<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Cloudflare changelogs | Cloudflare One</title><description>Cloudflare changelogs for Cloudflare One products</description><link>https://developers.cloudflare.com/changelog/</link><item><title>Cloudflare One Client - Cloudflare One Client for macOS (version 2026.3.846.0)</title><link>https://developers.cloudflare.com/changelog/post/2026-04-02-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-04-02-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS Cloudflare One Client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;The next stable release for macOS will introduce the new Cloudflare One Client UI, providing a cleaner and more intuitive design as well as easier access to common actions and information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Empty MDM files are now rejected instead of being incorrectly accepted as a single MDM config.&lt;/li&gt;
&lt;li&gt;Fixed an issue in local proxy mode where the client could become unresponsive due to upstream connection timeouts.&lt;/li&gt;
&lt;li&gt;Fixed an issue where the emergency disconnect status of a prior organization persisted after a switch to a different organization.&lt;/li&gt;
&lt;li&gt;Consumer-only CLI commands are now clearly distinguished from Zero Trust commands.&lt;/li&gt;
&lt;li&gt;Added detailed QUIC connection metrics to diagnostic logs for better troubleshooting.&lt;/li&gt;
&lt;li&gt;Added monitoring for tunnel statistics collection timeouts.&lt;/li&gt;
&lt;li&gt;Switched tunnel congestion control algorithm for local proxy mode to Cubic for improved reliability across platforms.&lt;/li&gt;
&lt;li&gt;Fixed initiating managed network detections checks when no network is available, which caused device profile flapping.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 02 Apr 2026 16:28:33 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - Cloudflare One Client for Linux (version 2026.3.846.0)</title><link>https://developers.cloudflare.com/changelog/post/2026-04-02-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-04-02-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux Cloudflare One Client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;The next stable release for Linux will introduce the new Cloudflare One Client UI, providing a cleaner and more intuitive design as well as easier access to common actions and information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Empty MDM files are now rejected instead of being incorrectly accepted as a single MDM config.&lt;/li&gt;
&lt;li&gt;Fixed an issue in local proxy mode where the client could become unresponsive due to upstream connection timeouts.&lt;/li&gt;
&lt;li&gt;Fixed an issue where the emergency disconnect status of a prior organization persisted after a switch to a different organization.&lt;/li&gt;
&lt;li&gt;Consumer-only CLI commands are now clearly distinguished from Zero Trust commands.&lt;/li&gt;
&lt;li&gt;Added detailed QUIC connection metrics to diagnostic logs for better troubleshooting.&lt;/li&gt;
&lt;li&gt;Added monitoring for tunnel statistics collection timeouts.&lt;/li&gt;
&lt;li&gt;Switched tunnel congestion control algorithm for local proxy mode to Cubic for improved reliability across platforms.&lt;/li&gt;
&lt;li&gt;Fixed initiating managed network detections checks when no network is available, which caused device profile flapping.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 02 Apr 2026 15:39:10 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One, Access, Gateway - Logs UI refresh</title><link>https://developers.cloudflare.com/changelog/post/2026-04-01-logs-ui-refresh/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-04-01-logs-ui-refresh/</guid><description>&lt;p&gt;Access authentication logs and Gateway activity logs (DNS, Network, and HTTP) now feature a refreshed user interface that gives you more flexibility when viewing and analyzing your logs.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/cf1-new-logs-ui.DxF4x0l-_mRSyH.webp&quot; alt=&quot;Screenshot of the new logs UI showing DNS query logs with customizable columns and filtering options&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;The updated UI includes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Filter by field&lt;/strong&gt; - Select any field value to add it as a filter and narrow down your results.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Customizable fields&lt;/strong&gt; - Choose which fields to display in the log table. Querying for fewer fields improves log loading performance.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;View details&lt;/strong&gt; - Select a timestamp to view the full details of a log entry.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Switch to classic view&lt;/strong&gt; - Return to the previous log viewer interface if needed.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/dashboard-logs/access-authentication-logs/&quot;&gt;Access authentication logs&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/dashboard-logs/gateway-logs/&quot;&gt;Gateway activity logs&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Access</category><category>Gateway</category></item><item><title>Gateway - OIDC Claims filtering now available in Gateway Firewall, Resolver, and Egress policies</title><link>https://developers.cloudflare.com/changelog/post/2026-03-24-oidc-claims-filtering-gateway-policies/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-03-24-oidc-claims-filtering-gateway-policies/</guid><description>&lt;p&gt;Cloudflare Gateway now supports &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/identity-selectors/#oidc-claims&quot;&gt;OIDC Claims&lt;/a&gt; as a selector in Firewall, Resolver, and Egress policies. Administrators can use custom OIDC claims from their identity provider to build fine-grained, identity-based traffic policies across all Gateway policy types.&lt;/p&gt;
&lt;p&gt;With this update, you can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Filter traffic in &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/dns-policies/&quot;&gt;DNS&lt;/a&gt;, &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/&quot;&gt;HTTP&lt;/a&gt;, and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/network-policies/&quot;&gt;Network&lt;/a&gt; firewall policies based on OIDC claim values.&lt;/li&gt;
&lt;li&gt;Apply custom &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/resolver-policies/&quot;&gt;resolver policies&lt;/a&gt; to route DNS queries to specific resolvers depending on a user&apos;s OIDC claims.&lt;/li&gt;
&lt;li&gt;Control &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/egress-policies/&quot;&gt;egress policies&lt;/a&gt; to assign dedicated egress IPs based on OIDC claim attributes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, you can create a policy that routes traffic differently for users with &lt;code&gt;department=engineering&lt;/code&gt; in their OIDC claims, or restrict access to certain destinations based on a user&apos;s role claim.&lt;/p&gt;
&lt;p&gt;To get started, configure &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/integrations/identity-providers/generic-oidc/#custom-oidc-claims&quot;&gt;custom OIDC claims&lt;/a&gt; on your identity provider and use the &lt;strong&gt;OIDC Claims&lt;/strong&gt; selector in the Gateway policy builder.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/identity-selectors/&quot;&gt;Identity-based policies&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 24 Mar 2026 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare Tunnel, Cloudflare Tunnel for SASE - Stream logs from multiple replicas of Cloudflare Tunnel simultaneously</title><link>https://developers.cloudflare.com/changelog/post/2026-03-20-tunnel-replica-overview-and-multi-log-streaming/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-03-20-tunnel-replica-overview-and-multi-log-streaming/</guid><description>&lt;p&gt;In the Cloudflare One dashboard, the overview page for a specific Cloudflare Tunnel now shows all &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/configure-tunnels/tunnel-availability/&quot;&gt;replicas&lt;/a&gt; of that tunnel and supports streaming logs from multiple replicas at once.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/tunnel-multiconn.DEOEaLlu_ZDxArh.webp&quot; alt=&quot;View replicas and stream logs from multiple connectors&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;Previously, you could only stream logs from one replica at a time. With this update:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Replicas on the tunnel overview&lt;/strong&gt; — All active replicas for the selected tunnel now appear on that tunnel&apos;s overview page under &lt;strong&gt;Connectors&lt;/strong&gt;. Select any replica to stream its logs.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-connector log streaming&lt;/strong&gt; — Stream logs from multiple replicas simultaneously, making it easier to correlate events across your infrastructure during debugging or incident response. To try it out, log in to &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Cloudflare One&lt;/a&gt; and go to &lt;strong&gt;Networks&lt;/strong&gt; &gt; &lt;strong&gt;Connectors&lt;/strong&gt; &gt; &lt;strong&gt;Cloudflare Tunnels&lt;/strong&gt;. Select &lt;strong&gt;View logs&lt;/strong&gt; next to the tunnel you want to monitor.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/monitor-tunnels/logs/&quot;&gt;Tunnel log streams&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/configure-tunnels/tunnel-availability/deploy-replicas/&quot;&gt;Deploy replicas&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate><product>Cloudflare Tunnel</product><category>Cloudflare Tunnel</category><category>Cloudflare Tunnel for SASE</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2026.3.566.1)</title><link>https://developers.cloudflare.com/changelog/post/2026-03-10-warp-macos-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-03-10-warp-macos-beta/</guid><description>&lt;p&gt;A new Beta release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and introduces a brand new visual style for the client interface. The new Cloudflare One Client interface changes connectivity management from a toggle to a button and brings useful connectivity settings to the home screen. The redesign also introduces a collapsible navigation bar. When expanded, more client information can be accessed including connectivity, settings, and device profile information. If you have any feedback or questions, visit the &lt;a href=&quot;https://community.cloudflare.com/t/introducing-the-new-cloudflare-one-client-interface/901362&quot;&gt;Cloudflare Community forum&lt;/a&gt; and let us know.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Empty MDM files are now rejected instead of being incorrectly accepted as a single MDM config.&lt;/li&gt;
&lt;li&gt;Fixed an issue in proxy mode where the client could become unresponsive due to upstream connection timeouts.&lt;/li&gt;
&lt;li&gt;Fixed emergency disconnect state from a previous organization incorrectly persisting after switching organizations.&lt;/li&gt;
&lt;li&gt;Consumer-only CLI commands are now clearly distinguished from Zero Trust commands.&lt;/li&gt;
&lt;li&gt;Added detailed QUIC connection metrics to diagnostic logs for better troubleshooting.&lt;/li&gt;
&lt;li&gt;Added monitoring for tunnel statistics collection timeouts.&lt;/li&gt;
&lt;li&gt;Switched tunnel congestion control algorithm to Cubic for improved reliability across platforms.&lt;/li&gt;
&lt;li&gt;Fixed initiating managed network detection checks when no network is available, which caused device profile flapping.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The client may become stuck in a &lt;code&gt;Connecting&lt;/code&gt; state. To resolve this issue, reconnect the client by selecting &lt;strong&gt;Disconnect&lt;/strong&gt; and then &lt;strong&gt;Connect&lt;/strong&gt; in the client user interface. Alternatively, change the client&apos;s operation mode.&lt;/li&gt;
&lt;li&gt;The client may display an empty white screen upon the device waking from sleep. To resolve this issue, exit and then open the client to re-launch it.&lt;/li&gt;
&lt;li&gt;Canceling login during a single MDM configuration setup results in an empty page with no way to resume authentication. To work around this issue, exit and relaunch the client.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 10 Mar 2026 17:10:39 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2026.3.566.1)</title><link>https://developers.cloudflare.com/changelog/post/2026-03-10-warp-windows-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-03-10-warp-windows-beta/</guid><description>&lt;p&gt;A new Beta release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and introduces a brand new visual style for the client interface. The new Cloudflare One Client interface changes connectivity management from a toggle to a button and brings useful connectivity settings to the home screen. The redesign also introduces a collapsible navigation bar. When expanded, more client information can be accessed including connectivity, settings, and device profile information. If you have any feedback or questions, visit the &lt;a href=&quot;https://community.cloudflare.com/t/introducing-the-new-cloudflare-one-client-interface/901362&quot;&gt;Cloudflare Community forum&lt;/a&gt; and let us know.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Consumer-only CLI commands are now clearly distinguished from Zero Trust commands.&lt;/li&gt;
&lt;li&gt;Added detailed QUIC connection metrics to diagnostic logs for better troubleshooting.&lt;/li&gt;
&lt;li&gt;Added monitoring for tunnel statistics collection timeouts.&lt;/li&gt;
&lt;li&gt;Switched tunnel congestion control algorithm to Cubic for improved reliability across platforms.&lt;/li&gt;
&lt;li&gt;Fixed packet capture failing on tunnel interface when the tunnel interface is renamed by SCCM VPN boundary support.&lt;/li&gt;
&lt;li&gt;Fixed unnecessary registration deletion caused by RDP connections in multi-user mode.&lt;/li&gt;
&lt;li&gt;Fixed increased tunnel interface start-up time due to a race between duplicate address detection (DAD) and disabling NetBT.&lt;/li&gt;
&lt;li&gt;Fixed tunnel failing to connect when the system DNS search list contains unexpected characters.&lt;/li&gt;
&lt;li&gt;Empty MDM files are now rejected instead of being incorrectly accepted as a single MDM config.&lt;/li&gt;
&lt;li&gt;Fixed an issue in proxy mode where the client could become unresponsive due to upstream connection timeouts.&lt;/li&gt;
&lt;li&gt;Fixed emergency disconnect state from a previous organization incorrectly persisting after switching organizations.&lt;/li&gt;
&lt;li&gt;Fixed initiating managed network detection checks when no network is available, which caused device profile flapping.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The client may unexpectedly terminate during captive portal login. To work around this issue, use a web browser to authenticate with the captive portal and then re-launch the client.&lt;/li&gt;
&lt;li&gt;An error indicating that Microsoft Edge can&apos;t read and write to its data directory may be displayed during captive portal login; this error is benign and can be dismissed.&lt;/li&gt;
&lt;li&gt;The client may become stuck in a &lt;code&gt;Connecting&lt;/code&gt; state. To resolve this issue, reconnect the client by selecting &lt;strong&gt;Disconnect&lt;/strong&gt; and then &lt;strong&gt;Connect&lt;/strong&gt; in the client user interface. Alternatively, change the client&apos;s operation mode.&lt;/li&gt;
&lt;li&gt;The client may display an empty white screen upon the device waking from sleep. To resolve this issue, exit and then open the client to re-launch it.&lt;/li&gt;
&lt;li&gt;Canceling login during a single MDM configuration setup results in an empty page with no way to resume authentication. To work around this issue, exit and relaunch the client.&lt;/li&gt;
&lt;li&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 version KB5062553&lt;/a&gt; or higher for resolution.&lt;/li&gt;
&lt;li&gt;Devices with KB5055523 installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later. This warning will be omitted from future release notes. This Microsoft Security Intelligence update was released in May 2025.&lt;/li&gt;
&lt;li&gt;DNS resolution may be broken when the following conditions are all true:&lt;ul&gt;
&lt;li&gt;The client is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while the client is connected.
To work around this issue, reconnect the client by selecting &lt;strong&gt;Disconnect&lt;/strong&gt; and then &lt;strong&gt;Connect&lt;/strong&gt; in the client user interface.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 10 Mar 2026 17:10:37 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One, Access - User risk score selector in Access policies</title><link>https://developers.cloudflare.com/changelog/post/2026-03-04-user-risk-score-access-policies/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-03-04-user-risk-score-access-policies/</guid><description>&lt;p&gt;You can now use &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/users/risk-score/&quot;&gt;user risk scores&lt;/a&gt; in your &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/policies/&quot;&gt;Access policies&lt;/a&gt;. The new &lt;strong&gt;User Risk Score&lt;/strong&gt; selector allows you to create Access policies that respond to user behavior patterns detected by Cloudflare&apos;s risk scoring system, including impossible travel, high DLP policy matches, and more.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/users/risk-score/#use-risk-scores-in-access-policies&quot;&gt;Use risk scores in Access policies&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Access</category></item><item><title>Gateway - Gateway Authorization Proxy and hosted PAC files (open beta)</title><link>https://developers.cloudflare.com/changelog/post/2026-03-04-gateway-authorization-proxy-open-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-03-04-gateway-authorization-proxy-open-beta/</guid><description>&lt;p&gt;The &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#authorization-endpoint&quot;&gt;Gateway Authorization Proxy&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#create-a-hosted-pac-file&quot;&gt;PAC file hosting&lt;/a&gt; are now in open beta for all plan types.&lt;/p&gt;
&lt;p&gt;Previously, &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#source-ip-endpoint&quot;&gt;proxy endpoints&lt;/a&gt; relied on static source IP addresses to authorize traffic, providing no user-level identity in logs or policies. The new authorization proxy replaces IP-based authorization with &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/policies/&quot;&gt;Cloudflare Access&lt;/a&gt; authentication, verifying who a user is before applying Gateway filtering without installing the WARP client.&lt;/p&gt;
&lt;p&gt;This is ideal for environments where you cannot deploy a device client, such as virtual desktops (VDI), mergers and acquisitions, or compliance-restricted endpoints.&lt;/p&gt;
&lt;h4&gt;Key capabilities&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Identity-aware proxy traffic&lt;/strong&gt; — Users authenticate through your identity provider (Okta, Microsoft Entra ID, Google Workspace, and others) via Cloudflare Access. Logs now show exactly which user accessed which site, and you can write &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/identity-selectors/&quot;&gt;identity-based policies&lt;/a&gt; like &quot;only the Finance team can access this accounting tool.&quot;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multiple identity providers&lt;/strong&gt; — Display one or multiple login methods simultaneously, giving flexibility for organizations managing users across different identity systems.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloudflare-hosted PAC files&lt;/strong&gt; — Create and host &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#create-a-hosted-pac-file&quot;&gt;PAC files&lt;/a&gt; directly in Cloudflare One with pre-configured templates for Okta and Azure, hosted at &lt;code&gt;https://pac.cloudflare-gateway.com/&amp;#x3C;account-id&gt;/&amp;#x3C;slug&gt;&lt;/code&gt; on Cloudflare&apos;s global network.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Simplified billing&lt;/strong&gt; — Each user occupies a seat, exactly like they do with the Cloudflare One Client. No new metrics to track.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Get started&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;In &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Cloudflare One&lt;/a&gt;, go to &lt;strong&gt;Networks&lt;/strong&gt; &gt; &lt;strong&gt;Resolvers &amp;#x26; Proxies&lt;/strong&gt; &gt; &lt;strong&gt;Proxy endpoints&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#authorization-endpoint&quot;&gt;Create an authorization proxy endpoint&lt;/a&gt; and configure Access policies.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#create-a-hosted-pac-file&quot;&gt;Create a hosted PAC file&lt;/a&gt; or write your own.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#3b-configure-browser-to-use-pac-file&quot;&gt;Configure browsers&lt;/a&gt; to use the PAC file URL.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/user-side-certificates/&quot;&gt;Install the Cloudflare certificate&lt;/a&gt; for HTTPS inspection.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;For more details, refer to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/&quot;&gt;proxy endpoints documentation&lt;/a&gt; and the &lt;a href=&quot;https://blog.cloudflare.com/gateway-authorization-proxy-identity-aware-policies/&quot; target=&quot;_blank&quot;&gt;announcement blog post&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One - Copy Cloudflare One resources as JSON or POST requests</title><link>https://developers.cloudflare.com/changelog/post/2026-03-copy-resources-as-json-or-post-requests/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-03-copy-resources-as-json-or-post-requests/</guid><description>&lt;p&gt;You can now copy Cloudflare One resources as JSON or as a ready-to-use API POST request directly from the dashboard. This makes it simple to transition workflows into API calls, automation scripts, or infrastructure-as-code pipelines.&lt;/p&gt;
&lt;p&gt;To use this feature, click the overflow menu (⋮) on any supported resource and select &lt;strong&gt;Copy as JSON&lt;/strong&gt; or &lt;strong&gt;Copy as POST request&lt;/strong&gt;. The copied output includes only the fields present on your resource, giving you a clean and minimal starting point for your own API calls.&lt;/p&gt;
&lt;p&gt;Initially supported resources:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Access applications&lt;/li&gt;
&lt;li&gt;Access policies&lt;/li&gt;
&lt;li&gt;Gateway policies&lt;/li&gt;
&lt;li&gt;Resolver policies&lt;/li&gt;
&lt;li&gt;Service tokens&lt;/li&gt;
&lt;li&gt;Identity providers&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We will continue to add support for more resources throughout 2026.&lt;/p&gt;</description><pubDate>Mon, 02 Mar 2026 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category></item><item><title>Access - Clipboard controls for browser-based RDP</title><link>https://developers.cloudflare.com/changelog/post/2026-03-01-rdp-clipboard-controls/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-03-01-rdp-clipboard-controls/</guid><description>&lt;p&gt;You can now configure clipboard controls for browser-based RDP with Cloudflare Access. Clipboard controls allow administrators to restrict whether users can copy or paste text between their local machine and the remote Windows server.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/rdp-clipboard-controls.B0ZmliDb_Z1Ne5yg.webp&quot; alt=&quot;Enable users to copy and paste content from their local machine to remote RDP sessions in the Cloudflare One dashboard&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This feature is useful for organizations that support bring-your-own-device (BYOD) policies or third-party contractors using unmanaged devices. By restricting clipboard access, you can prevent sensitive data from being transferred out of the remote session to a user&apos;s personal device.&lt;/p&gt;
&lt;h4&gt;Configuration options&lt;/h4&gt;
&lt;p&gt;Clipboard controls are configured per policy within your Access application. For each policy, you can independently allow or deny:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Copy from local client to remote RDP session&lt;/strong&gt; — Users can copy/paste text from their local machine into the browser-based RDP session.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Copy from remote RDP session to local client&lt;/strong&gt; — Users can copy/paste text from the browser-based RDP session to their local machine.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;By default, both directions are denied for new policies. For existing Access applications created before this feature was available, clipboard access remains enabled to preserve backwards compatibility.&lt;/p&gt;
&lt;p&gt;When a user attempts a restricted clipboard action, the clipboard content is replaced with an error message informing them that the action is not allowed.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/rdp/rdp-browser/#clipboard-controls&quot;&gt;Clipboard controls for browser-based RDP&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Sun, 01 Mar 2026 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Access - Export MCP server portal logs with Logpush</title><link>https://developers.cloudflare.com/changelog/post/2026-02-27-mcp-portal-logpush/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-27-mcp-portal-logpush/</guid><description>&lt;aside&gt;&lt;p&gt;Availability&lt;/p&gt;&lt;div&gt;&lt;p&gt;Only available on Enterprise plans.&lt;/p&gt;&lt;/div&gt;&lt;/aside&gt;
&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/ai-controls/mcp-portals/&quot;&gt;MCP server portals&lt;/a&gt; now supports &lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/&quot;&gt;Logpush&lt;/a&gt; integration. You can automatically export MCP server portal activity logs to third-party storage destinations or security information and event management (SIEM) tools for analysis and auditing.&lt;/p&gt;
&lt;h4&gt;Available log fields&lt;/h4&gt;
&lt;p&gt;The MCP server portal logs dataset includes fields such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Datetime&lt;/code&gt; — Timestamp of the request&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PortalID&lt;/code&gt; / &lt;code&gt;PortalAUD&lt;/code&gt; — Portal identifiers&lt;/li&gt;
&lt;li&gt;&lt;code&gt;ServerID&lt;/code&gt; / &lt;code&gt;ServerURL&lt;/code&gt; — Upstream MCP server details&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Method&lt;/code&gt; — JSON-RPC method (for example, &lt;code&gt;tools/call&lt;/code&gt;, &lt;code&gt;prompts/get&lt;/code&gt;, &lt;code&gt;resources/read&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;&lt;code&gt;ToolCallName&lt;/code&gt; / &lt;code&gt;PromptGetName&lt;/code&gt; / &lt;code&gt;ResourceReadURI&lt;/code&gt; — Method-specific identifiers&lt;/li&gt;
&lt;li&gt;&lt;code&gt;UserID&lt;/code&gt; / &lt;code&gt;UserEmail&lt;/code&gt; — Authenticated user information&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Success&lt;/code&gt; / &lt;code&gt;Error&lt;/code&gt; — Request outcome&lt;/li&gt;
&lt;li&gt;&lt;code&gt;ServerResponseDurationMs&lt;/code&gt; — Response time from upstream server&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For the complete field reference, refer to &lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/logpush-job/datasets/account/mcp_portal_logs/&quot;&gt;MCP portal logs&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;Set up Logpush&lt;/h4&gt;
&lt;p&gt;To configure Logpush for MCP server portal logs, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/logpush/&quot;&gt;Logpush integration&lt;/a&gt;.&lt;/p&gt;
&lt;aside&gt;&lt;p&gt;Note&lt;/p&gt;&lt;div&gt;&lt;p&gt;MCP server portals is currently in beta.&lt;/p&gt;&lt;/div&gt;&lt;/aside&gt;</description><pubDate>Fri, 27 Feb 2026 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Gateway - New protocols added for Gateway Protocol Detection (Beta)</title><link>https://developers.cloudflare.com/changelog/post/2026-02-27-new-protocol-detection-protocols/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-27-new-protocol-detection-protocols/</guid><description>&lt;p&gt;Gateway &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/network-policies/protocol-detection/&quot;&gt;Protocol Detection&lt;/a&gt; now supports seven additional protocols in beta:&lt;/p&gt;





































&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Protocol&lt;/th&gt;&lt;th&gt;Notes&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;IMAP&lt;/td&gt;&lt;td&gt;Internet Message Access Protocol — email retrieval&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;POP3&lt;/td&gt;&lt;td&gt;Post Office Protocol v3 — email retrieval&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;SMTP&lt;/td&gt;&lt;td&gt;Simple Mail Transfer Protocol — email sending&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;MYSQL&lt;/td&gt;&lt;td&gt;MySQL database wire protocol&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;RSYNC-DAEMON&lt;/td&gt;&lt;td&gt;rsync daemon protocol&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;LDAP&lt;/td&gt;&lt;td&gt;Lightweight Directory Access Protocol&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;NTP&lt;/td&gt;&lt;td&gt;Network Time Protocol&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;
&lt;p&gt;These protocols join the existing set of detected protocols (HTTP, HTTP2, SSH, TLS, DCERPC, MQTT, and TPKT) and can be used with the &lt;em&gt;Detected Protocol&lt;/em&gt; selector in &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/network-policies/&quot;&gt;Network policies&lt;/a&gt; to identify and filter traffic based on the application-layer protocol, without relying on port-based identification.&lt;/p&gt;
&lt;p&gt;If protocol detection is enabled on your account, these protocols will automatically be logged when detected in your Gateway network traffic.&lt;/p&gt;
&lt;p&gt;For more information on using Protocol Detection, refer to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/network-policies/protocol-detection/&quot;&gt;Protocol detection documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 27 Feb 2026 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2026.1.150.0)</title><link>https://developers.cloudflare.com/changelog/post/2026-02-24-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-24-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes, improvements, and new features.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improvements to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/windows-multiuser/&quot;&gt;multi-user mode&lt;/a&gt;. Fixed an issue where when switching from a pre-login registration to a user registration, Mobile Device Management (MDM) configuration association could be lost.&lt;/li&gt;
&lt;li&gt;Added a new feature to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#netbios-over-tcpip&quot;&gt;manage NetBIOS over TCP/IP&lt;/a&gt; functionality on the Windows client. NetBIOS over TCP/IP on the Windows client is now disabled by default and can be enabled in &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/device-profiles/&quot;&gt;device profile settings&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing failure of the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#allow-users-to-enable-local-network-exclusion&quot;&gt;local network exclusion&lt;/a&gt; feature when configured with a timeout of &lt;code&gt;0&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Improvement for the Windows &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/warp-client-checks/client-certificate/&quot;&gt;client certificate posture check&lt;/a&gt; to ensure logged results are from checks that run once users log in.&lt;/li&gt;
&lt;li&gt;Improvement for more accurate reporting of device colocation information in the Cloudflare One dashboard.&lt;/li&gt;
&lt;li&gt;Fixed an issue where misconfigured DEX HTTP tests prevented new registrations.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing DNS requests to fail with clients in Traffic and DNS mode.&lt;/li&gt;
&lt;li&gt;Improved service shutdown behavior in cases where the daemon is unresponsive.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 24 Feb 2026 01:15:23 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2026.1.150.0)</title><link>https://developers.cloudflare.com/changelog/post/2026-02-24-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-24-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue causing failure of the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#allow-users-to-enable-local-network-exclusion&quot;&gt;local network exclusion&lt;/a&gt; feature when configured with a timeout of &lt;code&gt;0&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Improvement for more accurate reporting of device colocation information in the Cloudflare One dashboard.&lt;/li&gt;
&lt;li&gt;Fixed an issue with DNS server configuration failures that caused tunnel connection delays.&lt;/li&gt;
&lt;li&gt;Fixed an issue where misconfigured DEX HTTP tests prevented new registrations.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing DNS requests to fail with clients in Traffic and DNS mode.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 24 Feb 2026 01:15:22 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Linux (version 2026.1.150.0)</title><link>https://developers.cloudflare.com/changelog/post/2026-02-24-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-24-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;WARP client version 2025.8.779.0 introduced an updated public key for Linux packages. The public key must be updated if it was installed before September 12, 2025 to ensure the repository remains functional after December 4, 2025. Instructions to make this update are available at &lt;a href=&quot;https://pkg.cloudflareclient.com&quot;&gt;pkg.cloudflareclient.com&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue causing failure of the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#allow-users-to-enable-local-network-exclusion&quot;&gt;local network exclusion&lt;/a&gt; feature when configured with a timeout of &lt;code&gt;0&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Improvement for more accurate reporting of device colocation information in the Cloudflare One dashboard.&lt;/li&gt;
&lt;li&gt;Fixed an issue where misconfigured DEX HTTP tests prevented new registrations.&lt;/li&gt;
&lt;li&gt;Fixed issues causing DNS requests to fail with clients in Traffic and DNS mode or DNS only mode.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 24 Feb 2026 00:14:20 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>CASB - Understand CASB findings instantly with Cloudy Summaries</title><link>https://developers.cloudflare.com/changelog/post/2026-02-20-cloudy-in-casb/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-20-cloudy-in-casb/</guid><description>&lt;p&gt;You can now easily understand your SaaS security posture findings and why they were detected with &lt;strong&gt;Cloudy Summaries in CASB&lt;/strong&gt;. This feature integrates Cloudflare&apos;s Cloudy AI directly into your CASB Posture Findings to automatically generate clear, plain-language summaries of complex security misconfigurations, third-party app risks, and data exposures.&lt;/p&gt;
&lt;p&gt;This allows security teams and IT administrators to drastically reduce triage time by immediately understanding the context, potential impact, and necessary remediation steps for any given finding—without needing to be an expert in every connected SaaS application.&lt;/p&gt;
&lt;p&gt;To view a summary, simply navigate to your Posture Findings in the Cloudflare One dashboard (under &lt;strong&gt;Cloud and SaaS findings&lt;/strong&gt;) and open the finding details of a specific instance of a Finding.&lt;/p&gt;
&lt;p&gt;Cloudy Summaries are supported on all available integrations, including Microsoft 365, Google Workspace, Salesforce, GitHub, AWS, Slack, and Dropbox. See the full list of supported integrations &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;Key capabilities&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Contextual explanations&lt;/strong&gt; — Quickly understand the specifics of a finding with plain-language summaries detailing exactly what was detected, from publicly shared sensitive files to risky third-party app scopes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Clear risk assessment&lt;/strong&gt; — Instantly grasp the potential security impact of the finding, such as data breach risks, unauthorized account access, or email spoofing vulnerabilities.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Actionable guidance&lt;/strong&gt; — Get clear recommendations and next steps on how to effectively remediate the issue and secure your environment.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Built-in feedback&lt;/strong&gt; — Help improve future AI summarization accuracy by submitting feedback directly using the thumbs-up and thumbs-down buttons.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Learn more&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Learn more about managing &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/cloud-and-saas-findings/&quot;&gt;CASB Posture Findings&lt;/a&gt; in Cloudflare.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Cloudy Summaries in CASB are available to all Cloudflare CASB users today.&lt;/p&gt;</description><pubDate>Fri, 20 Feb 2026 00:00:00 GMT</pubDate><product>CASB</product><category>CASB</category></item><item><title>Cloudflare Tunnel, Cloudflare Tunnel for SASE - Manage Cloudflare Tunnel directly from the main Cloudflare Dashboard</title><link>https://developers.cloudflare.com/changelog/post/2026-02-20-tunnel-core-dashboard/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-20-tunnel-core-dashboard/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/&quot;&gt;Cloudflare Tunnel&lt;/a&gt; is now available in the main Cloudflare Dashboard at &lt;a href=&quot;https://dash.cloudflare.com/?to=/:account/tunnels&quot; target=&quot;_blank&quot;&gt;Networking &gt; Tunnels&lt;/a&gt;, bringing first-class Tunnel management to developers using Tunnel for securing origin servers.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/tunnel-core-dashboard.BGPqaHfo_Pi6HO.webp&quot; alt=&quot;Manage Tunnels in the Core Dashboard&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This new experience provides everything you need to manage Tunnels for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/routing-to-tunnel/&quot;&gt;public applications&lt;/a&gt;, including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Full Tunnel lifecycle management&lt;/strong&gt;: Create, configure, delete, and monitor all your Tunnels in one place.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Native integrations&lt;/strong&gt;: View Tunnels by name when configuring &lt;a href=&quot;https://developers.cloudflare.com/dns/manage-dns-records/how-to/create-dns-records/&quot;&gt;DNS records&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/workers-vpc/&quot;&gt;Workers VPC&lt;/a&gt; — no more copy-pasting UUIDs.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-time visibility&lt;/strong&gt;: Monitor &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/configure-tunnels/tunnel-availability/&quot;&gt;replicas&lt;/a&gt; and Tunnel &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/troubleshoot-tunnels/common-errors/#tunnel-status&quot;&gt;health status&lt;/a&gt; directly in the dashboard.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Routing map&lt;/strong&gt;: Manage all ingress routes for your Tunnel, including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/routing-to-tunnel/&quot;&gt;public applications&lt;/a&gt;, &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-private-hostname/&quot;&gt;private hostnames&lt;/a&gt;, &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-cidr/&quot;&gt;private CIDRs&lt;/a&gt;, and &lt;a href=&quot;https://developers.cloudflare.com/workers-vpc/&quot;&gt;Workers VPC services&lt;/a&gt;, from a single interactive interface.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Choose the right dashboard for your use case&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Core Dashboard&lt;/strong&gt;: Navigate to &lt;a href=&quot;https://dash.cloudflare.com/?to=/:account/tunnels&quot; target=&quot;_blank&quot;&gt;Networking &gt; Tunnels&lt;/a&gt; to manage Tunnels for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Securing origin servers and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/routing-to-tunnel/&quot;&gt;public applications&lt;/a&gt; with CDN, WAF, Load Balancing, and DDoS protection&lt;/li&gt;
&lt;li&gt;Connecting &lt;a href=&quot;https://developers.cloudflare.com/workers-vpc/&quot;&gt;Workers to private services&lt;/a&gt; via Workers VPC&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Cloudflare One Dashboard&lt;/strong&gt;: Navigate to &lt;a href=&quot;https://one.dash.cloudflare.com/?to=/:account/networks/connectors&quot; target=&quot;_blank&quot;&gt;Zero Trust &gt; Networks &gt; Connectors&lt;/a&gt; to manage Tunnels for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Securing your public applications with &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/http-apps/self-hosted-public-app/&quot;&gt;Zero Trust access policies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Connecting users to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/&quot;&gt;private applications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Building a &lt;a href=&quot;https://developers.cloudflare.com/reference-architecture/architectures/sase/#connecting-networks&quot;&gt;private mesh network&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Both dashboards provide complete Tunnel management capabilities — choose based on your primary workflow.&lt;/p&gt;
&lt;h4&gt;Get started&lt;/h4&gt;
&lt;p&gt;New to Tunnel? Learn how to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/get-started/create-remote-tunnel/&quot;&gt;get started with Cloudflare Tunnel&lt;/a&gt; or explore advanced use cases like &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/&quot;&gt;securing SSH servers&lt;/a&gt; or &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/deployment-guides/kubernetes/&quot;&gt;running Tunnels in Kubernetes&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 20 Feb 2026 00:00:00 GMT</pubDate><product>Cloudflare Tunnel</product><category>Cloudflare Tunnel</category><category>Cloudflare Tunnel for SASE</category></item><item><title>Digital Experience Monitoring - DEX Supports EU Customer Metadata Boundary</title><link>https://developers.cloudflare.com/changelog/post/2026-02-19-dex-supports-cmb-eu/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-19-dex-supports-cmb-eu/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/dex/&quot;&gt;Digital Experience Monitoring (DEX)&lt;/a&gt; provides visibility into &lt;a href=&quot;https://developers.cloudflare.com/warp-client/&quot;&gt;WARP&lt;/a&gt; device connectivity and performance to any internal or external application.&lt;/p&gt;
&lt;p&gt;Now, all DEX logs are fully compatible with Cloudflare&apos;s &lt;a href=&quot;https://developers.cloudflare.com/data-localization/metadata-boundary/&quot;&gt;Customer Metadata Boundary&lt;/a&gt; (CMB) setting for the &apos;EU&apos; (European Union), which ensures that DEX logs will not be stored outside the &apos;EU&apos; when the option is configured.&lt;/p&gt;
&lt;p&gt;If a Cloudflare One customer using DEX enables CMB &apos;EU&apos;, they will not see any DEX data in the Cloudflare One dashboard. Customers can ingest DEX data via &lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/&quot;&gt;LogPush&lt;/a&gt;, and build their own analytics and dashboards.&lt;/p&gt;
&lt;p&gt;If a customer enables CMB in their account, they will see the following message in the Digital Experience dashboard: &quot;DEX data is unavailable because Customer Metadata Boundary configuration is on. Use Cloudflare LogPush to export DEX datasets.&quot;&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/dex_supports_cmb.6YOLXjHN_ZJh3uv.webp&quot; alt=&quot;Digital Experience Monitoring message when Customer Metadata Boundary for the EU is enabled&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;</description><pubDate>Thu, 19 Feb 2026 00:00:00 GMT</pubDate><product>Digital Experience Monitoring</product><category>Digital Experience Monitoring</category></item><item><title>Access - Streamlined clientless browser isolation for private applications</title><link>https://developers.cloudflare.com/changelog/post/2026-02-17-clientless-access-for-private-apps/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-17-clientless-access-for-private-apps/</guid><description>&lt;p&gt;A new &lt;strong&gt;Allow clientless access&lt;/strong&gt; setting makes it easier to connect users without a device client to internal applications, without using public DNS.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/allow-clientless-access.BHKwQuVt_1mLRiX.webp&quot; alt=&quot;Allow clientless access setting in the Cloudflare One dashboard&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;Previously, to provide clientless access to a private hostname or IP without a &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/routes/add-routes/#add-a-published-application-route&quot;&gt;published application&lt;/a&gt;, you had to create a separate &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/bookmarks/&quot;&gt;bookmark application&lt;/a&gt; pointing to a prefixed &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/&quot;&gt;Clientless Web Isolation&lt;/a&gt; URL (for example, &lt;code&gt;https://&amp;#x3C;your-teamname&gt;.cloudflareaccess.com/browser/https://10.0.0.1/&lt;/code&gt;). This bookmark was visible to all users in the App Launcher, regardless of whether they had access to the underlying application.&lt;/p&gt;
&lt;p&gt;Now, you can manage clientless access directly within your &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/&quot;&gt;private self-hosted application&lt;/a&gt;. When  &lt;strong&gt;Allow clientless access&lt;/strong&gt; is turned on, users who pass your Access application policies will see a tile in their App Launcher pointing to the prefixed URL. Users must have &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/&quot;&gt;remote browser permissions&lt;/a&gt; to open the link.&lt;/p&gt;</description><pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Access - Policies for bookmark applications</title><link>https://developers.cloudflare.com/changelog/post/2026-02-17-policies-for-bookmarks/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-17-policies-for-bookmarks/</guid><description>&lt;p&gt;You can now assign &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/policies/&quot;&gt;Access policies&lt;/a&gt; to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/bookmarks/&quot;&gt;bookmark applications&lt;/a&gt;. This lets you control which users see a bookmark in the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/access-settings/app-launcher/&quot;&gt;App Launcher&lt;/a&gt; based on identity, device posture, and other policy rules.&lt;/p&gt;
&lt;p&gt;Previously, bookmark applications were visible to all users in your organization. With policy support, you can now:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Tailor the App Launcher to each user&lt;/strong&gt; — Users only see the applications they have access to, reducing clutter and preventing accidental clicks on irrelevant resources.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Restrict visibility of sensitive bookmarks&lt;/strong&gt; — Limit who can view bookmarks to internal tools or partner resources based on group membership, identity provider, or device posture.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Bookmarks support all &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/policies/&quot;&gt;Access policy configurations&lt;/a&gt; except purpose justification, temporary authentication, and application isolation. If no policy is assigned, the bookmark remains visible to all users (maintaining backwards compatibility).&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/bookmarks/&quot;&gt;Add bookmarks&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Cloudflare One, Cloudflare WAN, Cloudflare Network Firewall, Network Flow - Cloudflare One Product Name Updates</title><link>https://developers.cloudflare.com/changelog/post/2026-02-17-product-name-updates/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-17-product-name-updates/</guid><description>&lt;p&gt;We are updating naming related to some of our Networking products to better clarify their place in the Zero Trust and Secure Access Service Edge (SASE) journey.&lt;/p&gt;
&lt;p&gt;We are retiring some older brand names in favor of names that describe exactly what the products do within your network. We are doing this to help customers build better, clearer mental models for comprehensive SASE architecture delivered on Cloudflare.&lt;/p&gt;
&lt;h4&gt;What&apos;s changing&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Magic WAN&lt;/strong&gt; → &lt;strong&gt;Cloudflare WAN&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic WAN IPsec&lt;/strong&gt; → &lt;strong&gt;Cloudflare IPsec&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic WAN GRE&lt;/strong&gt; → &lt;strong&gt;Cloudflare GRE&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic WAN Connector&lt;/strong&gt; → &lt;strong&gt;Cloudflare One Appliance&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic Firewall&lt;/strong&gt; → &lt;strong&gt;Cloudflare Network Firewall&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic Network Monitoring&lt;/strong&gt; → &lt;strong&gt;Network Flow&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Magic Cloud Networking&lt;/strong&gt; → &lt;strong&gt;Cloudflare One Multi-cloud Networking&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;No action is required by you&lt;/strong&gt; — all functionality, existing configurations, and billing will remain exactly the same.&lt;/p&gt;
&lt;p&gt;For more information, visit the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/&quot;&gt;Cloudflare One documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category><category>Cloudflare Network Firewall</category><category>Network Flow</category></item><item><title>Cloudflare Fundamentals, Access - Fine-grained permissions for Access policies and service tokens</title><link>https://developers.cloudflare.com/changelog/post/2026-02-13-access-policy-service-token-permissions/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-13-access-policy-service-token-permissions/</guid><description>&lt;p&gt;Fine-grained permissions for &lt;strong&gt;Access policies&lt;/strong&gt; and &lt;strong&gt;Access service tokens&lt;/strong&gt; are available. These new resource-scoped roles expand the existing RBAC model, enabling administrators to grant permissions scoped to individual resources.&lt;/p&gt;
&lt;h4&gt;New roles&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cloudflare Access policy admin&lt;/strong&gt;: Can edit a specific &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/policies/&quot;&gt;Access policy&lt;/a&gt; in an account.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloudflare Access service token admin&lt;/strong&gt;: Can edit a specific &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/service-credentials/service-tokens/&quot;&gt;Access service token&lt;/a&gt; in an account.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These roles complement the existing resource-scoped roles for Access applications, identity providers, and infrastructure targets.&lt;/p&gt;
&lt;p&gt;For more information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/fundamentals/manage-members/roles/#resource-scoped-roles&quot;&gt;Resource-scoped roles&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/fundamentals/manage-members/scope/&quot;&gt;Role scopes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;aside&gt;&lt;p&gt;Note&lt;/p&gt;&lt;div&gt;&lt;p&gt;Resource-scoped roles is currently in beta.&lt;/p&gt;&lt;/div&gt;&lt;/aside&gt;</description><pubDate>Fri, 13 Feb 2026 00:00:00 GMT</pubDate><product>Cloudflare Fundamentals</product><category>Cloudflare Fundamentals</category><category>Access</category></item><item><title>Cloudflare WAN - Anycast IPs displayed on the dashboard</title><link>https://developers.cloudflare.com/changelog/post/2026-02-12-anycast-ips-on-dashboard/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-12-anycast-ips-on-dashboard/</guid><description>&lt;p&gt;Cloudflare WAN now displays your Anycast IP addresses directly in the dashboard when you configure IPsec or GRE tunnels.&lt;/p&gt;
&lt;p&gt;Previously, customers received their Anycast IPs during onboarding or had to retrieve them with an API call. The dashboard now pre-loads these addresses, reducing setup friction and preventing configuration errors.&lt;/p&gt;
&lt;p&gt;No action is required. All Cloudflare WAN customers can see their Anycast IPs in the tunnel configuration form automatically.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/manually/how-to/configure-tunnel-endpoints/&quot;&gt;Configure tunnel endpoints&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category></item><item><title>Cloudflare One, Cloudflare WAN - Post-quantum encryption support for Cloudflare One Appliance</title><link>https://developers.cloudflare.com/changelog/post/2026-02-11-appliance-post-quantum-encryption/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-11-appliance-post-quantum-encryption/</guid><description>&lt;p&gt;Cloudflare One Appliance version 2026.2.0 adds &lt;a href=&quot;https://developers.cloudflare.com/ssl/post-quantum-cryptography/&quot;&gt;post-quantum encryption&lt;/a&gt; support using hybrid ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism).&lt;/p&gt;
&lt;p&gt;The appliance now uses TLS 1.3 with hybrid ML-KEM for its connection to the Cloudflare edge. During the TLS handshake, the appliance and the edge share a symmetric secret over the TLS connection and inject it into the ESP layer of IPsec. This protects IPsec data plane traffic against harvest-now, decrypt-later attacks.&lt;/p&gt;
&lt;p&gt;This upgrade deploys automatically to all appliances during their configured interrupt windows with no manual action required.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/&quot;&gt;Cloudflare One Appliance&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Email security - Improved Accessibility and Search for Monitoring</title><link>https://developers.cloudflare.com/changelog/post/2026-02-02-improved-accessibility-search-for-monitoring/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-02-02-improved-accessibility-search-for-monitoring/</guid><description>&lt;p&gt;We have updated the Monitoring page to provide a more streamlined and insightful experience for administrators, improving both data visualization and dashboard accessibility.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Enhanced Visual Layout&lt;/strong&gt;: Optimized contrast and the introduction of stacked bar charts for clearer data visualization and trend analysis.
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/monitoring-bar-charts.Bi-4BuXC_xiAlF.webp&quot; alt=&quot;visual-example&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Improved Accessibility &amp;#x26; Usability&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Widget Search&lt;/strong&gt;: Added search functionality to multiple widgets, including Policies, Submitters, and Impersonation.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Actionable UI&lt;/strong&gt;: All available actions are now accessible via dedicated buttons.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;State Indicators&lt;/strong&gt;: Improved UI states to clearly communicate loading, empty datasets, and error conditions.
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/monitoring-buttons.DORPJvP__1JBNhu.webp&quot; alt=&quot;buttons-example&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Granular Data Breakdowns&lt;/strong&gt;: New views for dispositions by month, malicious email details, link actions, and impersonations.
