Skip to content

Commit bae3113

Browse files
[CF1] new IA inline paths for Analytics dashboard docs (cloudflare#26151)
* [CF1] new IA inline paths for Analytics dashboard docs * proper caps for ACR
1 parent a3418eb commit bae3113

File tree

4 files changed

+28
-12
lines changed

4 files changed

+28
-12
lines changed

src/content/docs/cloudflare-one/insights/analytics/application-access.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: reference
3-
title: Application access report
3+
title: Application Access Report
44
---
55

66
import { Render } from "~/components";

src/content/docs/cloudflare-one/insights/analytics/data-analytics.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,18 +36,18 @@ The SaaS and Cloud findings by count chart shows a time series view of Posture a
3636

3737
Each bar represents the total number of findings detected within a given time interval. You can use this view to observe patterns or spikes in findings over time. Hover over any bar to view the exact count of Posture and Content findings for that period.
3838

39-
To review findings in detail, log into [Zero Trust](https://one.dash.cloudflare.com) and go to **CASB** > **Posture Findings** or **Content Findings**.
39+
To review findings in detail, log into [Cloudflare One](https://one.dash.cloudflare.com) and go to **Cloud & SaaS findings** > **Posture Findings** or **Content Findings**.
4040

4141
### Posture findings by Severity
4242

4343
The Posture findings by severity chart displays the distribution of CASB findings based on their [severity levels](/cloudflare-one/cloud-and-saas-findings/manage-findings/#severity-levels). Each segment of the circle represents the number of posture issues classified as `Critical`, `High`, `Medium`, or `Low`.
4444

45-
To review findings in detail, log into [Zero Trust](https://one.dash.cloudflare.com) and go to **CASB** > **Posture Findings**.
45+
To review findings in detail, log into [Cloudflare One](https://one.dash.cloudflare.com) and go to **Cloud & SaaS findings** > **Posture Findings**.
4646

4747
### DLP matches in HTTP requests over time
4848

4949
The DLP matches in HTTP requests over time chart displays when [DLP policies](/cloudflare-one/data-loss-prevention/dlp-policies/) were triggered by users over a specified period of time.
5050

5151
Unlike the SaaS and Cloud findings by count chart above, which relies on CASB findings from data at rest, the DLP matches in HTTP requests over time chart reflects DLP detections in HTTP traffic — helping you monitor sensitive data movement in real time.
5252

53-
To review DLP detections in detail, log into [Zero Trust](https://one.dash.cloudflare.com) and go to **Logs** > **Gateway** > **HTTP**. Use the **DLP profiles** or **DLP match data** filters to view HTTP requests that triggered a DLP policy.
53+
To review DLP detections in detail, log into [Cloudflare One](https://one.dash.cloudflare.com) and go to **Insights** > **Logs** > **HTTP request logs**. Use the **DLP profiles** or **DLP match data** filters to view HTTP requests that triggered a DLP policy.

src/content/docs/cloudflare-one/insights/analytics/gateway.mdx

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,12 @@ The HTTP request analytics dashboard is powered by your [Gateway HTTP policies](
2323

2424
The HTTP request analytics dashboard helps you identify trends in how your HTTP policies are applied over time. By visualizing allowed, isolated, and do not inspect requests, the dashboard provides insights into traffic behavior and policy trends, making it easier to spot anomalies or shifts in usage patterns.
2525

26-
To review a detailed description of an HTTP request and its associated policy, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **Gateway** > **HTTP**.
26+
To review a detailed description of an HTTP request and its associated policy:
27+
28+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Insights**.
29+
2. Select **Logs**.
30+
3. Select **HTTP request logs**.
31+
4. Use the **Policy** filter to view HTTP requests that triggered a policy or other filters to narrow down your results.
2732

2833
### Provided analytics
2934

@@ -42,7 +47,12 @@ The DNS query analytics dashboard is powered by your [Gateway DNS policies](/clo
4247

4348
The DNS query analytics dashboard helps you identify trends in how your DNS policies are applied over time. By visualizing allowed, blocked, and overridden queries, the dashboard provides insights into traffic behavior and policy trends, making it easier to spot anomalies or shifts in usage patterns.
4449

45-
To review a detailed description of a DNS query and its associated policy, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **Gateway** > **DNS**.
50+
To review a detailed description of a DNS query and its associated policy:
51+
52+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Insights**.
53+
2. Select **Logs**.
54+
3. Select **DNS query logs**.
55+
4. Use the **Policy** filter to view DNS queries that triggered a policy or other filters to narrow down your results.
4656

4757
### Provided analytics
4858

@@ -60,7 +70,12 @@ The Network session analytics dashboard is powered by your [Gateway network poli
6070

6171
The Network session analytics dashboard helps you identify trends in how your network policies are applied over time. By visualizing allowed, blocked, and overridden sessions, the dashboard provides insights into traffic behavior and policy trends, making it easier to spot anomalies or shifts in usage patterns.
6272

63-
To review a detailed description of a network session and its associated policy, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **Gateway** > **Network**.
73+
To review a detailed description of a network session and its associated policy:
74+
75+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Insights**.
76+
2. Select **Logs**.
77+
3. Select **Network logs**.
78+
4. Use the **Policy** filter to view network sessions that triggered a policy or other filters to narrow down your results.
6479

6580
### Provided analytics
6681

src/content/docs/cloudflare-one/insights/analytics/shadow-it-discovery.mdx

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
import { Render } from "~/components";
99

10-
Shadow IT SaaS analytics provides visibility into the SaaS applications your users are visiting. This information allows you to create identity and device-driven Zero Trust policies to secure your users and data.
10+
Shadow IT SaaS analytics provides visibility into the SaaS applications your users are visiting. This information allows you to create identity and device-driven Cloudflare One policies to secure your users and data.
1111

1212
To access Shadow IT SaaS analytics:
1313

@@ -34,7 +34,7 @@ Review the Shadow IT SaaS analytics dashboard for application usage. Filter the
3434
| Field | Description |
3535
| ---------------- | ---------------------------------------------------------------------------------------------------------------------------- |
3636
| Application | SaaS application's name and logo. |
37-
| Application type | [Application type](/cloudflare-one/traffic-policies/application-app-types/#app-types) assigned by Cloudflare Zero Trust. |
37+
| Application type | [Application type](/cloudflare-one/traffic-policies/application-app-types/#app-types) assigned by Cloudflare Cloudflare One. |
3838
| Status | Application's approval status. |
3939
| Secured | Whether the application is currently secured behind Cloudflare Access. |
4040
| Users | Number of users who connected to the application over the period of time specified on the Shadow IT Discovery overview page. |
@@ -51,9 +51,10 @@ After marking applications, you can create [HTTP policies](/cloudflare-one/traff
5151

5252
To create an HTTP status policy directly from Shadow IT Discovery:
5353

54-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Analytics** > **Dashboards**, then select **Shadow IT: SaaS analytics**.
55-
2. Select **Set application statuses**.
56-
3. Select **Manage HTTP status policies**, then choose an application status and select **Create policy**.
54+
1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Insights**.
55+
2. Select **Dashboards** > **Shadow IT: SaaS analytics**.
56+
3. Select **Set application statuses**.
57+
4. Select **Manage HTTP status policies**, then choose an application status and select **Create policy**.
5758

5859
## Available insights
5960

0 commit comments

Comments
 (0)