diff --git a/public/__redirects b/public/__redirects index 9e3a0f63455a351..a1494ce85f0a8fe 100644 --- a/public/__redirects +++ b/public/__redirects @@ -2299,6 +2299,7 @@ /cloudflare-one/policies/gateway/block-page/ /cloudflare-one/reusable-components/custom-pages/gateway-block-page/ 301 /cloudflare-one/team-and-resources/devices/warp/user-side-certificates/ /cloudflare-one/team-and-resources/devices/user-side-certificates/ 301 /cloudflare-one/traffic-policies/lists/ /cloudflare-one/reusable-components/lists/ 301 +/cloudflare-one/traffic-policies/ids/ /cloudflare-one/traffic-policies/enable-ids/ 301 # Email Security new revamp (statics) /cloudflare-one/email-security/auto-moves/ /cloudflare-one/email-security/settings/auto-moves/ 301 diff --git a/src/content/docs/cloudflare-one/traffic-policies/enable-ids.mdx b/src/content/docs/cloudflare-one/traffic-policies/enable-ids.mdx index 907b2846b4afee3..4928c85c1cdb9e7 100644 --- a/src/content/docs/cloudflare-one/traffic-policies/enable-ids.mdx +++ b/src/content/docs/cloudflare-one/traffic-policies/enable-ids.mdx @@ -10,8 +10,20 @@ head: import { TabItem, Tabs, DashButton } from "~/components"; +Cloudflare's Intrusion Detection System (IDS) is an Advanced Magic Firewall feature you can use to actively monitor for a wide range of known threat signatures in your traffic. An IDS expands the security coverage of a firewall to analyze traffic against a broader threat database, detecting a variety of sophisticated attacks such as ransomware, data exfiltration, and network scanning based on signatures or “fingerprints” in network traffic. + +With Cloudflare's global anycast network, you get: + +- Cloudflare's entire global network capacity is now the capacity of your IDS. +- Built-in redundancy and failover. Every server runs Cloudflare's IDS software, and traffic is automatically attracted to the closest network location to its source. +- Continuous deployment for improvements to Cloudflare's IDS capabilities. + +Refer to [Enable IDS](/cloudflare-one/traffic-policies/enable-ids/#enable-ids) for more information on enabling IDS and creating new rulesets. After IDS is enabled, your traffic will be scanned to find malicious traffic. The detections are logged to destinations that can be configured from the dashboard. Refer to [Use Logpush with IDS](/cloudflare-one/insights/logs/use-logpush-with-ids) for instructions on configuring a destination to receive the detections. Additionally, all traffic that is analyzed can be accessed via [network analytics](/analytics/network-analytics/). Refer to [GraphQL Analytics](/magic-firewall/tutorials/graphql-analytics/) to query the analytics data. + Cloudflare's IDS takes advantage of the threat intelligence powered by our global network and extends the capabilities of the Cloudflare Firewall to monitor and protect your network from malicious actors. +## Enable IDS + You can enable IDS through the dashboard or via the API. :::note diff --git a/src/content/docs/cloudflare-one/traffic-policies/ids.mdx b/src/content/docs/cloudflare-one/traffic-policies/ids.mdx deleted file mode 100644 index fe85c9f08217fd0..000000000000000 --- a/src/content/docs/cloudflare-one/traffic-policies/ids.mdx +++ /dev/null @@ -1,15 +0,0 @@ ---- -title: IDS -pcx_content_type: concept - ---- - -Cloudflare's Intrusion Detection System (IDS) is an Advanced Magic Firewall feature you can use to actively monitor for a wide range of known threat signatures in your traffic. An IDS expands the security coverage of a firewall to analyze traffic against a broader threat database, detecting a variety of sophisticated attacks such as ransomware, data exfiltration, and network scanning based on signatures or “fingerprints” in network traffic. - -With Cloudflare's global anycast network, you get: - -- Cloudflare's entire global network capacity is now the capacity of your IDS. -- Built in redundancy and failover. Every server runs Cloudflare's IDS software, and traffic is automatically attracted to the closest network location to its source. -- Continuous deployment for improvements to Cloudflare's IDS capabilities. - -Refer to [Enable IDS](/cloudflare-one/traffic-policies/enable-ids) for more information on enabling IDS and creating new rulesets. After IDS is enabled, your traffic will be scanned to find malicious traffic. The detections are logged to destinations that can be configured from the dashboard. Refer to [Use Logpush with IDS](/magic-firewall/how-to/use-logpush-with-ids/) for instructions on configuring a destination to receive the detections. Additionally, all traffic that is analyzed can be accessed via [network analytics](/analytics/network-analytics/). Refer to [GraphQL Analytics](/magic-firewall/tutorials/graphql-analytics/) to query the analytics data.