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/monitoring-monthly-dispositions.CYuI5d9y_ZSVir3.webp&quot; alt=&quot;monthly-example&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This applies to all Email Security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 02 Feb 2026 11:05:33 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Cloudflare WAN, Magic Transit, Cloudflare One - BGP over GRE and IPsec tunnels</title><link>https://developers.cloudflare.com/changelog/post/2026-01-30-bgp-over-tunnels/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-30-bgp-over-tunnels/</guid><description>&lt;p&gt;Magic WAN and Magic Transit customers can use the Cloudflare dashboard to configure and manage BGP peering between their networks and their Magic routing table when using IPsec and GRE tunnel on-ramps (beta).&lt;/p&gt;
&lt;p&gt;Using BGP peering allows customers to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Automate the process of adding or removing networks and subnets.&lt;/li&gt;
&lt;li&gt;Take advantage of failure detection and session recovery features.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;With this functionality, customers can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Establish an eBGP session between their devices and the Magic WAN / Magic Transit service when connected via IPsec and GRE tunnel on-ramps.&lt;/li&gt;
&lt;li&gt;Secure the session by MD5 authentication to prevent misconfigurations.&lt;/li&gt;
&lt;li&gt;Exchange routes dynamically between their devices and their Magic routing table.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For configuration details, refer to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/manually/how-to/configure-routes/#configure-bgp-routes&quot;&gt;Configure BGP routes for Magic WAN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/magic-transit/how-to/configure-routes/#configure-bgp-routes&quot;&gt;Configure BGP routes for Magic Transit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category><category>Magic Transit</category><category>Cloudflare One</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2026.1.89.1)</title><link>https://developers.cloudflare.com/changelog/post/2026-01-27-warp-windows-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-27-warp-windows-beta/</guid><description>&lt;p&gt;A new Beta release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes, improvements, and new features.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improvements to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/windows-multiuser/&quot;&gt;multi-user mode&lt;/a&gt;. Fixed an issue where when switching from a pre-login registration to a user registration, Mobile Device Management (MDM) configuration association could be lost.&lt;/li&gt;
&lt;li&gt;Added a new feature to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#netbios-over-tcpip&quot;&gt;manage NetBIOS over TCP/IP&lt;/a&gt; functionality on the Windows client. NetBIOS over TCP/IP on the Windows client is now disabled by default and can be enabled in &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/device-profiles/&quot;&gt;device profile settings&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing failure of the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#allow-users-to-enable-local-network-exclusion&quot;&gt;local network exclusion&lt;/a&gt; feature when configured with a timeout of &lt;code&gt;0&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Improvement for the Windows &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/warp-client-checks/client-certificate/&quot;&gt;client certificate posture check&lt;/a&gt; to ensure logged results are from checks that run once users log in.&lt;/li&gt;
&lt;li&gt;Improvement for more accurate reporting of device colocation information in the Cloudflare One dashboard.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 27 Jan 2026 18:47:00 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2026.1.89.1)</title><link>https://developers.cloudflare.com/changelog/post/2026-01-27-warp-macos-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-27-warp-macos-beta/</guid><description>&lt;p&gt;A new Beta release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue causing failure of the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#allow-users-to-enable-local-network-exclusion&quot;&gt;local network exclusion&lt;/a&gt; feature when configured with a timeout of &lt;code&gt;0&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Improvement for more accurate reporting of device colocation information in the Cloudflare One dashboard.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 27 Jan 2026 18:46:59 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One, Cloudflare WAN - Configure Cloudflare source IPs (beta)</title><link>https://developers.cloudflare.com/changelog/post/2026-01-27-configure-cloudflare-source-ips/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-27-configure-cloudflare-source-ips/</guid><description>&lt;p&gt;Cloudflare source IPs are the IP addresses used by Cloudflare services (such as Load Balancing, Gateway, and Browser Isolation) when sending traffic to your private networks.&lt;/p&gt;
&lt;p&gt;For customers using legacy mode routing, traffic to private networks is sourced from public Cloudflare IPs, which may cause IP conflicts. For customers using Unified Routing mode (beta), traffic to private networks is sourced from dedicated, non-Internet-routable private IPv4 range to ensure:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Symmetric routing over private network connections&lt;/li&gt;
&lt;li&gt;Proper firewall state preservation&lt;/li&gt;
&lt;li&gt;Private traffic stays on secure paths&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Key details:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;IPv4&lt;/strong&gt;: Sourced from &lt;code&gt;100.64.0.0/12&lt;/code&gt; by default, configurable to any &lt;code&gt;/12&lt;/code&gt; CIDR&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IPv6&lt;/strong&gt;: Sourced from &lt;code&gt;2606:4700:cf1:5000::/64&lt;/code&gt; (not configurable)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected connectors&lt;/strong&gt;: GRE, IPsec, CNI, WARP Connector, and WARP Client (Cloudflare Tunnel is not affected)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Configuring Cloudflare source IPs requires Unified Routing (beta) and the &lt;code&gt;Cloudflare One Networks Write&lt;/code&gt; permission.&lt;/p&gt;
&lt;p&gt;For configuration details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/manually/how-to/configure-cloudflare-source-ips/&quot;&gt;Configure Cloudflare source IPs&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 27 Jan 2026 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Cloudflare One, Access - Require Access protection for zones</title><link>https://developers.cloudflare.com/changelog/post/2026-01-22-deny-by-default-for-zones/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-22-deny-by-default-for-zones/</guid><description>&lt;p&gt;You can now require Cloudflare Access protection for all hostnames in your account. When enabled, traffic to any hostname that does not have a matching Access application is automatically blocked.&lt;/p&gt;
&lt;p&gt;This deny-by-default approach prevents accidental exposure of internal resources to the public Internet. If a developer deploys a new application or creates a DNS record without configuring an Access application, the traffic is blocked rather than exposed.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/require-cloudflare-access-protection.BAUmTYOs_ZxNecb.webp&quot; alt=&quot;Require Cloudflare Access protection in the dashboard&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;h4&gt;How it works&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Blocked by default&lt;/strong&gt;: Traffic to all hostnames in the account is blocked unless an Access application exists for that hostname.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Explicit access required&lt;/strong&gt;: To allow traffic, create an Access application with an Allow or Bypass policy.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hostname exemptions&lt;/strong&gt;: You can exempt specific hostnames from this requirement.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To turn on this feature, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/access-settings/require-access-protection/&quot;&gt;Require Access protection&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 22 Jan 2026 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Access</category></item><item><title>Access - New granular API token permissions for Cloudflare Access</title><link>https://developers.cloudflare.com/changelog/post/2026-01-22-granular-api-token-permissions/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-22-granular-api-token-permissions/</guid><description>&lt;p&gt;Three new API token permissions are available for Cloudflare Access, giving you finer-grained control when building automations and integrations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Access: Organizations Revoke&lt;/strong&gt; — Grants the ability to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/access-settings/session-management/#revoke-user-sessions&quot;&gt;revoke user sessions&lt;/a&gt; in a Zero Trust organization. Use this permission when you need a token that can terminate active sessions without broader write access to organization settings.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Access: Population Read&lt;/strong&gt; — Grants read access to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/users/scim/&quot;&gt;SCIM users and groups&lt;/a&gt; synced from an identity provider to Cloudflare Access. Use this permission for tokens that only need to read synced user and group data.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Access: Population Write&lt;/strong&gt; — Grants write access to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/users/scim/&quot;&gt;SCIM users and groups&lt;/a&gt; synced from an identity provider to Cloudflare Access. Use this permission for tokens that need to create or modify synced user and group data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These permissions are scoped at the account level and can be combined with existing Access permissions.&lt;/p&gt;
&lt;p&gt;For a full list of available permissions, refer to &lt;a href=&quot;https://developers.cloudflare.com/fundamentals/api/reference/permissions/&quot;&gt;API token permissions&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 22 Jan 2026 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Magic Transit, Cloudflare Network Firewall, Cloudflare WAN, Network Flow - Network Services navigation update</title><link>https://developers.cloudflare.com/changelog/post/2026-01-15-networking-navigation-update/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-15-networking-navigation-update/</guid><description>&lt;p&gt;The Network Services menu structure in Cloudflare&apos;s dashboard has been updated to reflect solutions and capabilities instead of product names. This will make it easier for you to find what you need and better reflects how our services work together.&lt;/p&gt;
&lt;p&gt;Your existing configurations will remain the same, and you will have access to all of the same features and functionality.&lt;/p&gt;
&lt;p&gt;The changes visible in your dashboard may vary based on the products you use. Overall, changes relate to &lt;a href=&quot;https://developers.cloudflare.com/magic-transit/&quot; target=&quot;_blank&quot;&gt;Magic Transit&lt;/a&gt;, &lt;a href=&quot;https://developers.cloudflare.com/magic-wan/&quot; target=&quot;_blank&quot;&gt;Magic WAN&lt;/a&gt;, and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-network-firewall/&quot; target=&quot;_blank&quot;&gt;Magic Firewall&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Summary of changes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A new &lt;strong&gt;Overview&lt;/strong&gt; page provides access to the most common tasks across Magic Transit and Magic WAN.&lt;/li&gt;
&lt;li&gt;Product names have been removed from top-level navigation.&lt;/li&gt;
&lt;li&gt;Magic Transit and Magic WAN configuration is now organized under &lt;strong&gt;Routes&lt;/strong&gt; and &lt;strong&gt;Connectors&lt;/strong&gt;. For example, you will find IP Prefixes under &lt;strong&gt;Routes&lt;/strong&gt;, and your GRE/IPsec Tunnels under &lt;strong&gt;Connectors.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Magic Firewall policies are now called &lt;strong&gt;Firewall Policies.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Magic WAN Connectors and Connector On-Ramps are now referenced in the dashboard as &lt;strong&gt;Appliances&lt;/strong&gt; and &lt;strong&gt;Appliance profiles.&lt;/strong&gt; They can be found under &lt;strong&gt;Connectors &gt; Appliances.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Network analytics, network health, and real-time analytics are now available under &lt;strong&gt;Insights.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Packet Captures are found under &lt;strong&gt;Insights &gt; Diagnostics.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;You can manage your Sites from &lt;strong&gt;Insights &gt; Network health.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;You can find Magic Network Monitoring under &lt;strong&gt;Insights &gt; Network flow&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you would like to provide feedback, complete &lt;a href=&quot;https://forms.gle/htWyjRsTjw1usdis5&quot; target=&quot;_blank&quot;&gt;this form&lt;/a&gt;. You can also find these details in the January 7, 2026 email titled &lt;strong&gt;[FYI] Upcoming Network Services Dashboard Navigation Update&lt;/strong&gt;.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/networking-overview-and-navigation.CeMgEFaZ_Z20HKl.webp&quot; alt=&quot;Networking Navigation&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;</description><pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate><product>Magic Transit</product><category>Magic Transit</category><category>Cloudflare Network Firewall</category><category>Cloudflare WAN</category><category>Network Flow</category></item><item><title>Risk Score - Support for CrowdStrike device scores in User Risk Scoring</title><link>https://developers.cloudflare.com/changelog/post/2026-1-15-crowdstrike-score/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-1-15-crowdstrike-score/</guid><description>&lt;p&gt;Cloudflare One has expanded its [User Risk Scoring] (/cloudflare-one/insights/risk-score/) capabilities by introducing two new behaviors for organizations using the [CrowdStrike integration] (/cloudflare-one/integrations/service-providers/crowdstrike/).&lt;/p&gt;
&lt;p&gt;Administrators can now automatically escalate the risk score of a user if their device matches specific CrowdStrike Zero Trust Assessment (ZTA) score ranges. This allows for more granular security policies that respond dynamically to the health of the endpoint.&lt;/p&gt;
&lt;p&gt;New risk behaviors
The following risk scoring behaviors are now available:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CrowdStrike low device score: Automatically increases a user&apos;s risk score when the connected device reports a &quot;Low&quot; score from CrowdStrike.&lt;/li&gt;
&lt;li&gt;CrowdStrike medium device score: Automatically increases a user&apos;s risk score when the connected device reports a &quot;Medium&quot; score from CrowdStrike.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These scores are derived from [CrowdStrike device posture attributes] (/cloudflare-one/integrations/service-providers/crowdstrike/#device-posture-attributes), including OS signals and sensor configurations.&lt;/p&gt;</description><pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate><product>Risk Score</product><category>Risk Score</category></item><item><title>Cloudflare Tunnel, Cloudflare Tunnel for SASE - Verify WARP Connector connectivity with a simple ping</title><link>https://developers.cloudflare.com/changelog/post/2026-01-15-warp-connector-ping-support/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-15-warp-connector-ping-support/</guid><description>&lt;p&gt;We have made it easier to validate connectivity when deploying &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/&quot;&gt;WARP Connector&lt;/a&gt; as part of your &lt;a href=&quot;https://developers.cloudflare.com/reference-architecture/architectures/sase/#connecting-networks&quot;&gt;software-defined private network&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;You can now &lt;code&gt;ping&lt;/code&gt; the WARP Connector host directly on its LAN IP address immediately after installation. This provides a fast, familiar way to confirm that the Connector is online and reachable within your network before testing access to downstream services.&lt;/p&gt;
&lt;p&gt;Starting with &lt;a href=&quot;https://developers.cloudflare.com/changelog/2026-01-13-warp-linux-ga/&quot;&gt;version 2025.10.186.0&lt;/a&gt;, WARP Connector responds to traffic addressed to its own LAN IP, giving you immediate visibility into Connector reachability.&lt;/p&gt;
&lt;p&gt;Learn more about deploying &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/&quot;&gt;WARP Connector&lt;/a&gt; and building private network connectivity with &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/&quot;&gt;Cloudflare One&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate><product>Cloudflare Tunnel</product><category>Cloudflare Tunnel</category><category>Cloudflare Tunnel for SASE</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.10.186.0)</title><link>https://developers.cloudflare.com/changelog/post/2026-01-13-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-13-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes, improvements, and new features. New features include the ability to manage WARP client connectivity for all devices in your fleet using an &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/external-disconnect/&quot;&gt;external signal&lt;/a&gt;, and a new WARP client device posture check for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/warp-client-checks/antivirus/&quot;&gt;Antivirus&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Added a new feature to manage WARP client connectivity for all devices using an &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/external-disconnect/&quot;&gt;external signal&lt;/a&gt;. This feature allows administrators to send a global signal from an on-premises HTTPS endpoint that force disconnects or reconnects all WARP clients in an account based on configuration set on the endpoint.&lt;/li&gt;
&lt;li&gt;Fixed an issue that caused occasional audio degradation and increased CPU usage on Windows by optimizing route configurations for large &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/split-tunnels/#domain-based-split-tunnels&quot;&gt;domain-based split tunnel rules&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/&quot;&gt;Local Domain Fallback&lt;/a&gt; feature has been fixed for devices running WARP client version 2025.4.929.0 and newer. Previously, these devices could experience failures with Local Domain Fallback unless a fallback server was explicitly configured. This configuration is no longer a requirement for the feature to function correctly.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; now supports transparent HTTP proxying in addition to CONNECT-based proxying.&lt;/li&gt;
&lt;li&gt;Fixed an issue where sending large messages to the daemon by Inter-Process Communication (IPC) could cause the daemon to fail and result in service interruptions.&lt;/li&gt;
&lt;li&gt;Added support for a new WARP client device posture check for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/warp-client-checks/antivirus/&quot;&gt;Antivirus&lt;/a&gt;. The check confirms the presence of an antivirus program on a Windows device with the option to check if the antivirus is up to date.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 13 Jan 2026 15:48:19 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.10.186.0)</title><link>https://developers.cloudflare.com/changelog/post/2026-01-13-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-13-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes, improvements, and new features, including the ability to manage WARP client connectivity for all devices in your fleet using an &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/external-disconnect/&quot;&gt;external signal&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/&quot;&gt;Local Domain Fallback&lt;/a&gt; feature has been fixed for devices running WARP client version 2025.4.929.0 and newer. Previously, these devices could experience failures with Local Domain Fallback unless a fallback server was explicitly configured. This configuration is no longer a requirement for the feature to function correctly.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; now supports transparent HTTP proxying in addition to CONNECT-based proxying.&lt;/li&gt;
&lt;li&gt;Added a new feature to manage WARP client connectivity for all devices using an &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/external-disconnect/&quot;&gt;external signal&lt;/a&gt;. This feature allows administrators to send a global signal from an on-premises HTTPS endpoint that force disconnects or reconnects all WARP clients in an account based on configuration set on the endpoint.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 13 Jan 2026 15:48:17 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Linux (version 2025.10.186.0)</title><link>https://developers.cloudflare.com/changelog/post/2026-01-13-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-13-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes, improvements, and new features, including the ability to manage WARP client connectivity for all devices in your fleet using an &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/external-disconnect/&quot;&gt;external signal&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;WARP client version 2025.8.779.0 introduced an updated public key for Linux packages. The public key must be updated if it was installed before September 12, 2025 to ensure the repository remains functional after December 4, 2025. Instructions to make this update are available at &lt;a href=&quot;https://pkg.cloudflareclient.com&quot;&gt;pkg.cloudflareclient.com&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/&quot;&gt;Local Domain Fallback&lt;/a&gt; feature has been fixed for devices running WARP client version 2025.4.929.0 and newer. Previously, these devices could experience failures with Local Domain Fallback unless a fallback server was explicitly configured. This configuration is no longer a requirement for the feature to function correctly.&lt;/li&gt;
&lt;li&gt;Linux &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/warp-client-checks/disk-encryption/&quot;&gt;disk encryption posture check&lt;/a&gt; now supports non-filesystem encryption types like &lt;code&gt;dm-crypt&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; now supports transparent HTTP proxying in addition to CONNECT-based proxying.&lt;/li&gt;
&lt;li&gt;Fixed an issue where the GUI becomes unresponsive when the &lt;strong&gt;Re-Authenticate in browser&lt;/strong&gt; button is clicked.&lt;/li&gt;
&lt;li&gt;Added a new feature to manage WARP client connectivity for all devices using an &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/external-disconnect/&quot;&gt;external signal&lt;/a&gt;. This feature allows administrators to send a global signal from an on-premises HTTPS endpoint that force disconnects or reconnects all WARP clients in an account based on configuration set on the endpoint.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 13 Jan 2026 01:53:14 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Email security - Enhanced visibility for post-delivery actions</title><link>https://developers.cloudflare.com/changelog/post/2026-01-12-enhanced-visibility-post-delivery-actions/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-12-enhanced-visibility-post-delivery-actions/</guid><description>&lt;p&gt;The Action Log now provides enriched data for post-delivery actions to improve troubleshooting. In addition to success confirmations, failed actions now display the targeted Destination folder and a specific failure reason within the Activity field.&lt;/p&gt;
&lt;aside&gt;&lt;p&gt;Note&lt;/p&gt;&lt;div&gt;&lt;p&gt;Error messages will vary depending on whether you are using Google Workspace or Microsoft 365.&lt;/p&gt;&lt;/div&gt;&lt;/aside&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/enhanced-visibility-post-delivery-actions.BNiyPtJU_GFx2V.webp&quot; alt=&quot;failure-log-example&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This update allows you to see the full lifecycle of a failed action. For instance, if an administrator tries to move an email that has already been deleted or moved manually, the log will now show the multiple retry attempts and the specific destination error.&lt;/p&gt;
&lt;p&gt;This applies to all Email Security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 12 Jan 2026 11:15:33 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Access - Cloudflare admin activity logs capture creation of DNS over HTTP (DoH) users</title><link>https://developers.cloudflare.com/changelog/post/2026-01-08-access-audit-log-for-doh-users/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-01-08-access-audit-log-for-doh-users/</guid><description>&lt;p&gt;Cloudflare &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/&quot;&gt;admin activity logs&lt;/a&gt; now capture each time a &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/dns/dns-over-https/&quot;&gt;DNS over HTTP (DoH) user&lt;/a&gt; is created.&lt;/p&gt;
&lt;p&gt;These logs can be viewed from the &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Cloudflare One dashboard&lt;/a&gt;, pulled via the &lt;a href=&quot;https://developers.cloudflare.com/api/&quot;&gt;Cloudflare API&lt;/a&gt;, and exported through &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/logpush/&quot;&gt;Logpush&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Cloudflare One, Cloudflare WAN - Breakout traffic visibility via NetFlow</title><link>https://developers.cloudflare.com/changelog/post/2025-12-31-connector-breakout-traffic-netflow/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-12-31-connector-breakout-traffic-netflow/</guid><description>&lt;p&gt;Magic WAN Connector now exports NetFlow data for breakout traffic to Magic Network Monitoring (MNM), providing visibility into traffic that bypasses Cloudflare&apos;s security filtering.&lt;/p&gt;
&lt;p&gt;This feature allows you to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Monitor breakout traffic statistics in the Cloudflare dashboard.&lt;/li&gt;
&lt;li&gt;View traffic patterns for applications configured to bypass Cloudflare.&lt;/li&gt;
&lt;li&gt;Maintain visibility across all traffic passing through your Magic WAN Connector.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/analytics/netflow-analytics/&quot;&gt;NetFlow statistics&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 31 Dec 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Gateway, Cloudflare One - Shadow IT - domain level SaaS analytics</title><link>https://developers.cloudflare.com/changelog/post/2025-12-17-shadow-it-domain-analytics/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-12-17-shadow-it-domain-analytics/</guid><description>&lt;p&gt;Zero Trust has again upgraded its &lt;strong&gt;Shadow IT analytics&lt;/strong&gt;, providing you with unprecedented visibility into your organizations use of SaaS tools. With this dashboard, you can review who is using an application and volumes of data transfer to the application.&lt;/p&gt;
&lt;p&gt;With this update, you can review data transfer metrics at the domain level, rather than just the application level, providing more granular insight into your data transfer patterns.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/shadow-it-domain.DoZnGAtf_Z1mHw4r.webp&quot; alt=&quot;New Domain Level Metrics&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;These metrics can be filtered by all available filters on the dashboard, including user, application, or content category.&lt;/p&gt;
&lt;p&gt;Both the analytics and policies are accessible in the Cloudflare &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Zero Trust dashboard&lt;/a&gt;, empowering organizations with better visibility and control.&lt;/p&gt;</description><pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category><category>Cloudflare One</category></item><item><title>Cloudflare One - New duplicate action for supported Cloudflare One resources</title><link>https://developers.cloudflare.com/changelog/post/2025-12-16-new-duplicate-action-for-supported-cloudflare-one-resources/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-12-16-new-duplicate-action-for-supported-cloudflare-one-resources/</guid><description>&lt;p&gt;You can now duplicate specific Cloudflare One resources with a single click from the dashboard.&lt;/p&gt;
&lt;p&gt;Initially supported resources:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Access Applications&lt;/li&gt;
&lt;li&gt;Access Policies&lt;/li&gt;
&lt;li&gt;Gateway Policies&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To try this out, simply click on the overflow menu (⋮) from the resource table and click &lt;i&gt;Duplicate&lt;/i&gt;. We will continue to add the Duplicate action for resources throughout 2026.&lt;/p&gt;</description><pubDate>Tue, 16 Dec 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.10.118.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-12-09-warp-windows-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-12-09-warp-windows-beta/</guid><description>&lt;p&gt;A new Beta release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/&quot;&gt;Local Domain Fallback&lt;/a&gt; feature has been fixed for devices running WARP client version 2025.4.929.0 and newer. Previously, these devices could experience failures with Local Domain Fallback unless a fallback server was explicitly configured. This configuration is no longer a requirement for the feature to function correctly.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; now supports transparent HTTP proxying in addition to CONNECT-based proxying.&lt;/li&gt;
&lt;li&gt;Fixed an issue where sending large messages to the WARP daemon by Inter-Process Communication (IPC) could cause WARP to crash and result in service interruptions.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 09 Dec 2025 23:03:10 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.10.118.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-12-09-warp-macos-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-12-09-warp-macos-beta/</guid><description>&lt;p&gt;A new Beta release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/&quot;&gt;Local Domain Fallback&lt;/a&gt; feature has been fixed for devices running WARP client version 2025.4.929.0 and newer. Previously, these devices could experience failures with Local Domain Fallback unless a fallback server was explicitly configured. This configuration is no longer a requirement for the feature to function correctly.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; now supports transparent HTTP proxying in addition to CONNECT-based proxying.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 09 Dec 2025 23:02:28 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Email security - Reclassifications to Submissions</title><link>https://developers.cloudflare.com/changelog/post/2025-12-03-submission-terminology-update/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-12-03-submission-terminology-update/</guid><description>&lt;p&gt;We have updated the terminology “Reclassify” and “Reclassifications” to “Submit” and “Submissions” respectively. This update more accurately reflects the outcome of providing these items to Cloudflare.&lt;/p&gt;
&lt;p&gt;Submissions are leveraged to tune future variants of campaigns. To respect data sanctity, providing a submission does not change the original disposition of the emails submitted.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/reclassification-submission.B6nL5Hw7_Z2qliyJ.webp&quot; alt=&quot;nav_example&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This applies to all Email Security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Wed, 03 Dec 2025 21:11:33 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Email security - Adjustment to Final Disposition Column</title><link>https://developers.cloudflare.com/changelog/post/2025-11-18-temporary-adjustment-to-final-disposition-column/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-18-temporary-adjustment-to-final-disposition-column/</guid><description>&lt;h4&gt;Adjustment to Final Disposition column&lt;/h4&gt;
&lt;h4&gt;The &lt;strong&gt;Final Disposition&lt;/strong&gt; column in &lt;strong&gt;Submissions&lt;/strong&gt; &gt; &lt;strong&gt;Team Submissions&lt;/strong&gt; tab is changing for non-Phishguard customers.&lt;/h4&gt;
&lt;h4&gt;What&apos;s Changing&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Column will be called &lt;strong&gt;Status&lt;/strong&gt; instead of &lt;strong&gt;Final Disposition&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Column status values will now be: &lt;strong&gt;Submitted&lt;/strong&gt;, &lt;strong&gt;Accepted&lt;/strong&gt; or &lt;strong&gt;Rejected&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Next Steps&lt;/h4&gt;
&lt;p&gt;We will listen carefully to your feedback and continue to find comprehensive ways to communicate updates on your submissions. Your submissions will continue to be addressed at an even greater rate than before, fuelling faster and more accurate email security improvement.&lt;/p&gt;</description><pubDate>Tue, 18 Nov 2025 00:00:00 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Cloudflare One - New Cloudflare One Navigation and Product Experience</title><link>https://developers.cloudflare.com/changelog/post/new-cloudflare-one-navigation-and-product-experience/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/new-cloudflare-one-navigation-and-product-experience/</guid><description>&lt;p&gt;The Zero Trust dashboard and navigation is receiving significant and exciting updates. The dashboard is being restructured to better support common tasks and workflows, and various pages have been moved and consolidated.&lt;/p&gt;
&lt;p&gt;There is a new guided experience on login detailing the changes, and you can use the Zero Trust dashboard search to find product pages by both their new and old names, as well as your created resources. To replay the guided experience, you can find it in Overview &gt; Get Started.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/cf1-dash-changes.Uk_Y-2V-_ZUKoJR.webp&quot; alt=&quot;Cloudflare One Dash Changes&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;Notable changes&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Product names have been removed from many top-level navigation items to help bring clarity to what they help you accomplish. For example, you can find Gateway policies under ‘Traffic policies&apos; and CASB findings under ‘Cloud &amp;#x26; SaaS findings.&apos;&lt;/li&gt;
&lt;li&gt;You can view all analytics, logs, and real-time monitoring tools from ‘Insights.&apos;&lt;/li&gt;
&lt;li&gt;‘Networks&apos; better maps the ways that your corporate network interacts with Cloudflare. Some pages like Tunnels, are now a tab rather than a full page as part of these changes. You can find them at Networks &gt; Connectors.&lt;/li&gt;
&lt;li&gt;Settings are now located closer to the tools and resources they impact. For example, this means you&apos;ll find your WARP configurations at Team &amp;#x26; Resources &gt; Devices.&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/new-cf1-navigation.B7-E-9CV_18BSsx.webp&quot; alt=&quot;New Cloudflare One Navigation&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;No changes to our API endpoint structure or to any backend services have been made as part of this effort.&lt;/p&gt;</description><pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category></item><item><title>Access - Generate Cloudflare Access SSH certificate authority (CA) directly from the Cloudflare dashboard</title><link>https://developers.cloudflare.com/changelog/post/2025-11-14-ssh-ca-enhancements/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-14-ssh-ca-enhancements/</guid><description>&lt;p&gt;SSH with &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/ssh-infrastructure-access/&quot;&gt;Cloudflare Access for Infrastructure&lt;/a&gt; allows you to use short-lived SSH certificates to eliminate SSH key management and reduce security risks associated with lost or stolen keys.&lt;/p&gt;
&lt;p&gt;Previously, users had to generate this certificate by using the &lt;a href=&quot;https://developers.cloudflare.com/api/&quot; target=&quot;_blank&quot;&gt;Cloudflare API&lt;/a&gt; directly. With this update, you can now create and manage this certificate in the &lt;a href=&quot;https://one.dash.cloudflare.com&quot; target=&quot;_blank&quot;&gt;Cloudflare One dashboard&lt;/a&gt; from the &lt;strong&gt;Access controls&lt;/strong&gt; &gt; &lt;strong&gt;Service credentials&lt;/strong&gt; page.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/SSH-CA-generation.DYa9RnX1_ZKuDAo.webp&quot; alt=&quot;Navigate to Access controls and then Service credentials to see where you can generate an SSH CA&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;For more details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/ssh-infrastructure-access/#generate-a-cloudflare-ssh-ca&quot;&gt;Generate a Cloudflare SSH CA&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 14 Nov 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>CASB - New SaaS Security weekly digests with API CASB</title><link>https://developers.cloudflare.com/changelog/post/2025-11-14-casb-digest/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-14-casb-digest/</guid><description>&lt;p&gt;You can now stay on top of your SaaS security posture with the new &lt;strong&gt;CASB Weekly Digest&lt;/strong&gt; notification. This opt-in email digest is delivered to your inbox every Monday morning and provides a high-level summary of your organization&apos;s Cloudflare API CASB findings from the previous week.&lt;/p&gt;
&lt;p&gt;This allows security teams and IT administrators to get proactive, at-a-glance visibility into new risks and integration health without having to log in to the dashboard.&lt;/p&gt;
&lt;p&gt;To opt in, navigate to &lt;strong&gt;Manage Account&lt;/strong&gt; &gt; &lt;strong&gt;Notifications&lt;/strong&gt; in the Cloudflare dashboard to configure the &lt;strong&gt;CASB Weekly Digest&lt;/strong&gt; alert type.&lt;/p&gt;
&lt;h4&gt;Key capabilities&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;At-a-glance summary&lt;/strong&gt; — Review new high/critical findings, most frequent finding types, and new content exposures from the past 7 days.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration health&lt;/strong&gt; — Instantly see the status of all your connected SaaS integrations (Healthy, Unhealthy, or Paused) to spot API connection issues.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Proactive alerting&lt;/strong&gt; — The digest is sent automatically to all subscribed users every Monday morning.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Easy to configure&lt;/strong&gt; — Users can opt in by enabling the notification in the Cloudflare dashboard under &lt;strong&gt;Manage Account&lt;/strong&gt; &gt; &lt;strong&gt;Notifications&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Learn more&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Configure &lt;a href=&quot;https://developers.cloudflare.com/notifications/&quot;&gt;notification preferences&lt;/a&gt; in Cloudflare.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The CASB Weekly Digest notification is available to all Cloudflare users today.&lt;/p&gt;</description><pubDate>Fri, 14 Nov 2025 00:00:00 GMT</pubDate><product>CASB</product><category>CASB</category></item><item><title>Digital Experience Monitoring - DEX Logpush jobs</title><link>https://developers.cloudflare.com/changelog/post/2025-11-12-dex-logpush-jobsmdx/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-12-dex-logpush-jobsmdx/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/dex/&quot;&gt;Digital Experience Monitoring (DEX)&lt;/a&gt; provides visibility into WARP device metrics, connectivity, and network performance across your Cloudflare SASE deployment.&lt;/p&gt;
&lt;p&gt;We&apos;ve released four new WARP and DEX device data sets that can be exported via &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/logpush/&quot;&gt;Cloudflare Logpush&lt;/a&gt;. These Logpush data sets can be exported to R2, a cloud bucket, or a SIEM to build a customized logging and analytics experience.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/logpush-job/datasets/account/dex_application_tests/&quot;&gt;DEX Application Tests&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/logpush-job/datasets/account/dex_device_state_events/&quot;&gt;DEX Device State Events&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/logpush-job/datasets/account/warp_config_changes/&quot;&gt;WARP Config Changes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/logpush-job/datasets/account/warp_toggle_changes/&quot;&gt;WARP Toggle Changes&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;To create a new DEX or WARP Logpush job, customers can go to the account level of the Cloudflare dashboard &gt; Analytics &amp;#x26; Logs &gt; Logpush to get started.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/dex_logpush_datasets.CtCk36pX_Z1tuyHu.webp&quot; alt=&quot;DEX logpush job creation dashboard&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;</description><pubDate>Wed, 12 Nov 2025 00:00:00 GMT</pubDate><product>Digital Experience Monitoring</product><category>Digital Experience Monitoring</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.9.558.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-11-11-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-11-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes, improvements, and new features including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/path-mtu-discovery/#enable-path-mtu-discovery&quot;&gt;Path Maximum Transmission Unit Discovery (PMTUD)&lt;/a&gt;. When PMTUD is enabled, the client will dynamically adjust packet sizing to optimize connection performance. There is also a new connection status message in the GUI to inform users that the local network connection may be unstable. This will make it easier to diagnose connectivity issues.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an inconsistency with &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#disconnect-warp-on-all-devices&quot;&gt;Global WARP override&lt;/a&gt; settings in multi-user environments when switching between users.&lt;/li&gt;
&lt;li&gt;The GUI now displays the health of the tunnel and DNS connections by showing a connection status message when the network may be unstable. This will make it easier to diagnose connectivity issues.&lt;/li&gt;
&lt;li&gt;Fixed an issue where deleting a registration was erroneously reported as having failed.&lt;/li&gt;
&lt;li&gt;Path Maximum Transmission Unit Discovery (PMTUD) may now be used to discover the effective MTU of the connection. This allows the WARP client to improve connectivity optimized for each network. PMTUD is disabled by default. To enable it, refer to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/path-mtu-discovery/#enable-path-mtu-discovery&quot;&gt;PMTUD documentation&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Improvements for the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/warp-client-checks/os-version/&quot;&gt;OS version&lt;/a&gt; WARP client check. Windows Updated Build Revision (UBR) numbers can now be checked by the client to ensure devices have required security patches and features installed.&lt;/li&gt;
&lt;li&gt;The WARP client now supports Windows 11 ARM-based machines. For information on known limitations, refer to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/troubleshooting/known-limitations/#cloudflare-one-client-disconnected-on-windows-arm&quot;&gt;Known limitations page&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 11 Nov 2025 17:28:35 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.9.558.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-11-11-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-11-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes, improvements, and new features including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/path-mtu-discovery/#enable-path-mtu-discovery&quot;&gt;Path Maximum Transmission Unit Discovery (PMTUD)&lt;/a&gt;. When PMTUD is enabled, the client will dynamically adjust packet sizing to optimize connection performance. There is also a new connection status message in the GUI to inform users that the local network connection may be unstable. This will make it easier to diagnose connectivity issues.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The GUI now displays the health of the tunnel and DNS connections by showing a connection status message when the network may be unstable. This will make it easier to diagnose connectivity issues.&lt;/li&gt;
&lt;li&gt;Fixed an issue where deleting a registration was erroneously reported as having failed.&lt;/li&gt;
&lt;li&gt;Path Maximum Transmission Unit Discovery (PMTUD) may now be used to discover the effective MTU of the connection. This allows the WARP client to improve connectivity optimized for each network. PMTUD is disabled by default. To enable it, refer to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/path-mtu-discovery/#enable-path-mtu-discovery&quot;&gt;PMTUD documentation&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 11 Nov 2025 17:28:35 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Linux (version 2025.9.558.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-11-11-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-11-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes, improvements, and new features including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/path-mtu-discovery/#enable-path-mtu-discovery&quot;&gt;Path Maximum Transmission Unit Discovery (PMTUD)&lt;/a&gt;. When PMTUD is enabled, the client will dynamically adjust packet sizing to optimize connection performance. There is also a new connection status message in the GUI to inform users that the local network connection may be unstable. This will make it easier to diagnose connectivity issues.&lt;/p&gt;
&lt;p&gt;WARP client version 2025.8.779.0 introduced an updated public key for Linux packages. The public key must be updated if it was installed before September 12, 2025 to ensure the repository remains functional after December 4, 2025. Instructions to make this update are available at &lt;a href=&quot;https://pkg.cloudflareclient.com/&quot;&gt;pkg.cloudflareclient.com&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The GUI now displays the health of the tunnel and DNS connections by showing a connection status message when the network may be unstable. This will make it easier to diagnose connectivity issues.&lt;/li&gt;
&lt;li&gt;Fixed an issue where deleting a registration was erroneously reported as having failed.&lt;/li&gt;
&lt;li&gt;Path Maximum Transmission Unit Discovery (PMTUD) may now be used to discover the effective MTU of the connection. This allows the WARP client to improve connectivity optimized for each network. PMTUD is disabled by default. To enable it, refer to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/path-mtu-discovery/#enable-path-mtu-discovery&quot;&gt;PMTUD documentation&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 11 Nov 2025 15:06:09 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare Tunnel, Cloudflare Tunnel for SASE - cloudflared proxy-dns command will be removed starting February 2, 2026</title><link>https://developers.cloudflare.com/changelog/post/2025-11-11-cloudflared-proxy-dns/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-11-cloudflared-proxy-dns/</guid><description>&lt;p&gt;Starting February 2, 2026, the &lt;code&gt;cloudflared proxy-dns&lt;/code&gt; command will be removed from all new &lt;code&gt;cloudflared&lt;/code&gt; &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/downloads/&quot;&gt;releases&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This change is being made to enhance security and address a potential vulnerability in an underlying DNS library. This vulnerability is specific to the &lt;code&gt;proxy-dns&lt;/code&gt; command and does not affect any other &lt;code&gt;cloudflared&lt;/code&gt; features, such as the core &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/&quot;&gt;Cloudflare Tunnel&lt;/a&gt; service.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;proxy-dns&lt;/code&gt; command, which runs a client-side &lt;a href=&quot;https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/&quot;&gt;DNS-over-HTTPS (DoH)&lt;/a&gt; proxy, has been an officially undocumented feature for several years. This functionality is fully and securely supported by our actively developed products.&lt;/p&gt;
&lt;p&gt;Versions of &lt;code&gt;cloudflared&lt;/code&gt; released before this date will not be affected and will continue to operate. However, note that our &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/downloads/#deprecated-releases&quot;&gt;official support policy&lt;/a&gt; for any &lt;code&gt;cloudflared&lt;/code&gt; release is one year from its release date.&lt;/p&gt;
&lt;h4&gt;Migration paths&lt;/h4&gt;
&lt;p&gt;We strongly advise users of this undocumented feature to migrate to one of the following officially supported solutions before February 2, 2026, to continue benefiting from secure &lt;a href=&quot;https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/&quot;&gt;DNS-over-HTTPS&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;End-user devices&lt;/h4&gt;
&lt;p&gt;The preferred method for enabling DNS-over-HTTPS on user devices is the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/&quot;&gt;Cloudflare WARP client&lt;/a&gt;. The WARP client automatically secures and proxies all DNS traffic from your device, integrating it with your organization&apos;s &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/&quot;&gt;Zero Trust policies&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/&quot;&gt;posture checks&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;Servers, routers, and IoT devices&lt;/h4&gt;
&lt;p&gt;For scenarios where installing a client on every device is not possible (such as servers, routers, or IoT devices), we recommend using the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/&quot;&gt;WARP Connector&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Instead of running &lt;code&gt;cloudflared proxy-dns&lt;/code&gt; on a machine, you can install the WARP Connector on a single Linux host within your private network. This connector will act as a gateway, securely routing all DNS and network traffic from your &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/site-to-internet/&quot;&gt;entire subnet&lt;/a&gt; to Cloudflare for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/&quot;&gt;filtering and logging&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 11 Nov 2025 00:00:00 GMT</pubDate><product>Cloudflare Tunnel</product><category>Cloudflare Tunnel</category><category>Cloudflare Tunnel for SASE</category></item><item><title>Cloudflare One, Cloudflare WAN - Automatic Return Routing (Beta)</title><link>https://developers.cloudflare.com/changelog/post/2025-11-06-automatic-return-routing-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-06-automatic-return-routing-beta/</guid><description>&lt;p&gt;Magic WAN now supports Automatic Return Routing (ARR), allowing customers to configure Magic on-ramps (IPsec/GRE/CNI) to learn the return path for traffic flows without requiring static routes.&lt;/p&gt;
&lt;p&gt;Key benefits:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Route-less mode&lt;/strong&gt;: Static or dynamic routes are optional when using ARR.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Overlapping IP space support&lt;/strong&gt;: Traffic originating from customer sites can use overlapping private IP ranges.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Symmetric routing&lt;/strong&gt;: Return traffic is guaranteed to use the same connection as the original on-ramp.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This feature is currently in beta and requires the new Unified Routing mode (beta).&lt;/p&gt;
&lt;p&gt;For configuration details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/manually/how-to/configure-routes/#configure-automatic-return-routing-beta&quot;&gt;Configure Automatic Return Routing&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 06 Nov 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Cloudflare One, Cloudflare WAN - Designate WAN link for breakout traffic</title><link>https://developers.cloudflare.com/changelog/post/2025-11-06-connector-designate-wan-link-breakout/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-06-connector-designate-wan-link-breakout/</guid><description>&lt;p&gt;Magic WAN Connector now allows you to designate a specific WAN port for breakout traffic, giving you deterministic control over the egress path for latency-sensitive applications.&lt;/p&gt;
&lt;p&gt;With this feature, you can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Pin breakout traffic for specific applications to a preferred WAN port.&lt;/li&gt;
&lt;li&gt;Ensure critical traffic (such as Zoom or Teams) always uses your fastest or most reliable connection.&lt;/li&gt;
&lt;li&gt;Benefit from automatic failover to standard WAN port priority if the preferred port goes down.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This is useful for organizations with multiple ISP uplinks who need predictable egress behavior for performance-sensitive traffic.&lt;/p&gt;
&lt;p&gt;For configuration details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/network-options/application-based-policies/breakout-traffic/#designate-wan-ports-for-breakout-apps&quot;&gt;Designate WAN ports for breakout apps&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 06 Nov 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Gateway - Applications to be remapped to the new categories</title><link>https://developers.cloudflare.com/changelog/post/2025-11-06-applications-recategorised-plan/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-06-applications-recategorised-plan/</guid><description>&lt;p&gt;We have previously added new application categories to better reflect their content and improve HTTP traffic management: refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/gateway/#2025-10-28&quot;&gt;Changelog&lt;/a&gt;.
While the new categories are live now, we want to ensure you have ample time to review and adjust any existing rules you have configured against old categories.
The remapping of existing applications into these new categories will be completed by January 30, 2026.
This timeline allows you a dedicated period to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Review the new category structure.&lt;/li&gt;
&lt;li&gt;Identify any policies you have that target the older categories.&lt;/li&gt;
&lt;li&gt;Adjust your rules to reference the new, more precise categories before the old mappings change.
Once the applications have been fully remapped by January 30, 2026, you might observe some changes in the traffic being mitigated or allowed by your existing policies. We encourage you to use the intervening time to prepare for a smooth transition.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Applications being remappedd&lt;/strong&gt;&lt;/p&gt;

















































































































































































































































































































&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Application Name&lt;/th&gt;&lt;th&gt;Existing Category&lt;/th&gt;&lt;th&gt;New Category&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Google Photos&lt;/td&gt;&lt;td&gt;File Sharing&lt;/td&gt;&lt;td&gt;Photography &amp;#x26; Graphic Design&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Flickr&lt;/td&gt;&lt;td&gt;File Sharing&lt;/td&gt;&lt;td&gt;Photography &amp;#x26; Graphic Design&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;ADP&lt;/td&gt;&lt;td&gt;Human Resources&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Greenhouse&lt;/td&gt;&lt;td&gt;Human Resources&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;myCigna&lt;/td&gt;&lt;td&gt;Human Resources&lt;/td&gt;&lt;td&gt;Health &amp;#x26; Fitness&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;UnitedHealthcare&lt;/td&gt;&lt;td&gt;Human Resources&lt;/td&gt;&lt;td&gt;Health &amp;#x26; Fitness&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;ZipRecruiter&lt;/td&gt;&lt;td&gt;Human Resources&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Amazon Business&lt;/td&gt;&lt;td&gt;Human Resources&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Jobcenter&lt;/td&gt;&lt;td&gt;Human Resources&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Jobsuche&lt;/td&gt;&lt;td&gt;Human Resources&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Zenjob&lt;/td&gt;&lt;td&gt;Human Resources&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;DocuSign&lt;/td&gt;&lt;td&gt;Legal&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Postident&lt;/td&gt;&lt;td&gt;Legal&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Adobe Creative Cloud&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Photography &amp;#x26; Graphic Design&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Airtable&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Development&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Autodesk Fusion360&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;IT Management&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Coursera&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Education&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Microsoft Power BI&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Tableau&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Duolingo&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Education&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Adobe Reader&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;AnpiReport&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Travel&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;ビズリーチ&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;doda (デューダ)&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;求人ボックス&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;マイナビ2026&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Power Apps&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;RECRUIT AGENT&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;シフトボード&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;スタンバイ&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Doctolib&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Health &amp;#x26; Fitness&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Miro&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Photography &amp;#x26; Graphic Design&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;MyFitnessPal&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Health &amp;#x26; Fitness&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Sentry Mobile&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Travel&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Slido&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Photography &amp;#x26; Graphic Design&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Arista Networks&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;IT Management&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Atlassian&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;CoderPad&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;eAgreements&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Vmware&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;IT Management&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Vmware Vcenter&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;IT Management&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;AWS Skill Builder&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Education&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Microsoft Office 365 (GCC)&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Microsoft Exchange Online (GCC)&lt;/td&gt;&lt;td&gt;Productivity&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Canva&lt;/td&gt;&lt;td&gt;Sales &amp;#x26; Marketing&lt;/td&gt;&lt;td&gt;Photography &amp;#x26; Graphic Design&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Instacart&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Food &amp;#x26; Drink&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Wawa&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Food &amp;#x26; Drink&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;McDonald&apos;s&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Food &amp;#x26; Drink&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Vrbo&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Travel&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;American Airlines&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Travel&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Booking.com&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Travel&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Ticketmaster&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Entertainment &amp;#x26; Events&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Airbnb&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Travel&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;DoorDash&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Food &amp;#x26; Drink&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Expedia&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Travel&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;EasyPark&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Travel&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;UEFA Tickets&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Entertainment &amp;#x26; Events&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;DHL Express&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;UPS&lt;/td&gt;&lt;td&gt;Shopping&lt;/td&gt;&lt;td&gt;Business&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;
&lt;p&gt;For more information on creating HTTP policies, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/application-app-types/&quot;&gt;Applications and app types&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 06 Nov 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Access - Access private hostname applications support all ports/protocols</title><link>https://developers.cloudflare.com/changelog/post/2025-10-28-access-application-support-for-all-ports-and-protocols/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-28-access-application-support-for-all-ports-and-protocols/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/non-http/self-hosted-private-app/&quot;&gt;Cloudflare Access for private hostname applications&lt;/a&gt; can now secure traffic on all ports and protocols.&lt;/p&gt;
&lt;p&gt;Previously, applying Zero Trust policies to private applications required the application to use HTTPS on port &lt;code&gt;443&lt;/code&gt; and support Server Name Indicator (SNI).&lt;/p&gt;
&lt;p&gt;This update removes that limitation. As long as the application is reachable via a Cloudflare off-ramp, you can now enforce your critical security controls — like single sign-on (SSO), MFA, device posture, and variable session lengths — to any private application. This allows you to extend Zero Trust security to services like SSH, RDP, internal databases, and other non-HTTPS applications.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/internal_private_app_any_port.DNXnEy0u_2rybRJ.webp&quot; alt=&quot;Example private application on non-443 port&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;For example, you can now create a self-hosted application in Access for &lt;code&gt;ssh.testapp.local&lt;/code&gt; running on port &lt;code&gt;22&lt;/code&gt;. You can then build a policy that only allows engineers in your organization to connect after they pass an SSO/MFA check and are using a corporate device.&lt;/p&gt;
&lt;p&gt;This feature is generally available across all plans.&lt;/p&gt;</description><pubDate>Tue, 28 Oct 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>CASB - CASB introduces new granular roles</title><link>https://developers.cloudflare.com/changelog/post/2025-10-28-casb-roles/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-28-casb-roles/</guid><description>&lt;p&gt;Cloudflare CASB (Cloud Access Security Broker) now supports two new granular roles to provide more precise access control for your security teams:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cloudflare CASB Read:&lt;/strong&gt; Provides read-only access to view CASB findings and dashboards. This role is ideal for security analysts, compliance auditors, or team members who need visibility without modification rights.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloudflare CASB:&lt;/strong&gt; Provides full administrative access to configure and manage all aspects of the CASB product.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These new roles help you better enforce the principle of least privilege. You can now grant specific members access to CASB security findings without assigning them broader permissions, such as the &lt;strong&gt;Super Administrator&lt;/strong&gt; or &lt;strong&gt;Administrator&lt;/strong&gt; roles.&lt;/p&gt;
&lt;p&gt;To enable &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/dlp-profiles/&quot;&gt;Data Loss Prevention (DLP)&lt;/a&gt;, scans in CASB, account members will need the &lt;strong&gt;Cloudflare Zero Trust&lt;/strong&gt; role.&lt;/p&gt;
&lt;p&gt;You can find these new roles when inviting members or creating API tokens in the Cloudflare dashboard under &lt;strong&gt;Manage Account&lt;/strong&gt; &gt; &lt;strong&gt;Members&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To learn more about managing roles and permissions, refer to the &lt;a href=&quot;https://developers.cloudflare.com/fundamentals/manage-members/roles/&quot;&gt;Manage account members and roles documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 28 Oct 2025 00:00:00 GMT</pubDate><product>CASB</product><category>CASB</category></item><item><title>Gateway - New Application Categories added for HTTP Traffic Management</title><link>https://developers.cloudflare.com/changelog/post/gateway-application-categories-added/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/gateway-application-categories-added/</guid><description>&lt;p&gt;To give you precision and flexibility while creating policies to block unwanted traffic, we are introducing new, more granular application categories in the Gateway product.&lt;/p&gt;
&lt;p&gt;We have added the following categories to provide more precise organization and allow for finer-grained policy creation, designed around how users interact with different types of applications:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Business&lt;/li&gt;
&lt;li&gt;Education&lt;/li&gt;
&lt;li&gt;Entertainment &amp;#x26; Events&lt;/li&gt;
&lt;li&gt;Food &amp;#x26; Drink&lt;/li&gt;
&lt;li&gt;Health &amp;#x26; Fitness&lt;/li&gt;
&lt;li&gt;Lifestyle&lt;/li&gt;
&lt;li&gt;Navigation&lt;/li&gt;
&lt;li&gt;Photography &amp;#x26; Graphic Design&lt;/li&gt;
&lt;li&gt;Travel&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The new categories are live now, but we are providing a transition period for existing applications to be fully remapped to these new categories.&lt;/p&gt;
&lt;p&gt;The full remapping will be completed by January 30, 2026.&lt;/p&gt;
&lt;p&gt;We encourage you to use this time to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Review the new category structure.&lt;/li&gt;
&lt;li&gt;Identify and adjust any existing HTTP policies that reference older categories to ensure a smooth transition.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more information on creating HTTP policies, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/application-app-types/&quot;&gt;Applications and app types&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 28 Oct 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Gateway - Schedule DNS policies from the UI</title><link>https://developers.cloudflare.com/changelog/post/2025-10-20-schedule-dns-policies-from-the-ui/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-20-schedule-dns-policies-from-the-ui/</guid><description>&lt;p&gt;Admins can now create &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/dns-policies/timed-policies/&quot;&gt;scheduled DNS policies&lt;/a&gt; directly from the Zero Trust dashboard, without using the API. You can configure policies to be active during specific, recurring times, such as blocking social media during business hours or gaming sites on school nights.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Preset Schedules&lt;/strong&gt;: Use built-in templates for common scenarios like Business Hours, School Days, Weekends, and more.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Custom Schedules&lt;/strong&gt;: Define your own schedule with specific days and up to three non-overlapping time ranges per day.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Timezone Control&lt;/strong&gt;: Choose to enforce a schedule in a specific timezone (for example, US Eastern) or based on the local time of each user.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Combined with Duration&lt;/strong&gt;: Policies can have both a schedule and a duration. If both are set, the duration&apos;s expiration takes precedence.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can see the flow in the demo GIF:&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/gateway-dns-scheduled-policies-ui.Cf4l1OTE_Z9szVM.webp&quot; alt=&quot;Schedule DNS policies demo&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This update makes time-based DNS policies accessible to all Gateway customers, removing the technical barrier of the API.&lt;/p&gt;</description><pubDate>Mon, 20 Oct 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Email security - On-Demand Security Report</title><link>https://developers.cloudflare.com/changelog/post/2025-10-16-on-demand-security-report/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-16-on-demand-security-report/</guid><description>&lt;p&gt;You can now generate on-demand security reports directly from the Cloudflare dashboard. This new feature provides a comprehensive overview of your email security posture, making it easier than ever to demonstrate the value of Cloudflare’s Email security to executives and other decision makers.&lt;/p&gt;
&lt;p&gt;These reports offer several key benefits:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Executive Summary:&lt;/strong&gt; Quickly view the performance of Email security with a high-level executive summary.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Actionable Insights:&lt;/strong&gt; Dive deep into trend data, breakdowns of threat types, and analysis of top targets to identify and address vulnerabilities.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configuration Transparency:&lt;/strong&gt; Gain a clear view of your policy, submission, and domain configurations to ensure optimal setup.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Account Takeover Risks:&lt;/strong&gt; Get a snapshot of your M365 risky users (requires a Microsoft Entra ID P2 license and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/microsoft-365/&quot; target=&quot;_blank&quot;&gt;M365 SaaS integration&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/report.CbkPa8Jt_Z1xMpIx.webp&quot; alt=&quot;Report&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This feature is available across the following Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Fri, 17 Oct 2025 22:14:43 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.9.173.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-10-16-warp-windows-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-16-warp-windows-beta/</guid><description>&lt;p&gt;A new Beta release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes, improvements, and new features including Path Maximum Transmission Unit Discovery (PMTUD). With PMTUD enabled, the client will dynamically adjust packet sizing to optimize connection performance. There is also a new connection status message in the GUI to inform users that the local network connection may be unstable. This will make it easier to debug connectivity issues.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improvements for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/windows-multiuser/&quot;&gt;Windows multi-user&lt;/a&gt; to maintain the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#disconnect-warp-on-all-devices&quot;&gt;Global WARP override&lt;/a&gt; state when switching between users.&lt;/li&gt;
&lt;li&gt;The GUI now displays the health of the tunnel and DNS connections by showing a connection status message when the network may be unstable. This will make it easier to debug connectivity issues.&lt;/li&gt;
&lt;li&gt;Deleting registrations no longer returns an error when succeeding.&lt;/li&gt;
&lt;li&gt;Path Maximum Transmission Unit Discovery (PMTUD) is now used to discover the effective MTU of the connection. This allows the client to improve connection performance optimized for the current network.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 16 Oct 2025 15:29:54 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.9.173.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-10-16-warp-macos-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-16-warp-macos-beta/</guid><description>&lt;p&gt;A new Beta release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes, improvements, and new features including Path Maximum Transmission Unit Discovery (PMTUD). With PMTUD enabled, the client will dynamically adjust packet sizing to optimize connection performance. There is also a new connection status message in the GUI to inform users that the local network connection may be unstable. This will make it easier to debug connectivity issues.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The GUI now displays the health of the tunnel and DNS connections by showing a connection status message when the network may be unstable. This will make it easier to debug connectivity issues.&lt;/li&gt;
&lt;li&gt;Deleting registrations no longer returns an error when succeeding.&lt;/li&gt;
&lt;li&gt;Path Maximum Transmission Unit Discovery (PMTUD) is now used to discover the effective MTU of the connection. This allows the client to improve connection performance optimized for the current network.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 16 Oct 2025 15:29:52 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Gateway - New domain categories added</title><link>https://developers.cloudflare.com/changelog/post/2025-10-10-new-domain-categories/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-10-new-domain-categories/</guid><description>&lt;p&gt;We have added three new domain categories under the Technology parent category, to better reflect online content and improve DNS filtering.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;New categories added&lt;/strong&gt;&lt;/p&gt;





























&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Parent ID&lt;/th&gt;&lt;th&gt;Parent Name&lt;/th&gt;&lt;th&gt;Category ID&lt;/th&gt;&lt;th&gt;Category Name&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;26&lt;/td&gt;&lt;td&gt;Technology&lt;/td&gt;&lt;td&gt;194&lt;/td&gt;&lt;td&gt;Keep Awake Software&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;26&lt;/td&gt;&lt;td&gt;Technology&lt;/td&gt;&lt;td&gt;192&lt;/td&gt;&lt;td&gt;Remote Access&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;26&lt;/td&gt;&lt;td&gt;Technology&lt;/td&gt;&lt;td&gt;193&lt;/td&gt;&lt;td&gt;Shareware/Freeware&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;
&lt;p&gt;Refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/domain-categories/&quot;&gt;Gateway domain categories&lt;/a&gt; to learn more.&lt;/p&gt;</description><pubDate>Fri, 10 Oct 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One Client - WARP client for Linux (version 2025.8.779.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-10-07-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-07-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains significant fixes and improvements including an updated public key for Linux packages. The public key must be updated if it was installed before September 12, 2025 to ensure the repository remains functional after December 4, 2025. Instructions to make this update are available at &lt;a href=&quot;https://pkg.cloudflareclient.com/&quot;&gt;pkg.cloudflareclient.com&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; has been enhanced for even faster resolution. Proxy mode now supports SOCKS4, SOCK5, and HTTP CONNECT over an L4 tunnel with custom congestion control optimizations instead of the previous L3 tunnel to Cloudflare&apos;s network. This has more than doubled Proxy mode throughput in lab speed testing, by an order of magnitude in some cases.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The MASQUE protocol is now the only protocol that can use &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt;. If you previously configured a device profile to use Proxy mode with Wireguard, you will need to select a new WARP mode or switch to the MASQUE protocol. Otherwise, all devices matching the profile will lose connectivity.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 07 Oct 2025 19:20:00 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.8.779.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-10-07-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-07-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains significant fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; has been enhanced for even faster resolution. Proxy mode now supports SOCKS4, SOCK5, and HTTP CONNECT over an L4 tunnel with custom congestion control optimizations instead of the previous L3 tunnel to Cloudflare&apos;s network. This has more than doubled Proxy mode throughput in lab speed testing, by an order of magnitude in some cases.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The MASQUE protocol is now the only protocol that can use &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt;. If you previously configured a device profile to use Proxy mode with Wireguard, you will need to select a new WARP mode or switch to the MASQUE protocol. Otherwise, all devices matching the profile will lose connectivity.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 07 Oct 2025 17:02:40 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.8.779.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-10-07-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-07-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains significant fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; has been enhanced for even faster resolution. Proxy mode now supports SOCKS4, SOCK5, and HTTP CONNECT over an L4 tunnel with custom congestion control optimizations instead of the previous L3 tunnel to Cloudflare&apos;s network. This has more than doubled Proxy mode throughput in lab speed testing, by an order of magnitude in some cases.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The MASQUE protocol is now the only protocol that can use &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt;. If you previously configured a device profile to use Proxy mode with Wireguard, you will need to select a new WARP mode or switch to the MASQUE protocol. Otherwise, all devices matching the profile will lose connectivity.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 07 Oct 2025 17:02:40 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare Fundamentals, Access - Fine-grained Permissioning for Access for Apps, IdPs, &amp; Targets now in Public Beta</title><link>https://developers.cloudflare.com/changelog/post/2025-10-01-fine-grained-permissioning-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-01-fine-grained-permissioning-beta/</guid><description>&lt;p&gt;Fine-grained permissions for &lt;strong&gt;Access Applications, Identity Providers (IdPs), and Targets&lt;/strong&gt; is now available in Public Beta. This expands our RBAC model beyond account &amp;#x26; zone-scoped roles, enabling administrators to grant permissions scoped to individual resources.&lt;/p&gt;
&lt;h4&gt;What&apos;s New&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/http-apps/&quot; target=&quot;_blank&quot;&gt;Access Applications&lt;/a&gt;&lt;/strong&gt;: Grant admin permissions to specific Access Applications.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/integrations/identity-providers/&quot; target=&quot;_blank&quot;&gt;Identity Providers&lt;/a&gt;&lt;/strong&gt;: Grant admin permissions to individual Identity Providers.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/non-http/infrastructure-apps/#1-add-a-target&quot; target=&quot;_blank&quot;&gt;Targets&lt;/a&gt;&lt;/strong&gt;: Grant admin rights to specific Targets&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/2025-10-01-fine-grained-permissioning-ux.BWVmQsVF_Z1p4MJh.webp&quot; alt=&quot;Updated Permissions Policy UX&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;aside&gt; &lt;p&gt; Note &lt;/p&gt; &lt;div&gt; &lt;p&gt;During the public beta, members must also be assigned an account-scoped, read only role to view resources in the dashboard. This restriction will be lifted in a future release.&lt;/p&gt;&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Account Read Only&lt;/strong&gt; plus a fine-grained permission for a specific App, IdP, or Target&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloudflare Zero Trust Read Only&lt;/strong&gt; plus fine-grained permission for a specific App, IdP, or Target&lt;/li&gt;
&lt;/ul&gt; &lt;/div&gt; &lt;/aside&gt;
&lt;p&gt;For more info:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/fundamentals/manage-members/roles/&quot;&gt;Get started with Cloudflare Permissioning&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/fundamentals/manage-members/manage&quot;&gt;Manage Member Permissioning via the UI &amp;#x26; API&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 02 Oct 2025 00:00:00 GMT</pubDate><product>Cloudflare Fundamentals</product><category>Cloudflare Fundamentals</category><category>Access</category></item><item><title>Data Loss Prevention - Expanded File Type Controls for Executables and Disk Images</title><link>https://developers.cloudflare.com/changelog/post/2025-10-01-new-file-type-support/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-10-01-new-file-type-support/</guid><description>&lt;p&gt;You can now enhance your security posture by blocking additional application installer and disk image file types with Cloudflare Gateway. Preventing the download of unauthorized software packages is a critical step in securing endpoints from malware and unwanted applications.&lt;/p&gt;
&lt;p&gt;We have expanded Gateway&apos;s file type controls to include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Apple Disk Image (dmg)&lt;/li&gt;
&lt;li&gt;Microsoft Software Installer (msix, appx)&lt;/li&gt;
&lt;li&gt;Apple Software Package (pkg)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can find these new options within the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/#download-and-upload-file-types&quot;&gt;&lt;em&gt;Upload File Types&lt;/em&gt; and &lt;em&gt;Download File Types&lt;/em&gt; selectors&lt;/a&gt; when creating or editing an HTTP policy. The file types are categorized as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;System&lt;/strong&gt;: &lt;em&gt;Apple Disk Image (dmg)&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Executable&lt;/strong&gt;: &lt;em&gt;Microsoft Software Installer (msix)&lt;/em&gt;, &lt;em&gt;Microsoft Software Installer (appx)&lt;/em&gt;, &lt;em&gt;Apple Software Package (pkg)&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To ensure these file types are blocked effectively, please note the following behaviors:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;DMG: Due to their file structure, DMG files are blocked at the very end of the transfer. A user&apos;s download may appear to progress but will fail at the last moment, preventing the browser from saving the file.&lt;/li&gt;
&lt;li&gt;MSIX: To comprehensively block Microsoft Software Installers, you should also include the file type &lt;em&gt;Unscannable&lt;/em&gt;. MSIX files larger than 100 MB are identified as Unscannable ZIP files during inspection.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To get started, go to your HTTP policies in Zero Trust. For a full list of file types, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/#supported-file-types&quot;&gt;supported file types&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 01 Oct 2025 00:00:00 GMT</pubDate><product>Data Loss Prevention</product><category>Data Loss Prevention</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.7.176.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-09-30-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-30-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;MASQUE is now the default &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#device-tunnel-protocol&quot;&gt;tunnel protocol&lt;/a&gt; for all new WARP device profiles.&lt;/li&gt;
&lt;li&gt;Improvement to limit idle connections in &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#dns-only-mode&quot;&gt;Gateway with DoH mode&lt;/a&gt; to avoid unnecessary resource usage that can lead to DoH requests not resolving.&lt;/li&gt;
&lt;li&gt;Improvement to maintain TCP connections to reduce interruptions in long-lived connections such as RDP or SSH.&lt;/li&gt;
&lt;li&gt;Improvements to maintain &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#disconnect-warp-on-all-devices&quot;&gt;Global WARP override&lt;/a&gt; settings when &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/switch-organizations/#switch-organizations-in-the-cloudflare-one-client&quot;&gt;switching between organizations&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Improvements to maintain client connectivity during network changes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 30 Sep 2025 20:43:09 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.7.176.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-09-30-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-30-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed a bug preventing the &lt;code&gt;warp-diag captive-portal&lt;/code&gt; command from running successfully due to the client not parsing SSID on macOS.&lt;/li&gt;
&lt;li&gt;Improvements to maintain &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#disconnect-warp-on-all-devices&quot;&gt;Global WARP override&lt;/a&gt; settings when &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/switch-organizations/#switch-organizations-in-the-cloudflare-one-client&quot;&gt;switching between organizations&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;MASQUE is now the default &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#device-tunnel-protocol&quot;&gt;tunnel protocol&lt;/a&gt; for all new WARP device profiles.&lt;/li&gt;
&lt;li&gt;Improvement to limit idle connections in &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#dns-only-mode&quot;&gt;Gateway with DoH mode&lt;/a&gt; to avoid unnecessary resource usage that can lead to DoH requests not resolving.&lt;/li&gt;
&lt;li&gt;Improvements to maintain client connectivity during network changes.&lt;/li&gt;
&lt;li&gt;The WARP client now supports macOS Tahoe (version 26.0).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 30 Sep 2025 20:43:08 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Linux (version 2025.7.176.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-09-30-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-30-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements including an updated public key for Linux packages. The public key must be updated if it was installed before September 12, 2025 to ensure the repository remains functional after December 4, 2025. Instructions to make this update are available at &lt;a href=&quot;https://pkg.cloudflareclient.com/&quot;&gt;pkg.cloudflareclient.com&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;MASQUE is now the default &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#device-tunnel-protocol&quot;&gt;tunnel protocol&lt;/a&gt; for all new WARP device profiles.&lt;/li&gt;
&lt;li&gt;Improvement to limit idle connections in &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#dns-only-mode&quot;&gt;Gateway with DoH mode&lt;/a&gt; to avoid unnecessary resource usage that can lead to DoH requests not resolving.&lt;/li&gt;
&lt;li&gt;Improvements to maintain &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#disconnect-warp-on-all-devices&quot;&gt;Global WARP override&lt;/a&gt; settings when &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/switch-organizations/#switch-organizations-in-the-cloudflare-one-client&quot;&gt;switching between organizations&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Improvements to maintain client connectivity during network changes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 30 Sep 2025 20:20:30 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Gateway - Application granular controls for operations in SaaS applications</title><link>https://developers.cloudflare.com/changelog/post/2025-09-25-new-granular-controls-for-saas-applications/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-25-new-granular-controls-for-saas-applications/</guid><description>&lt;p&gt;Gateway users can now apply granular controls to their file sharing and AI chat applications through &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies&quot;&gt;HTTP policies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The new feature offers two methods of controlling SaaS applications:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Application Controls&lt;/strong&gt; are curated groupings of Operations which provide an easy way for users to achieve a specific outcome. Application Controls may include &lt;em&gt;Upload&lt;/em&gt;, &lt;em&gt;Download&lt;/em&gt;, &lt;em&gt;Prompt&lt;/em&gt;, &lt;em&gt;Voice&lt;/em&gt;, and &lt;em&gt;Share&lt;/em&gt; depending on the application.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Operations&lt;/strong&gt; are controls aligned to the most granular action a user can take. This provides a fine-grained approach to enforcing policy and generally aligns to the SaaS providers API specifications in naming and function.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Get started using &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/granular-controls&quot;&gt;Application Granular Controls&lt;/a&gt; and refer to the list of &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/granular-controls/#compatible-applications&quot;&gt;supported applications&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 30 Sep 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Gateway, Data Loss Prevention - Refine DLP Scans with New Body Phase Selector</title><link>https://developers.cloudflare.com/changelog/post/2025-09-25-body-phase-selector/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-25-body-phase-selector/</guid><description>&lt;p&gt;You can now more precisely control your HTTP DLP policies by specifying whether to scan the request or response body, helping to reduce false positives and target specific data flows.&lt;/p&gt;
&lt;p&gt;In the Gateway HTTP policy builder, you will find a new selector called &lt;em&gt;Body Phase&lt;/em&gt;. This allows you to define the direction of traffic the DLP engine will inspect:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Request Body&lt;/em&gt;: Scans data sent from a user&apos;s machine to an upstream service. This is ideal for monitoring data uploads, form submissions, or other user-initiated data exfiltration attempts.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Response Body&lt;/em&gt;: Scans data sent to a user&apos;s machine from an upstream service. Use this to inspect file downloads and website content for sensitive data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, consider a policy that blocks Social Security Numbers (SSNs). Previously, this policy might trigger when a user visits a website that contains example SSNs in its content (the response body). Now, by setting the &lt;strong&gt;Body Phase&lt;/strong&gt; to &lt;em&gt;Request Body&lt;/em&gt;, the policy will only trigger if the user attempts to upload or submit an SSN, ignoring the content of the web page itself.&lt;/p&gt;
&lt;p&gt;All policies without this selector will continue to scan both request and response bodies to ensure continued protection.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/#body-phase&quot;&gt;Gateway HTTP policy selectors&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 25 Sep 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category><category>Data Loss Prevention</category></item><item><title>Email security - Invalid Submissions Feedback</title><link>https://developers.cloudflare.com/changelog/post/2025-09-23-invalid-submissions/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-23-invalid-submissions/</guid><description>&lt;p&gt;Email security relies on your submissions to continuously improve our detection models. However, we often receive submissions in formats that cannot be ingested, such as incomplete EMLs, screenshots, or text files.&lt;/p&gt;
&lt;p&gt;To ensure all customer feedback is actionable, we have launched two new features to manage invalid submissions sent to our team and user &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/settings/phish-submissions/submission-addresses/&quot;&gt;submission aliases&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Email Notifications:&lt;/strong&gt; We now automatically notify users by email when they provide an invalid submission, educating them on the correct format. To disable notifications, go to &lt;strong&gt;&lt;a href=&quot;https://one.dash.cloudflare.com/?to=/:account/email-security/settings&quot; target=&quot;_blank&quot;&gt;Settings&lt;/a&gt;&lt;/strong&gt; &gt; &lt;strong&gt;Invalid submission emails&lt;/strong&gt; and turn the feature off.&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/EmailSec-Invalid-Submissions-Toggle.DXjbR6aX_ZsxWGB.webp&quot; alt=&quot;EmailSec-Invalid-Submissions-Toggle&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Invalid Submission dashboard:&lt;/strong&gt; You can quickly identify which users need education to provide valid submissions so Cloudflare can provide continuous protection.&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/EmailSec-Invalid-Submissions-Dashboard.zuf1on2n_2gjnGS.webp&quot; alt=&quot;EmailSec-Invalid-Submissions-Dashboard&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;Learn more about this feature on &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/submissions/invalid-submissions/&quot;&gt;invalid submissions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 23 Sep 2025 23:11:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Access - Access Remote Desktop Protocol (RDP) destinations securely from your browser — now generally available!</title><link>https://developers.cloudflare.com/changelog/post/2025-09-22-browser-based-rdp-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-22-browser-based-rdp-ga/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/rdp/rdp-browser/&quot;&gt;Browser-based RDP&lt;/a&gt; with &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/policies/&quot;&gt;Cloudflare Access&lt;/a&gt; is now generally available for all Cloudflare customers. It enables secure, remote Windows server access without VPNs or RDP clients.&lt;/p&gt;
&lt;p&gt;Since we announced our &lt;a href=&quot;https://developers.cloudflare.com/changelog/access/#2025-06-30&quot;&gt;open beta&lt;/a&gt;, we&apos;ve made a few improvements:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Support for targets with IPv6.&lt;/li&gt;
&lt;li&gt;Support for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/&quot;&gt;Magic WAN&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/&quot;&gt;WARP Connector&lt;/a&gt; as on-ramps.&lt;/li&gt;
&lt;li&gt;More robust error messaging on the login page to help you if you encounter an issue.&lt;/li&gt;
&lt;li&gt;Worldwide keyboard support. Whether your day-to-day is in Portuguese, Chinese, or something in between, your browser-based RDP experience will look and feel exactly like you are using a desktop RDP client.&lt;/li&gt;
&lt;li&gt;Cleaned up some other miscellaneous issues, including but not limited to enhanced support for Entra ID accounts and support for usernames with spaces, quotes, and special characters.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;As a refresher, here are some benefits browser-based RDP provides:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Control how users authenticate to internal RDP resources&lt;/strong&gt; with single sign-on (SSO), multi-factor authentication (MFA), and granular access policies.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Record who is accessing which servers and when&lt;/strong&gt; to support regulatory compliance requirements and to gain greater visibility in the event of a security event.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Eliminate the need to install and manage software on user devices&lt;/strong&gt;. You will only need a web browser.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Reduce your attack surface&lt;/strong&gt; by keeping your RDP servers off the public Internet and protecting them from common threats like credential stuffing or brute-force attacks.&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/browser-based-rdp-access-app.BNXce1JL_1TDoUX.webp&quot; alt=&quot;Example of a browser-based RDP Access application&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;To get started, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/rdp/rdp-browser/&quot;&gt;Connect to RDP in a browser&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Mon, 22 Sep 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Cloudflare Tunnel, Cloudflare Tunnel for SASE - Connect and secure any private or public app by hostname, not IP — with hostname routing for Cloudflare Tunnel</title><link>https://developers.cloudflare.com/changelog/post/2025-09-18-tunnel-hostname-routing/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-18-tunnel-hostname-routing/</guid><description>&lt;p&gt;You can now route private traffic to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/&quot;&gt;Cloudflare Tunnel&lt;/a&gt; based on a hostname or domain, moving beyond the limitations of IP-based routing. This new capability is &lt;strong&gt;free for all Cloudflare One customers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Previously, Tunnel routes could only be defined by IP address or &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-cidr/&quot;&gt;CIDR range&lt;/a&gt;. This created a challenge for modern applications with dynamic or ephemeral IP addresses, often forcing administrators to maintain complex and brittle IP lists.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/tunnel-hostname-routing.DSi8MP_7_Z1E6Ym4.webp&quot; alt=&quot;Hostname-based routing in Cloudflare Tunnel&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;&lt;strong&gt;What’s new:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Hostname &amp;#x26; Domain Routing&lt;/strong&gt;: Create routes for individual hostnames (e.g., &lt;code&gt;payroll.acme.local&lt;/code&gt;) or entire domains (e.g., &lt;code&gt;*.acme.local&lt;/code&gt;) and direct their traffic to a specific Tunnel.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Simplified Zero Trust Policies&lt;/strong&gt;: Build resilient policies in Cloudflare Access and Gateway using stable hostnames, making it dramatically easier to apply per-resource authorization for your private applications.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Precise Egress Control&lt;/strong&gt;: Route traffic for public hostnames (e.g., &lt;code&gt;bank.example.com&lt;/code&gt;) through a specific Tunnel to enforce a dedicated source IP, solving the IP allowlist problem for third-party services.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;No More IP Lists&lt;/strong&gt;: This feature makes the workaround of maintaining dynamic IP Lists for Tunnel connections obsolete.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Get started in the Tunnels section of the Zero Trust dashboard with your first &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/cloudflared/connect-private-hostname/&quot;&gt;private hostname&lt;/a&gt; or &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/egress-policies/egress-cloudflared/&quot;&gt;public hostname&lt;/a&gt; route.&lt;/p&gt;
&lt;p&gt;Learn more in our &lt;a href=&quot;https://blog.cloudflare.com/tunnel-hostname-routing/&quot; target=&quot;_blank&quot;&gt;blog post&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 18 Sep 2025 00:00:00 GMT</pubDate><product>Cloudflare Tunnel</product><category>Cloudflare Tunnel</category><category>Cloudflare Tunnel for SASE</category></item><item><title>Cloudflare One - New AI-Enabled Search for Zero Trust Dashboard</title><link>https://developers.cloudflare.com/changelog/post/2025-09-16-new-ai-enabled-search-for-zero-trust-dashboard/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-16-new-ai-enabled-search-for-zero-trust-dashboard/</guid><description>&lt;p&gt;Zero Trust Dashboard has a brand new, AI-powered search functionality. You can search your account by resources (applications, policies, device profiles, settings, etc.), pages, products, and more.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/searchexample.Di8yS8ju_1GmPhw.webp&quot; alt=&quot;Example search results in the Zero Trust dashboard&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;&lt;strong&gt;Ask Cloudy&lt;/strong&gt; — You can also ask Cloudy, our AI agent, questions about Cloudflare Zero Trust. Cloudy is trained on our developer documentation and implementation guides, so it can tell you how to configure functionality, best practices, and can make recommendations.&lt;/p&gt;
&lt;p&gt;Cloudy can then stay open with you as you move between pages to build configuration or answer more questions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Find Recents&lt;/strong&gt; — Recent searches and Cloudy questions also have a new tab under Zero Trust Overview.&lt;/p&gt;</description><pubDate>Tue, 16 Sep 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category></item><item><title>Email security - Regional Email Processing for Germany, India, or Australia</title><link>https://developers.cloudflare.com/changelog/post/2025-09-11-regional-email-processing-gia/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-11-regional-email-processing-gia/</guid><description>&lt;p&gt;We’re excited to announce that Email security customers can now choose their preferred mail processing location directly from the UI when onboarding a domain. This feature is available for the following onboarding methods: &lt;strong&gt;MX&lt;/strong&gt;, &lt;strong&gt;BCC&lt;/strong&gt;, and &lt;strong&gt;Journaling&lt;/strong&gt;.&lt;/p&gt;
&lt;h4&gt;What’s new&lt;/h4&gt;
&lt;p&gt;Customers can now select where their email is processed. The following regions are supported:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Germany&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;India&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Australia&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Global processing remains the default option, providing flexibility to meet both compliance requirements or operational preferences.&lt;/p&gt;
&lt;h4&gt;How to use it&lt;/h4&gt;
&lt;p&gt;When onboarding a domain with MX, BCC, or Journaling:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Select the desired processing location (Germany, India, or Australia).&lt;/li&gt;
&lt;li&gt;The UI will display updated processing addresses specific to that region.&lt;/li&gt;
&lt;li&gt;For MX onboarding, if your domain is managed by Cloudflare, you can automatically update MX records directly from the UI.&lt;/li&gt;
&lt;/ol&gt;
&lt;h4&gt;Availability&lt;/h4&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;What’s next&lt;/h4&gt;
&lt;p&gt;We’re expanding the list of processing locations to match our &lt;a href=&quot;https://developers.cloudflare.com/data-localization/&quot;&gt;Data Localization Suite (DLS)&lt;/a&gt; footprint, giving customers the broadest set of regional options in the market without the complexity of self-hosting.&lt;/p&gt;</description><pubDate>Thu, 11 Sep 2025 23:15:00 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Gateway, Cloudflare WAN, Cloudflare Tunnel for SASE - DNS filtering for private network onramps</title><link>https://developers.cloudflare.com/changelog/post/2025-09-11-dns-filtering-for-private-network-onramps/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-11-dns-filtering-for-private-network-onramps/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/zero-trust/cloudflare-gateway/#dns-filtering&quot;&gt;Magic WAN&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/site-to-internet/#configure-dns-resolver-on-devices&quot;&gt;WARP Connector&lt;/a&gt; users can now securely route their DNS traffic to the Gateway resolver without exposing traffic to the public Internet.&lt;/p&gt;
&lt;p&gt;Routing DNS traffic to the Gateway resolver allows DNS resolution and filtering for traffic coming from private networks while preserving source internal IP visibility. This ensures Magic WAN users have full integration with our Cloudflare One features, including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/resolver-policies/#internal-dns&quot;&gt;Internal DNS&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/egress-policies/#selector-prerequisites&quot;&gt;hostname-based policies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;To configure DNS filtering, change your Magic WAN or WARP Connector DNS settings to use Cloudflare&apos;s shared resolver IPs, &lt;code&gt;172.64.36.1&lt;/code&gt; and &lt;code&gt;172.64.36.2&lt;/code&gt;. Once you configure DNS resolution and filtering, you can use &lt;em&gt;Source Internal IP&lt;/em&gt; as a traffic selector in your &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/resolver-policies/&quot;&gt;resolver policies&lt;/a&gt; for routing private DNS traffic to your &lt;a href=&quot;https://developers.cloudflare.com/dns/internal-dns/&quot;&gt;Internal DNS&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 11 Sep 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category><category>Cloudflare WAN</category><category>Cloudflare Tunnel for SASE</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.7.106.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-09-10-warp-windows-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-10-warp-windows-beta/</guid><description>&lt;p&gt;A new Beta release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements including enhancements to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; for even faster resolution. The MASQUE protocol is now the only protocol that can use Proxy mode. If you previously configured a device profile to use Proxy mode with Wireguard, you will need to select a new &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/&quot;&gt;WARP mode&lt;/a&gt; or all devices matching the profile will lose connectivity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Enhancements to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; for even faster resolution. The MASQUE protocol is now the only protocol that can use Proxy mode. If you previously configured a device profile to use Proxy mode with Wireguard, you will need to select a new &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/&quot;&gt;WARP mode&lt;/a&gt; or all devices matching the profile will lose connectivity.&lt;/li&gt;
&lt;li&gt;Improvement to keep TCP connections up the first time WARP connects on devices so that remote desktop sessions (such as RDP or SSH) continue to work.&lt;/li&gt;
&lt;li&gt;Improvements to maintain Global WARP Override settings when switching between organization configurations.&lt;/li&gt;
&lt;li&gt;The &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#device-tunnel-protocol&quot;&gt;MASQUE protocol&lt;/a&gt; is now the default protocol for all new WARP device profiles.&lt;/li&gt;
&lt;li&gt;Improvement to limit idle connections in DoH mode to avoid unnecessary resource usage that can lead to DoH requests not resolving.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Wed, 10 Sep 2025 14:09:30 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.7.106.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-09-10-warp-macos-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-10-warp-macos-beta/</guid><description>&lt;p&gt;A new Beta release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements including enhancements to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; for even faster resolution. The MASQUE protocol is now the only protocol that can use Proxy mode. If you previously configured a device profile to use Proxy mode with Wireguard, you will need to select a new &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/&quot;&gt;WARP mode&lt;/a&gt; or all devices matching the profile will lose connectivity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Enhancements to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/#local-proxy-mode&quot;&gt;Proxy mode&lt;/a&gt; for even faster resolution. The MASQUE protocol is now the only protocol that can use Proxy mode. If you previously configured a device profile to use Proxy mode with Wireguard, you will need to select a new &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/modes/&quot;&gt;WARP mode&lt;/a&gt; or all devices matching the profile will lose connectivity.&lt;/li&gt;
&lt;li&gt;Fixed a bug preventing the &lt;code&gt;warp-diag captive-portal&lt;/code&gt; command from running successfully due to the client not parsing SSID on macOS.&lt;/li&gt;
&lt;li&gt;Improvements to maintain Global WARP Override settings when switching between organization configurations.&lt;/li&gt;
&lt;li&gt;The &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#device-tunnel-protocol&quot;&gt;MASQUE protocol&lt;/a&gt; is now the default protocol for all new WARP device profiles.&lt;/li&gt;
&lt;li&gt;Improvement to limit idle connections in DoH mode to avoid unnecessary resource usage that can lead to DoH requests not resolving.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Wed, 10 Sep 2025 14:09:02 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare WAN - Custom IKE ID for IPsec Tunnels</title><link>https://developers.cloudflare.com/changelog/post/2025-09-08-custom-ike-id-ipsec-tunnels/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-08-custom-ike-id-ipsec-tunnels/</guid><description>&lt;p&gt;Now, Magic WAN customers can configure a custom IKE ID for their IPsec tunnels. Customers that are using Magic WAN and a VeloCloud SD-WAN device together can utilize this new feature to create a high availability configuration.&lt;/p&gt;
&lt;p&gt;This feature is available via API only. Customers can read the Magic WAN documentation to learn more about the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/common-settings/custom-ike-id-ipsec/&quot;&gt;Custom IKE ID feature and the API call to configure it&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Mon, 08 Sep 2025 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category></item><item><title>Cloudflare WAN - Bidirectional tunnel health checks are compatible with all Magic on-ramps</title><link>https://developers.cloudflare.com/changelog/post/2025-09-05-bidirectional-health-check-any-on-ramp/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-05-bidirectional-health-check-any-on-ramp/</guid><description>&lt;p&gt;All bidirectional tunnel health check return packets are accepted by any Magic on-ramp.&lt;/p&gt;
&lt;p&gt;Previously, when a Magic tunnel had a bidirectional health check configured, the bidirectional health check would pass when the return packets came back to Cloudflare over the same tunnel that was traversed by the forward packets.&lt;/p&gt;
&lt;p&gt;There are SD-WAN devices, like VeloCloud, that do not offer controls to steer traffic over one tunnel versus another in a high availability tunnel configuration.&lt;/p&gt;
&lt;p&gt;Now, when a Magic tunnel has a bidirectional health check configured, the bidirectional health check will pass when the return packet traverses over any tunnel in a high availability configuration.&lt;/p&gt;</description><pubDate>Fri, 05 Sep 2025 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category></item><item><title>Cloudflare Tunnel, Cloudflare Tunnel for SASE - Cloudflare Tunnel and Networks API will no longer return deleted resources by default starting December 1, 2025</title><link>https://developers.cloudflare.com/changelog/post/2025-09-02-tunnel-networks-list-endpoints-new-default/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-02-tunnel-networks-list-endpoints-new-default/</guid><description>&lt;p&gt;Starting &lt;strong&gt;December 1, 2025&lt;/strong&gt;, list endpoints for the &lt;a href=&quot;https://developers.cloudflare.com/api/resources/zero_trust/subresources/tunnels/&quot;&gt;Cloudflare Tunnel API&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/api/resources/zero_trust/subresources/networks/&quot;&gt;Zero Trust Networks API&lt;/a&gt; will no longer return deleted tunnels, routes, subnets and virtual networks by default. This change makes the API behavior more intuitive by only returning active resources unless otherwise specified.&lt;/p&gt;
&lt;p&gt;No action is required if you already explicitly set &lt;code&gt;is_deleted=false&lt;/code&gt; or if you only need to list active resources.&lt;/p&gt;
&lt;p&gt;This change affects the following API endpoints:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;List all tunnels: &lt;a href=&quot;https://developers.cloudflare.com/api/resources/zero_trust/subresources/tunnels/methods/list/&quot;&gt;&lt;code&gt;GET /accounts/{account_id}/tunnels&lt;/code&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/&quot;&gt;Cloudflare Tunnels&lt;/a&gt;: &lt;a href=&quot;https://developers.cloudflare.com/api/resources/zero_trust/subresources/tunnels/subresources/cloudflared/methods/list/&quot;&gt;&lt;code&gt;GET /accounts/{account_id}/cfd_tunnel&lt;/code&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/warp-connector/&quot;&gt;WARP Connector&lt;/a&gt; tunnels: &lt;a href=&quot;https://developers.cloudflare.com/api/resources/zero_trust/subresources/tunnels/subresources/warp_connector/methods/list/&quot;&gt;&lt;code&gt;GET /accounts/{account_id}/warp_connector&lt;/code&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List tunnel routes: &lt;a href=&quot;https://developers.cloudflare.com/api/resources/zero_trust/subresources/networks/subresources/routes/methods/list/&quot;&gt;&lt;code&gt;GET /accounts/{account_id}/teamnet/routes&lt;/code&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List subnets: &lt;a href=&quot;https://developers.cloudflare.com/api/resources/zero_trust/subresources/networks/subresources/subnets/methods/list/&quot;&gt;&lt;code&gt;GET /accounts/{account_id}/zerotrust/subnets&lt;/code&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List virtual networks: &lt;a href=&quot;https://developers.cloudflare.com/api/resources/zero_trust/subresources/networks/subresources/virtual_networks/methods/list/&quot;&gt;&lt;code&gt;GET /accounts/{account_id}/teamnet/virtual_networks&lt;/code&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;What is changing?&lt;/h4&gt;
&lt;p&gt;The default behavior of the &lt;code&gt;is_deleted&lt;/code&gt; query parameter will be updated.&lt;/p&gt;















&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Scenario&lt;/th&gt;&lt;th&gt;Previous behavior (before December 1, 2025)&lt;/th&gt;&lt;th&gt;New behavior (from December 1, 2025)&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;code&gt;is_deleted&lt;/code&gt; parameter is omitted&lt;/td&gt;&lt;td&gt;Returns &lt;strong&gt;active &amp;#x26; deleted&lt;/strong&gt; tunnels, routes, subnets and virtual networks&lt;/td&gt;&lt;td&gt;Returns &lt;strong&gt;only active&lt;/strong&gt; tunnels, routes, subnets and virtual networks&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;
&lt;h4&gt;Action required&lt;/h4&gt;
&lt;p&gt;If you need to retrieve deleted (or all) resources, please update your API calls to explicitly include the &lt;code&gt;is_deleted&lt;/code&gt; parameter before &lt;strong&gt;December 1, 2025&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To get a list of only deleted resources, you must now explicitly add the &lt;code&gt;is_deleted=true&lt;/code&gt; query parameter to your request:&lt;/p&gt;
&lt;div&gt;&lt;figure&gt;&lt;pre data-language=&quot;bash&quot;&gt;&lt;code class=&quot;language-bash&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;# Example: Get ONLY deleted Tunnels&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;curl&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&quot;https://api.cloudflare.com/client/v4/accounts/&lt;/span&gt;&lt;span&gt;$ACCOUNT_ID&lt;/span&gt;&lt;span&gt;/tunnels?is_deleted=true&quot;&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;\&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;     &lt;/span&gt;&lt;span&gt;-H&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&quot;Authorization: Bearer &lt;/span&gt;&lt;span&gt;$API_TOKEN&lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;# Example: Get ONLY deleted Virtual Networks&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;curl&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&quot;https://api.cloudflare.com/client/v4/accounts/&lt;/span&gt;&lt;span&gt;$ACCOUNT_ID&lt;/span&gt;&lt;span&gt;/teamnet/virtual_networks?is_deleted=true&quot;&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;\&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;     &lt;/span&gt;&lt;span&gt;-H&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&quot;Authorization: Bearer &lt;/span&gt;&lt;span&gt;$API_TOKEN&lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/code&gt;&lt;/pre&gt;&lt;div&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/figure&gt;&lt;/div&gt;
&lt;p&gt;Following this change, retrieving a complete list of both active and deleted resources will require two separate API calls: one to get active items (by omitting the parameter or using &lt;code&gt;is_deleted=false&lt;/code&gt;) and one to get deleted items (&lt;code&gt;is_deleted=true&lt;/code&gt;).&lt;/p&gt;
&lt;h4&gt;Why we’re making this change&lt;/h4&gt;
&lt;p&gt;This update is based on user feedback and aims to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Create a more intuitive default:&lt;/strong&gt; Aligning with common API design principles where list operations return only active resources by default.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Reduce unexpected results:&lt;/strong&gt; Prevents users from accidentally operating on deleted resources that were returned unexpectedly.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Improve performance:&lt;/strong&gt; For most users, the default query result will now be smaller and more relevant.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To learn more, please visit the &lt;a href=&quot;https://developers.cloudflare.com/api/resources/zero_trust/subresources/tunnels/&quot;&gt;Cloudflare Tunnel API&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/api/resources/zero_trust/subresources/networks/&quot;&gt;Zero Trust Networks API&lt;/a&gt; documentation.&lt;/p&gt;</description><pubDate>Tue, 02 Sep 2025 00:00:00 GMT</pubDate><product>Cloudflare Tunnel</product><category>Cloudflare Tunnel</category><category>Cloudflare Tunnel for SASE</category></item><item><title>Email security - Updated Email security roles</title><link>https://developers.cloudflare.com/changelog/post/2025-09-01-updated-new-roles/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-09-01-updated-new-roles/</guid><description>&lt;p&gt;To provide more granular controls, we refined the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/roles-permissions/#email-security-roles&quot;&gt;existing roles&lt;/a&gt; for Email security and launched a new Email security role as well.&lt;/p&gt;
&lt;p&gt;All Email security roles no longer have read or write access to any of the other Zero Trust products:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Email Configuration Admin&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Email Integration Admin&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Email security Read Only&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Email security Analyst&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Email security Policy Admin&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Email security Reporting&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To configure &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/outbound-dlp/&quot;&gt;Data Loss Prevention (DLP)&lt;/a&gt; or &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/#set-up-clientless-web-isolation&quot;&gt;Remote Browser Isolation (RBI)&lt;/a&gt;, you now need to be an admin for the Zero Trust dashboard with the &lt;strong&gt;Cloudflare Zero Trust&lt;/strong&gt; role.&lt;/p&gt;
&lt;p&gt;Also through customer feedback, we have created a new additive role to allow &lt;strong&gt;Email security Analyst&lt;/strong&gt; to create, edit, and delete Email security policies, without needing to provide access via the &lt;strong&gt;Email Configuration Admin&lt;/strong&gt; role. This role is called &lt;strong&gt;Email security Policy Admin&lt;/strong&gt;, which can read all settings, but has write access to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/settings/detection-settings/allow-policies/&quot;&gt;allow policies&lt;/a&gt;, &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/settings/detection-settings/trusted-domains/&quot;&gt;trusted domains&lt;/a&gt;, and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/settings/detection-settings/blocked-senders/&quot;&gt;blocked senders&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 01 Sep 2025 23:25:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Cloudflare One Client - Cloudflare One WARP Diagnostic AI Analyzer</title><link>https://developers.cloudflare.com/changelog/post/2025-08-29-warp-ai-diag-analyzer/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-29-warp-ai-diag-analyzer/</guid><description>&lt;p&gt;We&apos;re excited to share a new AI feature, the &lt;a href=&quot;https://blog.cloudflare.com/AI-troubleshoot-warp-and-network-connectivity-issues/&quot; target=&quot;_blank&quot;&gt;WARP diagnostic analyzer&lt;/a&gt;, to help you troubleshoot and resolve WARP connectivity issues faster. This beta feature is now available in the &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Zero Trust dashboard&lt;/a&gt; to all users. The AI analyzer makes it easier for you to identify the root cause of client connectivity issues by parsing &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/dex/remote-captures/#start-a-remote-capture&quot;&gt;remote captures&lt;/a&gt; of &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/troubleshooting/diagnostic-logs/#warp-diag-logs&quot;&gt;WARP diagnostic logs&lt;/a&gt;. The WARP diagnostic analyzer provides a summary of impact that may be experienced on the device, lists notable events that may contribute to performance issues, and recommended troubleshooting steps and articles to help you resolve these issues. Refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/dex/remote-captures/#diagnostics-analyzer-beta&quot;&gt;WARP diagnostics analyzer (beta)&lt;/a&gt; to learn more about how to maximize using the WARP diagnostic analyzer to troubleshoot the WARP client.&lt;/p&gt;</description><pubDate>Fri, 29 Aug 2025 00:00:00 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Digital Experience Monitoring - DEX MCP Server</title><link>https://developers.cloudflare.com/changelog/post/2025-08-29-dex-mcp-server/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-29-dex-mcp-server/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/dex/&quot;&gt;Digital Experience Monitoring (DEX)&lt;/a&gt; provides visibility into device connectivity and performance across your Cloudflare SASE deployment.&lt;/p&gt;
&lt;p&gt;We&apos;ve released an MCP server &lt;a href=&quot;https://cloudflare.com/learning/ai/what-is-model-context-protocol-mcp/&quot; target=&quot;_blank&quot;&gt;(Model Context Protocol)&lt;/a&gt; for DEX.&lt;/p&gt;
&lt;p&gt;The DEX MCP server is an AI tool that allows customers to ask a question like, &quot;Show me the connectivity and performance metrics for the device used by carly‌@acme.com&quot;, and receive an answer that contains data from the DEX API.&lt;/p&gt;
&lt;p&gt;Any Cloudflare One customer using a Free, PayGo, or Enterprise account can access the DEX MCP Server. This feature is available to everyone.&lt;/p&gt;
&lt;p&gt;Customers can test the new DEX MCP server in less than one minute. To learn more, read the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/dex/dex-mcp-server/&quot;&gt;DEX MCP server documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 29 Aug 2025 00:00:00 GMT</pubDate><product>Digital Experience Monitoring</product><category>Digital Experience Monitoring</category></item><item><title>Gateway, Cloudflare One - Shadow IT - SaaS analytics dashboard</title><link>https://developers.cloudflare.com/changelog/post/2025-08-27-shadow-it-analytics/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-27-shadow-it-analytics/</guid><description>&lt;p&gt;Zero Trust has significantly upgraded its &lt;strong&gt;Shadow IT analytics&lt;/strong&gt;, providing you with unprecedented visibility into your organizations use of SaaS tools. With this dashboard, you can review who is using an application and volumes of data transfer to the application.&lt;/p&gt;
&lt;p&gt;You can review these metrics against application type, such as Artificial Intelligence or Social Media. You can also mark applications with an approval status, including &lt;strong&gt;Unreviewed&lt;/strong&gt;, &lt;strong&gt;In Review&lt;/strong&gt;, &lt;strong&gt;Approved&lt;/strong&gt;, and &lt;strong&gt;Unapproved&lt;/strong&gt; designating how they can be used in your organization.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/shadow-it-analytics.BLNnG72w_Z1vDznE.webp&quot; alt=&quot;Cloudflare One Analytics Dashboards&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;These application statuses can also be used in Gateway HTTP policies, so you can block, isolate, limit uploads and downloads, and more based on the application status.&lt;/p&gt;
&lt;p&gt;Both the analytics and policies are accessible in the Cloudflare &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Zero Trust dashboard&lt;/a&gt;, empowering organizations with better visibility and control.&lt;/p&gt;</description><pubDate>Wed, 27 Aug 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category><category>Cloudflare One</category></item><item><title>CASB - New CASB integrations for ChatGPT, Claude, and Gemini</title><link>https://developers.cloudflare.com/changelog/post/2025-08-26-casb-ai-integrations/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-26-casb-ai-integrations/</guid><description>&lt;p&gt;&lt;a href=&quot;https://www.cloudflare.com/zero-trust/products/casb/&quot; target=&quot;_blank&quot;&gt;Cloudflare CASB&lt;/a&gt; now supports three of the most widely used GenAI platforms — &lt;strong&gt;OpenAI ChatGPT&lt;/strong&gt;, &lt;strong&gt;Anthropic Claude&lt;/strong&gt;, and &lt;strong&gt;Google Gemini&lt;/strong&gt;. These API-based integrations give security teams agentless visibility into posture, data, and compliance risks across their organization’s use of generative AI.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/casb-ai-integrations-preview.B-zsSA1P_Z1wlfJX.webp&quot; alt=&quot;Cloudflare CASB showing selection of new findings for ChatGPT, Claude, and Gemini integrations.&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;h4&gt;Key capabilities&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Agentless connections&lt;/strong&gt; — connect ChatGPT, Claude, and Gemini tenants via API; no endpoint software required&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Posture management&lt;/strong&gt; — detect insecure settings and misconfigurations that could lead to data exposure&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DLP detection&lt;/strong&gt; — identify sensitive data in uploaded chat attachments or files&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;GenAI-specific insights&lt;/strong&gt; — surface risks unique to each provider’s capabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Learn more&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/openai/&quot; target=&quot;_blank&quot;&gt;ChatGPT integration docs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/anthropic/&quot; target=&quot;_blank&quot;&gt;Claude integration docs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/google-workspace/gemini/&quot; target=&quot;_blank&quot;&gt;Gemini integration docs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These integrations are available to all Cloudflare One customers today.&lt;/p&gt;</description><pubDate>Tue, 26 Aug 2025 16:00:00 GMT</pubDate><product>CASB</product><category>CASB</category></item><item><title>Access - Manage and restrict access to internal MCP servers with Cloudflare Access</title><link>https://developers.cloudflare.com/changelog/post/2025-08-26-access-mcp-oauth/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-26-access-mcp-oauth/</guid><description>&lt;p&gt;You can now control who within your organization has access to internal MCP servers, by putting internal MCP servers behind &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/policies/&quot;&gt;Cloudflare Access&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/ai-controls/linked-apps/&quot;&gt;Self-hosted applications&lt;/a&gt; in Cloudflare Access now support OAuth for MCP server authentication. This allows Cloudflare to delegate access from any self-hosted application to an MCP server via OAuth. The OAuth access token authorizes the MCP server to make requests to your self-hosted applications on behalf of the authorized user, using that user&apos;s specific permissions and scopes.&lt;/p&gt;
&lt;p&gt;For example, if you have an MCP server designed for internal use within your organization, you can configure Access policies to ensure that only authorized users can access it, regardless of which MCP client they use. Support for internal, self-hosted MCP servers also works with MCP server portals, allowing you to provide a single MCP endpoint for multiple MCP servers. For more on MCP server portals, read the &lt;a href=&quot;https://blog.cloudflare.com/zero-trust-mcp-server-portals/&quot; target=&quot;_blank&quot;&gt;blog post&lt;/a&gt; on the Cloudflare Blog.&lt;/p&gt;</description><pubDate>Tue, 26 Aug 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Access - MCP server portals</title><link>https://developers.cloudflare.com/changelog/post/2025-08-26-mcp-server-portals/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-26-mcp-server-portals/</guid><description>&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/mcp-server-portal.BOKqTCoI_ZXYCcF.webp&quot; alt=&quot;MCP server portal&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;An &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/ai-controls/mcp-portals/&quot;&gt;MCP server portal&lt;/a&gt; centralizes multiple Model Context Protocol (MCP) servers onto a single HTTP endpoint. Key benefits include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Streamlined access to multiple MCP servers&lt;/strong&gt;: MCP server portals support both unauthenticated MCP servers as well as MCP servers secured using any third-party or custom OAuth provider. Users log in to the portal URL through Cloudflare Access and are prompted to authenticate separately to each server that requires OAuth.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Customized tools per portal&lt;/strong&gt;: Admins can tailor an MCP portal to a particular use case by choosing the specific tools and prompt templates that they want to make available to users through the portal. This allows users to access a curated set of tools and prompts — the less external context exposed to the AI model, the better the AI responses tend to be.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Observability&lt;/strong&gt;: Once the user&apos;s AI agent is connected to the portal, Cloudflare Access logs the indiviudal requests made using the tools in the portal.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This is available in an open beta for all customers across all plans! For more information check out our &lt;a href=&quot;https://blog.cloudflare.com/zero-trust-mcp-server-portals/&quot; target=&quot;_blank&quot;&gt;blog&lt;/a&gt; for this release.&lt;/p&gt;</description><pubDate>Tue, 26 Aug 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Data Loss Prevention - New DLP topic based detection entries for AI prompt protection</title><link>https://developers.cloudflare.com/changelog/post/2025-08-25-ai-prompt-protection/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-25-ai-prompt-protection/</guid><description>&lt;p&gt;You now have access to a comprehensive suite of capabilities to secure your organization&apos;s use of generative AI. AI prompt protection introduces four key features that work together to provide deep visibility and granular control.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Prompt Detection for AI Applications&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;DLP can now natively detect and inspect user prompts submitted to popular AI applications, including &lt;strong&gt;Google Gemini&lt;/strong&gt;, &lt;strong&gt;ChatGPT&lt;/strong&gt;, &lt;strong&gt;Claude&lt;/strong&gt;, and &lt;strong&gt;Perplexity&lt;/strong&gt;.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Prompt Analysis and Topic Classification&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Our DLP engine performs deep analysis on each prompt, applying &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/detection-entries/#ai-prompt-topics&quot;&gt;topic classification&lt;/a&gt;. These topics are grouped into two evaluation categories:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Content:&lt;/strong&gt; PII, Source Code, Credentials and Secrets, Financial Information, and Customer Data.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Intent:&lt;/strong&gt; Jailbreak attempts, requests for malicious code, or attempts to extract PII.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To help you apply these topics quickly, we have also released five new predefined profiles (for example, AI Prompt: AI Security, AI Prompt: PII) that bundle these new topics.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/ai-prompt-detection-entry.4QmdkAuv_Z14HtSJ.webp&quot; alt=&quot;DLP&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Granular Guardrails&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;You can now build guardrails using Gateway HTTP policies with &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/#granular-controls&quot;&gt;application granular controls&lt;/a&gt;. Apply a DLP profile containing an &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/detection-entries/#ai-prompt-topics&quot;&gt;AI prompt topic detection&lt;/a&gt; to individual AI applications (for example, &lt;code&gt;ChatGPT&lt;/code&gt;) and specific user actions (for example, &lt;code&gt;SendPrompt&lt;/code&gt;) to block sensitive prompts.&lt;/p&gt;
&lt;p&gt;&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/ai-prompt-policy.CF3H2rbK_2muoEC.webp&quot; alt=&quot;DLP&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Full Prompt Logging&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To aid in incident investigation, an optional setting in your Gateway policy allows you to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/dlp-policies/logging-options/#log-generative-ai-prompt-content&quot;&gt;capture prompt logs&lt;/a&gt; to store the full interaction of prompts that trigger a policy match. To make investigations easier, logs can be filtered by &lt;code&gt;conversation_id&lt;/code&gt;, allowing you to reconstruct the full context of an interaction that led to a policy violation.&lt;/p&gt;
&lt;p&gt;&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/ai-prompt-log.ywQDc5qN_2v6nax.webp&quot; alt=&quot;DLP&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;AI prompt protection is now available in open beta. To learn more about it, read the &lt;a href=&quot;https://blog.cloudflare.com/ai-prompt-protection/#closing-the-loop-logging&quot; target=&quot;_blank&quot;&gt;blog&lt;/a&gt; or refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/detection-entries/#ai-prompt-topics&quot;&gt;AI prompt topics&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Mon, 25 Aug 2025 00:00:00 GMT</pubDate><product>Data Loss Prevention</product><category>Data Loss Prevention</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.6.1400.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-08-21-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-21-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains a hotfix for pre-login for multi-user for the 2025.6.1135.0 release.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixes an issue where new pre-login registrations were not being properly created.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, please reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 21 Aug 2025 22:36:07 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Gateway - Gateway BYOIP Dedicated Egress IPs now available.</title><link>https://developers.cloudflare.com/changelog/post/2025-08-21-byoip-dedicated-egress-ip/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-21-byoip-dedicated-egress-ip/</guid><description>&lt;p&gt;Enterprise Gateway users can now use Bring Your Own IP (BYOIP) for dedicated egress IPs.&lt;/p&gt;
&lt;p&gt;Admins can now onboard and use their own IPv4 or IPv6 prefixes to egress traffic from Cloudflare, delivering greater control, flexibility, and compliance for network traffic.&lt;/p&gt;
&lt;p&gt;Get started by following the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/egress-policies/dedicated-egress-ips/#bring-your-own-ip-address-byoip&quot;&gt;BYOIP onboarding process&lt;/a&gt;. Once your IPs are onboarded, go to &lt;strong&gt;Gateway&lt;/strong&gt; &gt; &lt;strong&gt;Egress policies&lt;/strong&gt; and select or create an egress policy. In &lt;strong&gt;Select an egress IP&lt;/strong&gt;, choose &lt;em&gt;Use dedicated egress IPs (Cloudflare or BYOIP)&lt;/em&gt;, then select your BYOIP address from the dropdown menu.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/Gateway-byoip-dedicated-egress-ips.D0pzLAbV_8yK6N.webp&quot; alt=&quot;Screenshot of a dropdown menu adding a BYOIP IPv4 address as a dedicated egress IP in a Gateway egress policy&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/egress-policies/dedicated-egress-ips/#bring-your-own-ip-address-byoip&quot;&gt;BYOIP for dedicated egress IPs&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 21 Aug 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.6.1335.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-08-19-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-19-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improvements to better manage multi-user pre-login registrations.&lt;/li&gt;
&lt;li&gt;Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected.&lt;/li&gt;
&lt;li&gt;Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect.&lt;/li&gt;
&lt;li&gt;Improvement for faster client connectivity on high-latency captive portal networks.&lt;/li&gt;
&lt;li&gt;Fixed an issue where recursive CNAME records could cause intermittent WARP connectivity issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 version KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with KB5055523 installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 19 Aug 2025 22:10:43 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.6.1335.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-08-19-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-19-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected.&lt;/li&gt;
&lt;li&gt;Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect.&lt;/li&gt;
&lt;li&gt;Improvement for faster client connectivity on high-latency captive portal networks.&lt;/li&gt;
&lt;li&gt;Fixed an issue where recursive CNAME records could cause intermittent WARP connectivity issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 19 Aug 2025 22:10:43 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Linux (version 2025.6.1335.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-08-19-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-19-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected.&lt;/li&gt;
&lt;li&gt;Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect.&lt;/li&gt;
&lt;li&gt;Improvement for faster client connectivity on high-latency captive portal networks.&lt;/li&gt;
&lt;li&gt;Fixed an issue where recursive CNAME records could cause intermittent WARP connectivity issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 19 Aug 2025 19:45:33 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Access - SFTP support for SSH with Cloudflare Access for Infrastructure</title><link>https://developers.cloudflare.com/changelog/post/2025-08-15-sftp/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-15-sftp/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/ssh-infrastructure-access/&quot;&gt;SSH with Cloudflare Access for Infrastructure&lt;/a&gt; now supports SFTP. It is compatible with SFTP clients, such as Cyberduck.&lt;/p&gt;</description><pubDate>Fri, 15 Aug 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Access - Cloudflare Access Logging supports the Customer Metadata Boundary (CMB)</title><link>https://developers.cloudflare.com/changelog/post/2025-07-01-access-supports-customer-metadata-boundary/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-01-access-supports-customer-metadata-boundary/</guid><description>&lt;p&gt;Cloudflare Access logs now support the &lt;a href=&quot;https://developers.cloudflare.com/data-localization/metadata-boundary/&quot;&gt;Customer Metadata Boundary (CMB)&lt;/a&gt;. If you have configured the CMB for your account, all Access logging will respect that configuration.&lt;/p&gt;
&lt;aside&gt;&lt;p&gt;Note&lt;/p&gt;&lt;div&gt;&lt;p&gt;For EU CMB customers, the logs will not be stored by Access and will appear as empty in the dashboard. EU CMB customers should utilize &lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/&quot;&gt;Logpush&lt;/a&gt; to retain their Access logging, if desired.&lt;/p&gt;&lt;/div&gt;&lt;/aside&gt;</description><pubDate>Thu, 14 Aug 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Email security - Expanded Email Link Isolation</title><link>https://developers.cloudflare.com/changelog/post/2025-08-07-expanded-link-isolation/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-07-expanded-link-isolation/</guid><description>&lt;p&gt;When you deploy MX or Inline, not only can you apply email link isolation to suspicious links in all emails (including benign), you can now also apply email link isolation to all links of a specified disposition. This provides more flexibility in controlling user actions within emails.&lt;/p&gt;
&lt;p&gt;For example, you may want to deliver suspicious messages but isolate the links found within them so that users who choose to interact with the links will not accidentally expose your organization to threats. This means your end users are more secure than ever before.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/expanded-link-actions.DziIg6E8_1Sx0Ar.webp&quot; alt=&quot;Expanded Email Link Isolation Configuration&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;To isolate all links within a message based on the disposition, select &lt;strong&gt;Settings&lt;/strong&gt; &gt; &lt;strong&gt;Link Actions&lt;/strong&gt; &gt; &lt;strong&gt;View&lt;/strong&gt; and select &lt;strong&gt;Configure&lt;/strong&gt;. As with other other links you isolate, an interstitial will be provided to warn users that this site has been isolated and the link will be recrawled live to evaluate if there are any changes in our threat intel. Learn more about this feature on &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/settings/detection-settings/configure-link-actions/&quot; target=&quot;_blank&quot;&gt;Configure link actions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 07 Aug 2025 23:22:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Cloudflare WAN - Terraform V5 support for tunnels and routes</title><link>https://developers.cloudflare.com/changelog/post/2025-07-31-terraform-v5-tunnels-routes/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-31-terraform-v5-tunnels-routes/</guid><description>&lt;p&gt;The Cloudflare Terraform provider resources for Cloudflare WAN tunnels and routes now support Terraform provider version 5. Customers using infrastructure-as-code workflows can manage their tunnel and route configuration with the latest provider version.&lt;/p&gt;
&lt;p&gt;For more information, refer to the &lt;a href=&quot;https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs&quot; target=&quot;_blank&quot;&gt;Cloudflare Terraform provider documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 31 Jul 2025 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category></item><item><title>Magic Transit, Cloudflare WAN - Magic Transit and Magic WAN health check data is fully compatible with the CMB EU setting.</title><link>https://developers.cloudflare.com/changelog/post/2025-07-30-mt-mwan-health-check-cmb-eu/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-30-mt-mwan-health-check-cmb-eu/</guid><description>&lt;p&gt;Today, we are excited to announce that all Magic Transit and Magic WAN customers with CMB EU (&lt;a href=&quot;https://developers.cloudflare.com/data-localization/metadata-boundary/&quot;&gt;Customer Metadata Boundary - Europe&lt;/a&gt;) enabled in their account will be able to access GRE, IPsec, and CNI health check and traffic volume data in the Cloudflare dashboard and via API.&lt;/p&gt;
&lt;p&gt;This ensures that all Magic Transit and Magic WAN customers with CMB EU enabled will be able to access all Magic Transit and Magic WAN features.&lt;/p&gt;
&lt;p&gt;Specifically, these two GraphQL endpoints are now compatible with CMB EU:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;magicTransitTunnelHealthChecksAdaptiveGroups&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;magicTransitTunnelTrafficAdaptiveGroups&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Wed, 30 Jul 2025 00:00:00 GMT</pubDate><product>Magic Transit</product><category>Magic Transit</category><category>Cloudflare WAN</category></item><item><title>Gateway - Scam domain category introduced under Security Threats</title><link>https://developers.cloudflare.com/changelog/post/2025-07-28-spam-domain-category-introduced/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-28-spam-domain-category-introduced/</guid><description>&lt;p&gt;We have introduced a new Security Threat category called &lt;strong&gt;Scam&lt;/strong&gt;. Relevant domains are marked with the Scam category. Scam typically refers to fraudulent websites and schemes designed to trick victims into giving away money or personal information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;New category added&lt;/strong&gt;&lt;/p&gt;

















&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Parent ID&lt;/th&gt;&lt;th&gt;Parent Name&lt;/th&gt;&lt;th&gt;Category ID&lt;/th&gt;&lt;th&gt;Category Name&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;21&lt;/td&gt;&lt;td&gt;Security Threats&lt;/td&gt;&lt;td&gt;191&lt;/td&gt;&lt;td&gt;Scam&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;
&lt;p&gt;Refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/domain-categories/&quot;&gt;Gateway domain categories&lt;/a&gt; to learn more.&lt;/p&gt;</description><pubDate>Mon, 28 Jul 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.6.824.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-07-24-warp-windows-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-24-warp-windows-beta/</guid><description>&lt;p&gt;A new Beta release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improvements to better manage multi-user pre-login registrations.&lt;/li&gt;
&lt;li&gt;Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected.&lt;/li&gt;
&lt;li&gt;Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect.&lt;/li&gt;
&lt;li&gt;Improvement to managed network detection checks for faster switching between managed networks.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 version KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with &lt;code&gt;KB5055523&lt;/code&gt; installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 24 Jul 2025 12:28:40 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.6.824.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-07-24-warp-macos-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-24-warp-macos-beta/</guid><description>&lt;p&gt;A new Beta release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue preventing devices from reaching split-tunneled traffic even when WARP was disconnected.&lt;/li&gt;
&lt;li&gt;Fix to prevent WARP from re-enabling its firewall rules after a user-initiated disconnect.&lt;/li&gt;
&lt;li&gt;Improvement to managed network detection checks for faster switching between managed networks.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 24 Jul 2025 12:28:40 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Gateway - Gateway HTTP Filtering on all ports available in open BETA</title><link>https://developers.cloudflare.com/changelog/post/2025-07-24-http-inspection-on-all-ports/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-24-http-inspection-on-all-ports/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/&quot;&gt;Gateway&lt;/a&gt; can now apply &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/&quot;&gt;HTTP filtering&lt;/a&gt; to all proxied HTTP requests, not just traffic on standard HTTP (&lt;code&gt;80&lt;/code&gt;) and HTTPS (&lt;code&gt;443&lt;/code&gt;) ports. This means all requests can now be filtered by &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/antivirus-scanning/&quot;&gt;A/V scanning&lt;/a&gt;, &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/file-sandboxing/&quot;&gt;file sandboxing&lt;/a&gt;, &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/#data-in-transit&quot;&gt;Data Loss Prevention (DLP)&lt;/a&gt;, and more.&lt;/p&gt;
&lt;p&gt;You can turn this &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/network-policies/protocol-detection/#inspect-on-all-ports&quot;&gt;setting&lt;/a&gt; on by going to &lt;strong&gt;Settings&lt;/strong&gt; &gt; &lt;strong&gt;Network&lt;/strong&gt; &gt; &lt;strong&gt;Firewall&lt;/strong&gt; and choosing  &lt;em&gt;Inspect on all ports&lt;/em&gt;.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/Gateway-Inspection-all-ports.CCmwX6D0_OoDoS.webp&quot; alt=&quot;HTTP Inspection on all ports setting&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;To learn more, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/network-policies/protocol-detection/#inspect-on-all-ports&quot;&gt;Inspect on all ports (Beta)&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 24 Jul 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.5.943.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-07-23-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-23-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP proxy mode now uses the operating system&apos;s DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect.&lt;/li&gt;
&lt;li&gt;Changes to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#sccm-vpn-boundary-support&quot;&gt;SCCM VPN boundary support&lt;/a&gt; feature to no longer restart the SMS Agent Host (&lt;code&gt;ccmexec.exe&lt;/code&gt;) service.&lt;/li&gt;
&lt;li&gt;Fixed an issue affecting clients in Split Tunnel Include mode, where access to split-tunneled traffic was blocked after reconnecting the client.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 version KB5062553&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with &lt;code&gt;KB5055523&lt;/code&gt; installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Wed, 23 Jul 2025 20:41:54 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.5.943.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-07-23-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-23-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP proxy mode now uses the operating system&apos;s DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect.&lt;/li&gt;
&lt;li&gt;Fixed an issue affecting clients in Split Tunnel Include mode, where access to split-tunneled traffic was blocked after reconnecting the client.&lt;/li&gt;
&lt;li&gt;For macOS deployments, the WARP client can now be managed using an &lt;code&gt;mdm.xml&lt;/code&gt; file placed in &lt;code&gt;/Library/Application Support/Cloudflare/mdm.xml&lt;/code&gt;. This new configuration option offers an alternative to the still supported method of deploying a managed plist through an MDM solution.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Wed, 23 Jul 2025 20:41:33 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Linux (version 2025.5.943.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-07-23-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-23-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains minor fixes and improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP proxy mode now uses the operating system&apos;s DNS settings. Changes made to system DNS settings while in proxy mode require the client to be turned off then back on to take effect.&lt;/li&gt;
&lt;li&gt;Fixed an issue affecting clients in Split Tunnel Include mode, where access to split-tunneled traffic was blocked after reconnecting the client.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Wed, 23 Jul 2025 19:17:49 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Gateway - Google Bard Application replaced by Gemini</title><link>https://developers.cloudflare.com/changelog/post/2025-08-15-gemini-application-replaces-bard/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-08-15-gemini-application-replaces-bard/</guid><description>&lt;p&gt;The &lt;strong&gt;Google Bard&lt;/strong&gt; application (ID: 1198) has been deprecated and fully removed from the system. It has been replaced by the &lt;strong&gt;Gemini&lt;/strong&gt; application (ID: 1340).
