Skip to content

[Support Feedback] Add false positive remediation guide and domain categorization (WAF)#28993

Open
dmmulroy wants to merge 3 commits intocloudflare:productionfrom
dmmulroy:support-macros/waf
Open

[Support Feedback] Add false positive remediation guide and domain categorization (WAF)#28993
dmmulroy wants to merge 3 commits intocloudflare:productionfrom
dmmulroy:support-macros/waf

Conversation

@dmmulroy
Copy link
Copy Markdown
Contributor

Summary

Adds WAF troubleshooting guidance for the two most common WAF-related support topics, based on an audit of active support macros.

Changes

  • WAF false positives: Add a remediation decision tree covering both legacy WAF actions (Simulate, Challenge, Block, etc.) and new WAF managed rules, with steps to identify the triggering rule and create exceptions
  • Domain categorization: Document how to request recategorization of a miscategorized domain via Radar

Context

These changes are driven by recurring support cases. If you want to see the underlying support data (macro frequency, case volume by topic), reach out to @dmmulroy internally.

In some cases, a domain may be miscategorized. For example, a social media site might be categorized as "Shopping & Auctions". If you believe a domain is miscategorized, or a domain has not yet been categorized, you can request a change through any of the following methods:

- **Radar**: Select **Domain Categorization Feedback** on the [Radar domain feedback page](https://radar.cloudflare.com/domains/feedback).
- **Security Center**: In the Cloudflare dashboard, go to **Security Center** > **Investigate**, search for the domain, then select **Request to change categorization**. For detailed steps, refer to [Change categorization](/security-center/investigate/change-categorization/).
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dmmulroy
go to **Security Center** > **Investigate** is outdated.

Correct one: go to **Application Security** > **Investigate**

Before taking action, identify which rule blocked the request:

- **Disable the corresponding managed rule(s)**: Create an override to disable specific rules. This may avoid false positives, but you will also reduce the overall site security. Refer to the [dashboard instructions](/waf/managed-rules/deploy-zone-dashboard/#configure-a-managed-ruleset) on configuring a managed ruleset, or to the [API instructions](/ruleset-engine/managed-rulesets/override-managed-ruleset/) on creating an override.
1. Go to **Security** > **Events** in the Cloudflare dashboard.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dmmulroy
change to: Security > Analytics > Events


- **Disable the corresponding managed rule(s)**: Create an override to disable specific rules. This may avoid false positives, but you will also reduce the overall site security. Refer to the [dashboard instructions](/waf/managed-rules/deploy-zone-dashboard/#configure-a-managed-ruleset) on configuring a managed ruleset, or to the [API instructions](/ruleset-engine/managed-rulesets/override-managed-ruleset/) on creating an override.
1. Go to **Security** > **Events** in the Cloudflare dashboard.
2. Filter by the request details (IP address, URI path, timestamp) to find the blocked event.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dmmulroy

Filter by the request details (IP address, URI path, timestamp or Ray ID) to find the blocked event.

### Recommended remediation steps

Follow this decision tree based on the rule that triggered the false positive:

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dmmulroy
Also, worth mentioning https://developers.cloudflare.com/waf/managed-rules/payload-logging/configure/ to inspect payload and confirm if traffic is FP or not.

- Update 'Security Center > Investigate' to 'Application Security > Investigate' in radar glossary
- Fix nav path to 'Security > Analytics > Events' in WAF troubleshooting
- Add Ray ID to event filter criteria
- Add payload logging reference for confirming false positives
@dmmulroy dmmulroy force-pushed the support-macros/waf branch from e95e235 to 0ca1b3c Compare March 24, 2026 20:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants