx +++ b/src/content/docs/api-shield/index.mdx @@ -11,6 +11,8 @@ head: import { Description, Feature, Plan, RelatedProduct, Render } from "~/components" + + Identify and address your API vulnerabilities. diff --git a/src/content/docs/api-shield/management-and-monitoring/endpoint-management/index.mdx b/src/content/docs/api-shield/management-and-monitoring/endpoint-management/index.mdx index 2e0dd5be8708dfd..c4c4b9714b71fc4 100644 --- a/src/content/docs/api-shield/management-and-monitoring/endpoint-management/index.mdx +++ b/src/content/docs/api-shield/management-and-monitoring/endpoint-management/index.mdx @@ -7,7 +7,9 @@ sidebar: --- -import { GlossaryTooltip, Plan, Steps, Tabs, TabItem } from "~/components" +import { GlossaryTooltip, Plan, Steps, Tabs, TabItem, Render } from "~/components" + + diff --git a/src/content/docs/api-shield/security/index.mdx b/src/content/docs/api-shield/security/index.mdx index cf0310cfc02a1e8..c45c485c2d9c38e 100644 --- a/src/content/docs/api-shield/security/index.mdx +++ b/src/content/docs/api-shield/security/index.mdx @@ -6,7 +6,9 @@ sidebar: --- -import { DirectoryListing } from "~/components" +import { DirectoryListing, Render } from "~/components" + + Cloudflare offers the following features to help secure your APIs: diff --git a/src/content/docs/api-shield/security/jwt-validation/index.mdx b/src/content/docs/api-shield/security/jwt-validation/index.mdx index 803675f52f877a3..5ca01b53011e296 100644 --- a/src/content/docs/api-shield/security/jwt-validation/index.mdx +++ b/src/content/docs/api-shield/security/jwt-validation/index.mdx @@ -8,6 +8,8 @@ sidebar: import { GlossaryTooltip, Steps, Tabs, TabItem, Render } from "~/components" + + JSON web tokens (JWT) are often used as part of an authentication component on many web applications today. Since JWTs are crucial to identifying users and their access, ensuring the token’s integrity is important. API Shield’s JWT validation stops JWT replay attacks and JWT tampering by cryptographically verifying incoming JWTs before they are passed to your API origin. JWT validation will also stop requests with expired tokens or tokens that are not yet valid. diff --git a/src/content/docs/api-shield/security/schema-validation/index.mdx b/src/content/docs/api-shield/security/schema-validation/index.mdx index b7f351dfac82454..9fa2f9a9307ff63 100644 --- a/src/content/docs/api-shield/security/schema-validation/index.mdx +++ b/src/content/docs/api-shield/security/schema-validation/index.mdx @@ -6,7 +6,9 @@ sidebar: --- -import { GlossaryDefinition, GlossaryTooltip, Plan, Steps, Tabs, TabItem } from "~/components" +import { GlossaryDefinition, GlossaryTooltip, Plan, Steps, Tabs, TabItem, Render } from "~/components" + + diff --git a/src/content/docs/bots/bot-analytics.mdx b/src/content/docs/bots/bot-analytics.mdx index f1b7c8f72ef7153..807b1c0bd66cb0b 100644 --- a/src/content/docs/bots/bot-analytics.mdx +++ b/src/content/docs/bots/bot-analytics.mdx @@ -10,6 +10,8 @@ head: import { GlossaryTooltip, Render } from "~/components"; + + ## Business and Enterprise Business and Enterprise customers without Bot Management can use **Bot Analytics** to dynamically examine bot traffic. These dashboards offer less functionality than Bot Management for Enterprise but still help you understand bot traffic on your domain. diff --git a/src/content/docs/bots/get-started/bot-fight-mode.mdx b/src/content/docs/bots/get-started/bot-fight-mode.mdx index 0d9203053c09264..048bd953f715b72 100644 --- a/src/content/docs/bots/get-started/bot-fight-mode.mdx +++ b/src/content/docs/bots/get-started/bot-fight-mode.mdx @@ -11,6 +11,8 @@ head: import { Tabs, TabItem, Steps, Render } from '~/components'; + + Bot Fight Mode is a simple, free product that helps detect and mitigate bot traffic on your domain. When enabled, the product: - Identifies traffic matching patterns of known bots diff --git a/src/content/docs/bots/get-started/bot-management.mdx b/src/content/docs/bots/get-started/bot-management.mdx index 2b12df4ba14b259..1104ca174350cfe 100644 --- a/src/content/docs/bots/get-started/bot-management.mdx +++ b/src/content/docs/bots/get-started/bot-management.mdx @@ -11,6 +11,8 @@ learning_center: import { Tabs, TabItem, Steps, Render } from '~/components'; + + Bot Management for Enterprise is a paid add-on that provides sophisticated bot protection for your domain. Customers can identify automated traffic, take appropriate action, and view detailed analytics within the dashboard. This Enterprise product provides the most flexibility to customers by: diff --git a/src/content/docs/bots/get-started/super-bot-fight-mode.mdx b/src/content/docs/bots/get-started/super-bot-fight-mode.mdx index 15dc1987f9f1834..1eafba3dc056afa 100644 --- a/src/content/docs/bots/get-started/super-bot-fight-mode.mdx +++ b/src/content/docs/bots/get-started/super-bot-fight-mode.mdx @@ -11,6 +11,8 @@ head: import { Render, Tabs, TabItem, Steps } from "~/components" + + Super Bot Fight Mode is included in your Pro, Business, or Enterprise subscription. When enabled, the product: - Identifies traffic matching patterns of known bots diff --git a/src/content/docs/bots/index.mdx b/src/content/docs/bots/index.mdx index 9bb1e6c5bfb946c..098bde94b29812e 100644 --- a/src/content/docs/bots/index.mdx +++ b/src/content/docs/bots/index.mdx @@ -10,6 +10,8 @@ head: import { CardGrid, Description, Feature, LinkTitleCard, Plan, RelatedProduct, Render } from "~/components" + + Identify and mitigate automated traffic to protect your domain from bad bots. diff --git a/src/content/docs/ddos-protection/advanced-ddos-systems/concepts.mdx b/src/content/docs/ddos-protection/advanced-ddos-systems/concepts.mdx index 61c2f18ac7da16c..b1bb1b78bc8cd23 100644 --- a/src/content/docs/ddos-protection/advanced-ddos-systems/concepts.mdx +++ b/src/content/docs/ddos-protection/advanced-ddos-systems/concepts.mdx @@ -10,6 +10,8 @@ head: import { GlossaryTooltip, Render } from "~/components"; + + ## Prefixes Advanced DDoS Protection protects the IP prefixes you select from sophisticated DDoS attacks. A prefix can be an IP address or an IP range in CIDR format. You must add prefixes to Advanced DDoS Protection so that Cloudflare can analyze incoming packets and offer protection against sophisticated TCP DDoS attacks. diff --git a/src/content/docs/ddos-protection/get-started.mdx b/src/content/docs/ddos-protection/get-started.mdx index 4b92a179f2e529c..ef26e92a08bf6cc 100644 --- a/src/content/docs/ddos-protection/get-started.mdx +++ b/src/content/docs/ddos-protection/get-started.mdx @@ -6,7 +6,9 @@ sidebar: --- -import { Steps } from "~/components" +import { Steps, Render } from "~/components" + + ## Free, Pro, and Business plans diff --git a/src/content/docs/ddos-protection/index.mdx b/src/content/docs/ddos-protection/index.mdx index 7ae6d315706dd90..36db282ec105f11 100644 --- a/src/content/docs/ddos-protection/index.mdx +++ b/src/content/docs/ddos-protection/index.mdx @@ -8,7 +8,9 @@ head: content: Overview --- -import { Description, Feature, FeatureTable, GlossaryTooltip, Plan, RelatedProduct } from "~/components" +import { Description, Feature, FeatureTable, GlossaryTooltip, Plan, RelatedProduct, Render } from "~/components" + + diff --git a/src/content/docs/page-shield/detection/index.mdx b/src/content/docs/page-shield/detection/index.mdx index 6ac8f48204c9a7d..c0bb648f9c92e9a 100644 --- a/src/content/docs/page-shield/detection/index.mdx +++ b/src/content/docs/page-shield/detection/index.mdx @@ -9,6 +9,8 @@ head: [] description: Learn more about Page Shield's detection features. --- -import { DirectoryListing } from "~/components"; +import { DirectoryListing, Render } from "~/components"; + + diff --git a/src/content/docs/page-shield/get-started.mdx b/src/content/docs/page-shield/get-started.mdx index ae59d0fffb1ed2f..5ce69245f077a56 100644 --- a/src/content/docs/page-shield/get-started.mdx +++ b/src/content/docs/page-shield/get-started.mdx @@ -11,6 +11,8 @@ description: Learn how to get started with client-side resource monitoring. import { Tabs, TabItem, Render, Steps } from "~/components"; + + ## Activate client-side resource