Skip to content

Commit

Permalink
Add individual file type callouts
Browse files Browse the repository at this point in the history
  • Loading branch information
maxvp committed Oct 16, 2024
1 parent e704e53 commit a4da3fc
Show file tree
Hide file tree
Showing 3 changed files with 7 additions and 7 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,9 @@ sidebar:
head:
- tag: title
content: Common DLP policies

---

import { GlossaryTooltip, Render } from "~/components"
import { GlossaryTooltip, Render } from "~/components";

The following in-line DLP policies are commonly used to secure data in uploaded and downloaded files.

Expand All @@ -24,6 +23,8 @@ The **Allow** action functions as an implicit logger, providing visibility into

<Render file="gateway/policies/block-file-types" />

For more information on what file formats DLP will scan, refer to [Supported file types](/cloudflare-one/policies/data-loss-prevention/#supported-file-types).

## Block uploads/downloads for specific users

You can configure access on a per-user or group basis by adding [identity-based conditions](/cloudflare-one/policies/gateway/identity-selectors/) to your policies. The following example blocks only contractors from uploading/downloading Financial Information to file sharing apps.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,9 @@ sidebar:
head:
- tag: title
content: Common HTTP policies

---

import { Render } from "~/components"
import { Render } from "~/components";

The following policies are commonly used to secure HTTP traffic.

Expand Down Expand Up @@ -53,7 +52,7 @@ Gateway [evaluates Do Not Inspect policies first](/cloudflare-one/policies/gatew

:::note

You can select either individual applications or the entire Do Not Inspect set, which will update as new applications are added.
You can select either individual applications or the entire Do Not Inspect set, which will update as new applications are added.
:::

## Check device posture
Expand Down Expand Up @@ -97,6 +96,8 @@ When accessing origin servers with certificates not signed by a public certifica

<Render file="gateway/policies/block-file-types" />

For more information on supported file types, refer to [Download and Upload File Types](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types).

## Block Google services

To enable Gateway inspection for Google Drive traffic, you must [add the Cloudflare certificate to Google Drive](/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#google-drive-for-desktop).
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,6 @@

Block the upload or download of files based on their type.

For more information on supported file types, refer to [Download and Upload File Types](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types).

| Selector | Operator | Value | Logic | Action |
| ------------------ | -------- | --------------------------------------- | ----- | ------ |
| Upload File Type | in | _Microsoft Office Word Document (docx)_ | And | Block |
Expand Down

0 comments on commit a4da3fc

Please sign in to comment.