monitoring To enable client-side resource monitoring: diff --git a/src/content/docs/page-shield/how-it-works/index.mdx b/src/content/docs/page-shield/how-it-works/index.mdx index ad061e69103e8eb..b1a855a56ebf2bd 100644 --- a/src/content/docs/page-shield/how-it-works/index.mdx +++ b/src/content/docs/page-shield/how-it-works/index.mdx @@ -10,7 +10,9 @@ description: Page Shield tracks resources (such as scripts) loaded by your malicious resources. --- -import { GlossaryTooltip } from "~/components"; +import { GlossaryTooltip, Render } from "~/components"; + + Page Shield helps manage client-side resources loaded by your website visitors, including scripts, their connections, and [cookies](https://www.cloudflare.com/learning/privacy/what-are-cookies/). It can trigger alert notifications when resources change or are considered malicious. diff --git a/src/content/docs/page-shield/index.mdx b/src/content/docs/page-shield/index.mdx index 387c7bb765d258b..f3ed3859691148b 100644 --- a/src/content/docs/page-shield/index.mdx +++ b/src/content/docs/page-shield/index.mdx @@ -11,7 +11,9 @@ description: Page Shield is a comprehensive client-side security and privacy browsing environment. --- -import { Description, Feature, FeatureTable, Plan } from "~/components"; +import { Description, Feature, FeatureTable, Plan, Render } from "~/components"; + + diff --git a/src/content/docs/page-shield/policies/index.mdx b/src/content/docs/page-shield/policies/index.mdx index 8d5560bc60be605..d70a49afdc19c88 100644 --- a/src/content/docs/page-shield/policies/index.mdx +++ b/src/content/docs/page-shield/policies/index.mdx @@ -7,7 +7,9 @@ description: Use Page Shield policies to define the resources (scripts) allowed on your applications. --- -import { GlossaryTooltip } from "~/components"; +import { GlossaryTooltip, Render } from "~/components"; + + :::note Only available to Enterprise customers with a paid add-on. diff --git a/src/content/docs/security/index.mdx b/src/content/docs/security/index.mdx index dc0ff9106e4222d..051cb8227bb9f4d 100644 --- a/src/content/docs/security/index.mdx +++ b/src/content/docs/security/index.mdx @@ -16,8 +16,11 @@ import { LinkTitleCard, RelatedProduct, Stream, + Render, } from "~/components"; + + The application security dashboard is your starting point to better understand the security posture of your web applications, and to configure rules to protect them. @@ -39,9 +42,9 @@ The opt-out option will be available for a limited time. ## Features diff --git a/src/content/docs/waf/account/custom-rulesets/index.mdx b/src/content/docs/waf/account/custom-rulesets/index.mdx index 8164aa8c603681f..ec74924c43d2a6f 100644 --- a/src/content/docs/waf/account/custom-rulesets/index.mdx +++ b/src/content/docs/waf/account/custom-rulesets/index.mdx @@ -4,6 +4,9 @@ title: Custom rulesets sidebar: order: 2 --- +import { Render } from "~/components"; + + :::note This feature requires an Enterprise plan with a paid add-on. diff --git a/src/content/docs/waf/account/index.mdx b/src/content/docs/waf/account/index.mdx index 7909f2191a16b5f..441d90d586630f3 100644 --- a/src/content/docs/waf/account/index.mdx +++ b/src/content/docs/waf/account/index.mdx @@ -6,6 +6,9 @@ sidebar: group: label: Account-level configuration --- +import { Render } from "~/components"; + + :::note This feature requires an Enterprise plan with a paid add-on. diff --git a/src/content/docs/waf/account/managed-rulesets/index.mdx b/src/content/docs/waf/account/managed-rulesets/index.mdx index 5ee056c4f97f095..d32f81d73eb8e86 100644 --- a/src/content/docs/waf/account/managed-rulesets/index.mdx +++ b/src/content/docs/waf/account/managed-rulesets/index.mdx @@ -7,6 +7,8 @@ sidebar: import { Render, Tabs, TabItem, Details, APIRequest } from "~/components"; + + :::note This feature requires an Enterprise plan with a paid add-on. ::: diff --git a/src/content/docs/waf/account/rate-limiting-rulesets/index.mdx b/src/content/docs/waf/account/rate-limiting-rulesets/index.mdx index 6d6e73d82bfd37b..d62e55aa21675d3 100644 --- a/src/content/docs/waf/account/rate-limiting-rulesets/index.mdx +++ b/src/content/docs/waf/account/rate-limiting-rulesets/index.mdx @@ -5,7 +5,9 @@ sidebar: order: 3 --- -import { GlossaryTooltip } from "~/components"; +import { GlossaryTooltip, Render } from "~/components"; + + A rate limiting rule defines a rate limit for requests matching an expression, and the action to perform when that rate limit is reached. At the account level, rate limiting rules are always grouped into rate limiting rulesets, which you then deploy. diff --git a/src/content/docs/waf/analytics/index.mdx b/src/content/docs/waf/analytics/index.mdx index b51cf4b18343b94..96cc745034813e5 100644 --- a/src/content/docs/waf/analytics/index.mdx +++ b/src/content/docs/waf/analytics/index.mdx @@ -7,7 +7,9 @@ sidebar: hideIndex: true --- -import { DirectoryListing } from "~/components"; +import { DirectoryListing, Render} from "~/components"; + + Refer to the following pages for more information on the available analytics dashboards for Cloudflare security products: diff --git a/src/content/docs/waf/concepts.mdx b/src/content/docs/waf/concepts.mdx index 212ee9e2eaf8f9d..2fb4fbb08020aa2 100644 --- a/src/content/docs/waf/concepts.mdx +++ b/src/content/docs/waf/concepts.mdx @@ -7,6 +7,8 @@ sidebar: import { GlossaryTooltip, Render } from "~/components"; + + :::note[What is a Web Application Firewall?] diff --git a/src/content/docs/waf/custom-rules/index.mdx b/src/content/docs/waf/custom-rules/index.mdx index 8f26932198ad963..d28ffd1b1ee6b0d 100644 --- a/src/content/docs/waf/custom-rules/index.mdx +++ b/src/content/docs/waf/custom-rules/index.mdx @@ -7,6 +7,8 @@ sidebar: import { Render, FeatureTable } from "~/components"; + + Custom rules are evaluated in order, and some actions like _Block_ will stop the evaluation of other rules. For more details on actions and their behavior, refer to the [actions reference](/ruleset-engine/rules-language/actions/). diff --git a/src/content/docs/waf/detections/index.mdx b/src/content/docs/waf/detections/index.mdx index f377451e34a75fd..4f72a09409313e7 100644 --- a/src/content/docs/waf/detections/index.mdx +++ b/src/content/docs/waf/detections/index.mdx @@ -14,8 +14,11 @@ import { Tabs, TabItem, Steps, + Render, } from "~/components"; + + Traffic detections check incoming requests for malicious or potentially malicious activity. Each enabled detection provides one or more scores — available in the [Security Analytics](/waf/analytics/security-analytics/) dashboard — that you can use in rule expressions. Cloudflare currently provides the following detections for finding security threats in incoming requests: diff --git a/src/content/docs/waf/detections/leaked-credentials/index.mdx b/src/content/docs/waf/detections/leaked-credentials/index.mdx index 0c7a09c76c2e50a..f3b6946ba4f10fb 100644 --- a/src/content/docs/waf/detections/leaked-credentials/index.mdx +++ b/src/content/docs/waf/detections/leaked-credentials/index.mdx @@ -7,7 +7,9 @@ sidebar: label: Leaked credentials --- -import { Type } from "~/components"; +import { Type, Render } from "~/components"; + + The leaked credentials [traffic detection](/waf/detections/) scans incoming requests for credentials (usernames and passwords) previously leaked from [data breaches](https://www.cloudflare.com/learning/security/what-is-a-data-breach/). diff --git a/src/content/docs/waf/detections/malicious-uploads/index.mdx b/src/content/docs/waf/detections/malicious-uploads/index.mdx index 7dd0cab62033539..c00b88458c572ca 100644 --- a/src/content/docs/waf/detections/malicious-uploads/index.mdx +++ b/src/content/docs/waf/detections/malicious-uploads/index.mdx @@ -7,7 +7,9 @@ sidebar: label: Malicious uploads --- -import { GlossaryTooltip, Type } from "~/components"; +import { GlossaryTooltip, Type, Render } from "~/components"; + + The malicious uploads detection, also called uploaded content scanning, is a WAF [traffic detection](/waf/concepts/#detection-versus-mitigation) that scans content being uploaded to your application. diff --git a/src/content/docs/waf/get-started.mdx b/src/content/docs/waf/get-started.mdx index e5737243d6934ae..5908f19489c1631 100644 --- a/src/content/docs/waf/get-started.mdx +++ b/src/content/docs/waf/get-started.mdx @@ -5,7 +5,9 @@ sidebar: order: 2 --- -import { Details, GlossaryTooltip, Tabs, TabItem, Steps } from "~/components"; +import { Details, GlossaryTooltip, Tabs, TabItem, Steps, Render } from "~/components"; + + The Cloudflare Web Application Firewall (Cloudflare WAF) checks incoming web and API requests and filters undesired traffic based on sets of rules called rulesets. diff --git a/src/content/docs/waf/index.mdx b/src/content/docs/waf/index.mdx index 4f6f529d4e6d432..b1e6244ca1f825e 100644 --- a/src/content/docs/waf/index.mdx +++ b/src/content/docs/waf/index.mdx @@ -19,6 +19,8 @@ import { Stream, } from "~/components"; + + Get automatic protection from vulnerabilities and the flexibility to create custom rules. diff --git a/src/content/docs/waf/managed-rules/check-for-exposed-credentials/index.mdx b/src/content/docs/waf/managed-rules/check-for-exposed-credentials/index.mdx index 51aff46f2999389..18b444f76499d88 100644 --- a/src/content/docs/waf/managed-rules/check-for-exposed-credentials/index.mdx +++ b/src/content/docs/waf/managed-rules/check-for-exposed-credentials/index.mdx @@ -7,6 +7,8 @@ sidebar: import { GlossaryTooltip, Render } from "~/components"; + + Many web applications have suffered credential stuffing attacks in the recent past. In these attacks there is a massive number of login attempts using username/password pairs from databases of exposed credentials. Cloudflare offers you automated checks for exposed credentials using Cloudflare Web Application Firewall (WAF). diff --git a/src/content/docs/waf/managed-rules/index.mdx b/src/content/docs/waf/managed-rules/index.mdx index ff819f11e634254..850b3db47d80a62 100644 --- a/src/content/docs/waf/managed-rules/index.mdx +++ b/src/content/docs/waf/managed-rules/index.mdx @@ -12,6 +12,8 @@ head: import { FeatureTable, Render, RuleID } from "~/components"; + + ## Available managed rulesets diff --git a/src/content/docs/waf/managed-rules/payload-logging/index.mdx b/src/content/docs/waf/managed-rules/payload-logging/index.mdx index ab9b99f0703b3c0..8510b5005461a88 100644 --- a/src/content/docs/waf/managed-rules/payload-logging/index.mdx +++ b/src/content/docs/waf/managed-rules/payload-logging/index.mdx @@ -5,7 +5,9 @@ sidebar: order: 11 --- -import { GlossaryTooltip } from "~/components"; +import { GlossaryTooltip, Render } from "~/components"; + + The WAF allows you to log the request information that triggered a specific rule of a managed ruleset. This information is known as the payload. Payload information includes the specific string that triggered the rule, along with the text that appears immediately before and after the match. diff --git a/src/content/docs/waf/managed-rules/waf-exceptions/index.mdx b/src/content/docs/waf/managed-rules/waf-exceptions/index.mdx index d6f0658e87333d3..fec5138a80d2cf0 100644 --- a/src/content/docs/waf/managed-rules/waf-exceptions/index.mdx +++ b/src/content/docs/waf/managed-rules/waf-exceptions/index.mdx @@ -6,18 +6,21 @@ sidebar: head: - tag: title content: Create WAF exceptions - --- +import { Render } from "~/components"; + + + Create an exception to skip the execution of WAF managed rulesets or some of their rules. The exception configuration includes an expression that defines the skip conditions, and the rules or rulesets to skip under those conditions. ## Types of exceptions An exception can have one of the following behaviors (from highest to lowest priority): -* Skip all remaining rules (belonging to WAF managed rulesets) -* Skip one or more WAF managed rulesets -* Skip one or more rules of WAF managed rulesets +- Skip all remaining rules (belonging to WAF managed rulesets) +- Skip one or more WAF managed rulesets +- Skip one or more rules of WAF managed rulesets For more information on exceptions, refer to [Create an exception](/ruleset-engine/managed-rulesets/create-exception/) in the Ruleset Engine documentation. diff --git a/src/content/docs/waf/rate-limiting-rules/best-practices.mdx b/src/content/docs/waf/rate-limiting-rules/best-practices.mdx index a63bee1a0715b93..f0735b9f5007a59 100644 --- a/src/content/docs/waf/rate-limiting-rules/best-practices.mdx +++ b/src/content/docs/waf/rate-limiting-rules/best-practices.mdx @@ -8,6 +8,8 @@ sidebar: import { Render } from "~/components"; + + The following sections cover typical rate limiting configurations for common use cases. You can combine the provided example rules and adjust them to your own scenario. The main use cases for rate limiting are the following: diff --git a/src/content/docs/waf/rate-limiting-rules/index.mdx b/src/content/docs/waf/rate-limiting-rules/index.mdx index ca130db592780b1..9fb9e39e9b4060b 100644 --- a/src/content/docs/waf/rate-limiting-rules/index.mdx +++ b/src/content/docs/waf/rate-limiting-rules/index.mdx @@ -8,6 +8,8 @@ tableOfContents: false import { Render } from "~/components"; + + Rate limiting rules allow you to define rate limits for requests matching an expression, and the action to perform when those rate limits are reached. In the [new security dashboard](/security/), rate limiting rules are one of the available types of [security rules](/security/rules/). Security rules perform security-related actions on incoming requests that match specified filters. diff --git a/src/content/docs/waf/tools/index.mdx b/src/content/docs/waf/tools/index.mdx index 4f1113e1f972ca6..91d4dac2f8bd98c 100644 --- a/src/content/docs/waf/tools/index.mdx +++ b/src/content/docs/waf/tools/index.mdx @@ -7,7 +7,9 @@ sidebar: hideIndex: true --- -import { DirectoryListing } from "~/components"; +import { DirectoryListing, Render } from "~/components"; + + The Cloudflare WAF offers the following additional tools: diff --git a/src/content/docs/waf/tools/ip-access-rules/index.mdx b/src/content/docs/waf/tools/ip-access-rules/index.mdx index f026df602d87a1c..9a6d1d5b284f6bf 100644 --- a/src/content/docs/waf/tools/ip-access-rules/index.mdx +++ b/src/content/docs/waf/tools/ip-access-rules/index.mdx @@ -5,7 +5,9 @@ sidebar: order: 2 --- -import { GlossaryTooltip } from "~/components"; +import { GlossaryTooltip, Render } from "~/components"; + + Use IP Access rules to allowlist, block, and challenge traffic based on the visitor's IP address, country, or Autonomous System Number (ASN). diff --git a/src/content/docs/waf/tools/lists/index.mdx b/src/content/docs/waf/tools/lists/index.mdx index 25ab0fd4a566f29..eee1bedfe321ff8 100644 --- a/src/content/docs/waf/tools/lists/index.mdx +++ b/src/content/docs/waf/tools/lists/index.mdx @@ -7,6 +7,8 @@ sidebar: import { FeatureTable, Render } from "~/components"; + + Use lists to refer to a group of items (such as IP addresses) collectively, by name, in rule expressions of Cloudflare products. You can create your own custom lists or use lists managed by Cloudflare, such as [Managed IP Lists](/waf/tools/lists/managed-lists/#managed-ip-lists). Lists have the following advantages: diff --git a/src/content/docs/waf/tools/scrape-shield/index.mdx b/src/content/docs/waf/tools/scrape-shield/index.mdx index b17b460e2b31ee2..5f893ffb2c065ac 100644 --- a/src/content/docs/waf/tools/scrape-shield/index.mdx +++ b/src/content/docs/waf/tools/scrape-shield/index.mdx @@ -5,7 +5,9 @@ sidebar: order: 3 --- -import { DirectoryListing } from "~/components"; +import { DirectoryListing, Render } from "~/components"; + + Scrape Shield is a collection of settings meant to protect your site's content. diff --git a/src/content/partials/waf/survey.mdx b/src/content/partials/waf/survey.mdx new file mode 100644 index 000000000000000..4bfdcd85776c27c --- /dev/null +++ b/src/content/partials/waf/survey.mdx @@ -0,0 +1,11 @@ +--- +{} +--- + +:::note[Help us improve your experience] + +The Cloudflare application security docs team is running a survey to learn how well the documentation is working for you, and where we can do better. + +[Take the survey](https://cloudflare.sjc1.qualtrics.com/jfe/form/SV_73WSqfaS0gsWvpc) and share your feedback directly with Cloudflare. + +::: \ No newline at end of file