Any existing Gateway policies that reference the old Google Bard application will no longer function.
To ensure your policies continue to work as intended, you should update them to use the new Gemini application.
We recommend replacing all instances of the deprecated Bard application with the new Gemini application in your Gateway policies.
For more information about application policies, please see the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/application-app-types/&quot;&gt;Cloudflare Gateway documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 22 Jul 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One, Cloudflare WAN - Virtual Cloudflare One Appliance with KVM support (open beta)</title><link>https://developers.cloudflare.com/changelog/post/2025-07-21-virtual-appliance-kvm-proxmox/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-21-virtual-appliance-kvm-proxmox/</guid><description>&lt;p&gt;The KVM-based virtual Cloudflare One Appliance is now in open beta with official support for Proxmox VE.&lt;/p&gt;
&lt;p&gt;Customers can deploy the virtual appliance on KVM hypervisors to connect branch or data center networks to Cloudflare WAN without dedicated hardware.&lt;/p&gt;
&lt;p&gt;For setup instructions, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/configure-virtual-appliance/&quot;&gt;Configure a virtual Cloudflare One Appliance&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Mon, 21 Jul 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Data Loss Prevention - New detection entry type: Document Matching for DLP</title><link>https://developers.cloudflare.com/changelog/post/2025-07-17-document-matching/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-17-document-matching/</guid><description>&lt;p&gt;You can now create &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/detection-entries/#documents&quot;&gt;document-based&lt;/a&gt; detection entries in DLP by uploading example documents. Cloudflare will encrypt your documents and create a unique fingerprint of the file. This fingerprint is then used to identify similar documents or snippets within your organization&apos;s traffic and stored files.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/document-match.CcN8pGgR_Z1e3PDm.webp&quot; alt=&quot;DLP&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;&lt;strong&gt;Key features and benefits:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Upload documents, forms, or templates:&lt;/strong&gt; Easily upload .docx and .txt files (up to 10 MB) that contain sensitive information you want to protect.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Granular control with similarity percentage:&lt;/strong&gt; Define a minimum similarity percentage (0-100%) that a document must meet to trigger a detection, reducing false positives.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Comprehensive coverage:&lt;/strong&gt; Apply these document-based detection entries in:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Gateway policies:&lt;/strong&gt; To inspect network traffic for sensitive documents as they are uploaded or shared.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;CASB (Cloud Access Security Broker):&lt;/strong&gt; To scan files stored in cloud applications for sensitive documents at rest.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Identify sensitive data:&lt;/strong&gt; This new detection entry type is ideal for identifying sensitive data within completed forms, templates, or even small snippets of a larger document, helping you prevent data exfiltration and ensure compliance.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Once uploaded and processed, you can add this new document entry into a DLP profile and policies to enhance your data protection strategy.&lt;/p&gt;</description><pubDate>Thu, 17 Jul 2025 00:00:00 GMT</pubDate><product>Data Loss Prevention</product><category>Data Loss Prevention</category></item><item><title>Cloudflare Tunnel, Cloudflare Tunnel for SASE - Faster, more reliable UDP traffic for Cloudflare Tunnel</title><link>https://developers.cloudflare.com/changelog/post/2025-07-15-udp-improvements/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-15-udp-improvements/</guid><description>&lt;p&gt;Your real-time applications running over &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/&quot;&gt;Cloudflare Tunnel&lt;/a&gt; are now faster and more reliable. We&apos;ve completely re-architected the way &lt;code&gt;cloudflared&lt;/code&gt; proxies UDP traffic in order to isolate it from other traffic, ensuring latency-sensitive applications like private DNS are no longer slowed down by heavy TCP traffic (like file transfers) on the same Tunnel.&lt;/p&gt;
&lt;p&gt;This is a foundational improvement to Cloudflare Tunnel, delivered automatically to all customers. There are no settings to configure — your UDP traffic is already flowing faster and more reliably.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What’s new:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Faster UDP performance&lt;/strong&gt;: We&apos;ve significantly reduced the latency for establishing new UDP sessions, making applications like private DNS much more responsive.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Greater reliability for mixed traffic&lt;/strong&gt;: UDP packets are no longer affected by heavy TCP traffic, preventing timeouts and connection drops for your real-time services.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Learn more about running &lt;a href=&quot;https://developers.cloudflare.com/reference-architecture/architectures/sase/#connecting-applications&quot;&gt;TCP or UDP applications&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/private-net/&quot;&gt;private networks&lt;/a&gt; through &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/&quot;&gt;Cloudflare Tunnel&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 15 Jul 2025 00:00:00 GMT</pubDate><product>Cloudflare Tunnel</product><category>Cloudflare Tunnel</category><category>Cloudflare Tunnel for SASE</category></item><item><title>Cloudflare One - New onboarding guides for Zero Trust</title><link>https://developers.cloudflare.com/changelog/post/2025-07-09-onboarding-resources/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-09-onboarding-resources/</guid><description>&lt;p&gt;Use our brand new onboarding experience for Cloudflare Zero Trust. New and returning users can now engage with a &lt;strong&gt;Get Started&lt;/strong&gt; tab with walkthroughs for setting up common use cases end-to-end.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/zt-onboarding-guides._18EfPbe_NEBk9.webp&quot; alt=&quot;Zero Trust onboarding guides&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;There are eight brand new onboarding guides in total:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Securely access a private network (sets up device client and Tunnel)&lt;/li&gt;
&lt;li&gt;Device-to-device / mesh networking (sets up and connects multiple device clients)&lt;/li&gt;
&lt;li&gt;Network to network connectivity (sets up and connects multiple WARP Connectors, makes reference to Magic WAN availability for Enterprise)&lt;/li&gt;
&lt;li&gt;Secure web traffic (sets up device client, Gateway, pre-reqs, and initial policies)&lt;/li&gt;
&lt;li&gt;Secure DNS for networks (sets up a new DNS location and Gateway policies)&lt;/li&gt;
&lt;li&gt;Clientless web access (sets up Access to a web app, Tunnel, and public hostname)&lt;/li&gt;
&lt;li&gt;Clientless SSH access (all the same + the web SSH experience)&lt;/li&gt;
&lt;li&gt;Clientless RDP access (all the same + RDP-in-browser)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Each flow walks the user through the steps to configure the essential elements, and provides a “more details” panel with additional contextual information about what the user will accomplish at the end, along with why the steps they take are important.&lt;/p&gt;
&lt;p&gt;Try them out now in the &lt;a href=&quot;https://one.dash.cloudflare.com/?to=/:account/home&quot; target=&quot;_blank&quot;&gt;Zero Trust dashboard&lt;/a&gt;!&lt;/p&gt;</description><pubDate>Thu, 10 Jul 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category></item><item><title>Cloudflare One - Cloudy summaries for Access and Gateway Logs</title><link>https://developers.cloudflare.com/changelog/post/2025-07-07-cloudy-summaries-access-gateway/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-07-cloudy-summaries-access-gateway/</guid><description>&lt;p&gt;Cloudy, Cloudflare&apos;s AI Agent, will now automatically summarize your &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/dashboard-logs/access-authentication-logs/&quot;&gt;Access&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/dashboard-logs/gateway-logs/&quot;&gt;Gateway&lt;/a&gt; block logs.&lt;/p&gt;
&lt;p&gt;In the log itself, Cloudy will summarize what occurred and why. This will be helpful for quick troubleshooting and issue correlation.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/cloudy-explanation.oFZR6cXa_Z2e1RtR.webp&quot; alt=&quot;Cloudy AI summarizes a log&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;If you have feedback about the Cloudy summary - good or bad - you can provide that right from the summary itself.&lt;/p&gt;</description><pubDate>Mon, 07 Jul 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category></item><item><title>Cloudflare One - New App Library for Zero Trust Dashboard</title><link>https://developers.cloudflare.com/changelog/post/2025-07-07-dashboard-app-library/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-07-dashboard-app-library/</guid><description>&lt;p&gt;Cloudflare Zero Trust customers can use the App Library to get full visibility over the SaaS applications that they use in their Gateway policies, CASB integrations, and Access for SaaS applications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;App Library&lt;/strong&gt;, found under &lt;strong&gt;My Team&lt;/strong&gt;, makes information available about all Applications that can be used across the Zero Trust product suite.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/app-library.D403GJ9j_1SfMgP.webp&quot; alt=&quot;Zero Trust App Library&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;You can use the App Library to see:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How Applications are defined&lt;/li&gt;
&lt;li&gt;Where they are referenced in policies&lt;/li&gt;
&lt;li&gt;Whether they have Access for SaaS configured&lt;/li&gt;
&lt;li&gt;Review their CASB findings and integration status.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Within individual Applications, you can also track their usage across your organization, and better understand user behavior.&lt;/p&gt;</description><pubDate>Mon, 07 Jul 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category></item><item><title>Access - Access RDP securely from your browser — now in open beta</title><link>https://developers.cloudflare.com/changelog/post/2025-07-01-browser-based-rdp-open-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-07-01-browser-based-rdp-open-beta/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/rdp/rdp-browser/&quot;&gt;Browser-based RDP&lt;/a&gt; with &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/policies/&quot;&gt;Cloudflare Access&lt;/a&gt; is now available in open beta for all Cloudflare customers. It enables secure, remote Windows server access without VPNs or RDP clients.&lt;/p&gt;
&lt;p&gt;With browser-based RDP, you can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Control how users authenticate to internal RDP resources&lt;/strong&gt; with single sign-on (SSO), multi-factor authentication (MFA), and granular access policies.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Record who is accessing which servers and when&lt;/strong&gt; to support regulatory compliance requirements and to gain greater visibility in the event of a security event.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Eliminate the need to install and manage software on user devices&lt;/strong&gt;. You will only need a web browser.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Reduce your attack surface&lt;/strong&gt; by keeping your RDP servers off the public Internet and protecting them from common threats like credential stuffing or brute-force attacks.&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/browser-based-rdp-access-app.BNXce1JL_1TDoUX.webp&quot; alt=&quot;Example of a browsed-based RDP Access application&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;To get started, see &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/rdp/rdp-browser/&quot;&gt;Connect to RDP in a browser&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 01 Jul 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.5.893.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-06-30-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-06-30-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains improvements and new exciting features, including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#sccm-vpn-boundary-support&quot;&gt;SCCM VPN boundary support&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;post-quantum cryptography&lt;/a&gt;. By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate protection of post-quantum cryptography without needing to upgrade any of your individual corporate applications or systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed a device registration issue that caused WARP connection failures when changing networks.&lt;/li&gt;
&lt;li&gt;Captive portal improvements and fixes:&lt;ul&gt;
&lt;li&gt;Captive portal sign in notifications will now be sent through operating system notification services.&lt;/li&gt;
&lt;li&gt;Fix for firewall configuration issue affecting clients in DoH only mode.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Improved the connectivity status message in the client GUI.&lt;/li&gt;
&lt;li&gt;Fixed a bug affecting clients in Gateway with DoH mode where the original DNS servers were not restored after disabling WARP.&lt;/li&gt;
&lt;li&gt;The WARP client now applies post-quantum cryptography end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;enabled by MDM&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Improvement to handle client configuration changes made by an MDM while WARP is not running.&lt;/li&gt;
&lt;li&gt;Improvements for multi-user experience to better handle fast user switching and transitions from a pre-login to a logged-in state.&lt;/li&gt;
&lt;li&gt;Added a WARP client device posture check for SAN attributes to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/warp-client-checks/client-certificate/&quot;&gt;client certificate check&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and Ethernet networks.&lt;/li&gt;
&lt;li&gt;Added &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#sccm-vpn-boundary-support&quot;&gt;SCCM VPN boundary support&lt;/a&gt; to device profile settings. With SCCM VPN boundary support enabled, operating systems will register WARP&apos;s local interface IP with the on-premise DNS server when reachable.&lt;/li&gt;
&lt;li&gt;Fix for an issue causing WARP connectivity to fail without full system reboot.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum &lt;a href=&quot;https://support.microsoft.com/en-us/topic/july-8-2025-kb5062553-os-build-26100-4652-523e69cb-051b-43c6-8376-6a76d6caeefd&quot;&gt;Windows 11 24H2 version KB5060829&lt;/a&gt; or higher for resolution.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with &lt;code&gt;KB5055523&lt;/code&gt; installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 30 Jun 2025 21:10:37 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.5.893.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-06-30-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-06-30-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains improvements and new exciting features, including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;post-quantum cryptography&lt;/a&gt;. By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate protection of post-quantum cryptography without needing to upgrade any of your individual corporate applications or systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue where WARP sometimes failed to automatically relaunch after updating.&lt;/li&gt;
&lt;li&gt;Fixed a device registration issue causing WARP connection failures when changing networks.&lt;/li&gt;
&lt;li&gt;Captive portal improvements and fixes:&lt;ul&gt;
&lt;li&gt;Captive portal sign in notifications will now be sent through operating system notification services.&lt;/li&gt;
&lt;li&gt;Fix for firewall configuration issue affecting clients in DoH only mode.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Improved the connectivity status message in the client GUI.&lt;/li&gt;
&lt;li&gt;The WARP client now applies post-quantum cryptography end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;enabled by MDM&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Improvement to handle client configuration changes made by an MDM while WARP is not running.&lt;/li&gt;
&lt;li&gt;Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and Ethernet networks.&lt;/li&gt;
&lt;li&gt;Improvement for WARP connectivity issues on macOS due to the operating system not accepting DNS server configurations.&lt;/li&gt;
&lt;li&gt;Added a WARP client device posture check for SAN attributes to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/warp-client-checks/client-certificate/&quot;&gt;client certificate check&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 30 Jun 2025 21:10:36 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Linux (version 2025.5.893.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-06-30-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-06-30-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains improvements and new exciting features, including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;post-quantum cryptography&lt;/a&gt;. By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate protection of post-quantum cryptography without needing to upgrade any of your individual corporate applications or systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed a device registration issue causing WARP connection failures when changing networks.&lt;/li&gt;
&lt;li&gt;Captive portal improvements and fixes:&lt;ul&gt;
&lt;li&gt;Captive portal sign in notifications will now be sent through operating system notification services.&lt;/li&gt;
&lt;li&gt;Fix for firewall configuration issue affecting clients in DoH only mode.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Improved the connectivity status message in the client GUI.&lt;/li&gt;
&lt;li&gt;The WARP client now applies post-quantum cryptography end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;enabled by MDM&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Improvement to handle client configuration changes made by MDM while WARP is not running.&lt;/li&gt;
&lt;li&gt;Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and Ethernet networks.&lt;/li&gt;
&lt;li&gt;Added a WARP client device posture check for SAN attributes to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/warp-client-checks/client-certificate/&quot;&gt;client certificate check&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 30 Jun 2025 19:44:34 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - Cloudflare One Agent for Android (version 2.4.2)</title><link>https://developers.cloudflare.com/changelog/post/2025-06-30-warp-ga-android/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-06-30-warp-ga-android/</guid><description>&lt;p&gt;A new GA release for the Android Cloudflare One Agent is now available in the &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.cloudflare.cloudflareoneagent&quot; target=&quot;_blank&quot;&gt;Google Play Store&lt;/a&gt;. This release
contains improvements and new exciting features, including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;post-quantum cryptography&lt;/a&gt;.
By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate &lt;a href=&quot;https://blog.cloudflare.com/pq-2024/&quot; target=&quot;_blank&quot;&gt;protection of post-quantum cryptography&lt;/a&gt; without needing to upgrade any of your individual corporate applications or systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;QLogs are now disabled by default and can be enabled in the app by turning on &lt;strong&gt;Enable qlogs&lt;/strong&gt; under &lt;strong&gt;Settings&lt;/strong&gt; &gt; &lt;strong&gt;Advanced&lt;/strong&gt; &gt; &lt;strong&gt;Diagnostics&lt;/strong&gt; &gt; &lt;strong&gt;Debug Logs&lt;/strong&gt;. The QLog setting from previous releases will no longer be respected.&lt;/li&gt;
&lt;li&gt;DNS over HTTPS traffic is now included in the WARP tunnel by default.&lt;/li&gt;
&lt;li&gt;The WARP client now applies &lt;a href=&quot;https://blog.cloudflare.com/pq-2024/&quot; target=&quot;_blank&quot;&gt;post-quantum cryptography&lt;/a&gt; end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be enabled by &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;MDM&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fixed an issue that caused WARP connection failures on ChromeOS devices.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 30 Jun 2025 00:00:00 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - Cloudflare One Agent for iOS (version 1.11)</title><link>https://developers.cloudflare.com/changelog/post/2025-06-30-warp-ga-ios/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-06-30-warp-ga-ios/</guid><description>&lt;p&gt;A new GA release for the iOS Cloudflare One Agent is now available in the &lt;a href=&quot;https://apps.apple.com/us/app/cloudflare-one-agent/id6443476492&quot; target=&quot;_blank&quot;&gt;iOS App Store&lt;/a&gt;. This release
contains improvements and new exciting features, including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;post-quantum cryptography&lt;/a&gt;.
By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate &lt;a href=&quot;https://blog.cloudflare.com/pq-2024/&quot; target=&quot;_blank&quot;&gt;protection of post-quantum cryptography&lt;/a&gt; without needing to upgrade any of your individual corporate applications or systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;QLogs are now disabled by default and can be enabled in the app by turning on &lt;strong&gt;Enable qlogs&lt;/strong&gt; under &lt;strong&gt;Settings&lt;/strong&gt; &gt; &lt;strong&gt;Advanced&lt;/strong&gt; &gt; &lt;strong&gt;Diagnostics&lt;/strong&gt; &gt; &lt;strong&gt;Debug Logs&lt;/strong&gt;. The QLog setting from previous releases will no longer be respected.&lt;/li&gt;
&lt;li&gt;DNS over HTTPS traffic is now included in the WARP tunnel by default.&lt;/li&gt;
&lt;li&gt;The WARP client now applies &lt;a href=&quot;https://blog.cloudflare.com/pq-2024/&quot; target=&quot;_blank&quot;&gt;post-quantum cryptography&lt;/a&gt; end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be enabled by &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;MDM&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 30 Jun 2025 00:00:00 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Data Loss Prevention, CASB, Cloudflare One - Data Security Analytics in the Zero Trust dashboard</title><link>https://developers.cloudflare.com/changelog/post/cf1-data-security-analytics-v1/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/cf1-data-security-analytics-v1/</guid><description>&lt;p&gt;Zero Trust now includes &lt;strong&gt;Data security analytics&lt;/strong&gt;, providing you with unprecedented visibility into your organization sensitive data.&lt;/p&gt;
&lt;p&gt;The new dashboard includes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Sensitive Data Movement Over Time:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;See patterns and trends in how sensitive data moves across your environment. This helps understand where data is flowing and identify common paths.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Sensitive Data at Rest in SaaS &amp;#x26; Cloud:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;View an inventory of sensitive data stored within your corporate SaaS applications (for example, Google Drive, Microsoft 365) and cloud accounts (such as AWS S3).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;DLP Policy Activity:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identify which of your Data Loss Prevention (DLP) policies are being triggered most often.&lt;/li&gt;
&lt;li&gt;See which specific users are responsible for triggering DLP policies.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/cf1-data-security-analytics-v1.BGl6fYXl_H3N0P.webp&quot; alt=&quot;Data Security Analytics&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;To access the new dashboard, log in to &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Cloudflare One&lt;/a&gt; and go to &lt;strong&gt;Insights&lt;/strong&gt; on the sidebar.&lt;/p&gt;</description><pubDate>Mon, 23 Jun 2025 09:00:00 GMT</pubDate><product>Data Loss Prevention</product><category>Data Loss Prevention</category><category>CASB</category><category>Cloudflare One</category></item><item><title>Gateway - Gateway will now evaluate Network policies before HTTP policies from July 14th, 2025</title><link>https://developers.cloudflare.com/changelog/post/2025-06-17-new-order-of-enforcement/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-06-17-new-order-of-enforcement/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/&quot;&gt;Gateway&lt;/a&gt; will now evaluate &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/network-policies/&quot;&gt;Network (Layer 4) policies&lt;/a&gt; &lt;strong&gt;before&lt;/strong&gt; &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/&quot;&gt;HTTP (Layer 7) policies&lt;/a&gt;. This change preserves your existing security posture and does not affect which traffic is filtered — but it may impact how notifications are displayed to end users.&lt;/p&gt;
&lt;p&gt;This change will roll out progressively between &lt;strong&gt;July 14–18, 2025&lt;/strong&gt;. If you use HTTP policies, we recommend reviewing your configuration ahead of rollout to ensure the user experience remains consistent.&lt;/p&gt;
&lt;h4&gt;Updated order of enforcement&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Previous order:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;DNS policies&lt;/li&gt;
&lt;li&gt;HTTP policies&lt;/li&gt;
&lt;li&gt;Network policies&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;New order:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;DNS policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network policies&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;HTTP policies&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h4&gt;Action required: Review your Gateway HTTP policies&lt;/h4&gt;
&lt;p&gt;This change may affect block notifications. For example:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;You have an &lt;strong&gt;HTTP policy&lt;/strong&gt; to block &lt;code&gt;example.com&lt;/code&gt; and display a block page.&lt;/li&gt;
&lt;li&gt;You also have a &lt;strong&gt;Network policy&lt;/strong&gt; to block &lt;code&gt;example.com&lt;/code&gt; silently (no client notification).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;With the new order, the Network policy will trigger first — and the user will no longer see the HTTP block page.&lt;/p&gt;
&lt;p&gt;To ensure users still receive a block notification, you can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Add a client notification to your Network policy, or&lt;/li&gt;
&lt;li&gt;Use only the HTTP policy for that domain.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h4&gt;Why we’re making this change&lt;/h4&gt;
&lt;p&gt;This update is based on user feedback and aims to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Create a more intuitive model by evaluating network-level policies before application-level policies.&lt;/li&gt;
&lt;li&gt;Minimize &lt;a href=&quot;https://developers.cloudflare.com/support/troubleshooting/http-status-codes/cloudflare-5xx-errors/error-526/#error-526-in-the-zero-trust-context&quot;&gt;526 connection errors&lt;/a&gt; by verifying the network path to an origin before attempting to establish a decrypted TLS connection.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;To learn more, visit the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/order-of-enforcement/&quot;&gt;Gateway order of enforcement documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 18 Jun 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.5.828.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-06-17-warp-windows-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-06-17-warp-windows-beta/</guid><description>&lt;p&gt;A new Beta release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains new improvements in addition to the features and improvements introduced in Beta client version 2025.5.735.1.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improvement to better handle multi-user fast user switching.&lt;/li&gt;
&lt;li&gt;Fix for an issue causing WARP connectivity to fail without full system reboot.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Microsoft has confirmed a regression with Windows 11 starting around 24H2 that may cause performance issues for some users. These performance issues could manifest as mouse lag, audio cracking, or other slowdowns. A fix from Microsoft is expected in early July.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with &lt;code&gt;KB5055523&lt;/code&gt; installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.
To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 17 Jun 2025 12:04:39 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.5.828.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-06-17-warp-macos-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-06-17-warp-macos-beta/</guid><description>&lt;p&gt;A new Beta release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains new improvements in addition to the features and improvements introduced in Beta client version 2025.5.735.1.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improvement for WARP connectivity issues on macOS due to the operating system not accepting DNS server configurations.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 17 Jun 2025 12:04:39 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.5.735.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-06-05-warp-windows-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-06-05-warp-windows-beta/</guid><description>&lt;p&gt;A new Beta release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains improvements and new exciting features, including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#sccm-vpn-boundary-support&quot;&gt;SCCM VPN boundary support&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;post-quantum cryptography&lt;/a&gt;. By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate protection of post-quantum cryptography without needing to upgrade any of your individual corporate applications or systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed a device registration issue causing WARP connection failures when changing networks.&lt;/li&gt;
&lt;li&gt;Captive portal improvements including showing connectivity status in the client and sending system notifications for captive portal sign in.&lt;/li&gt;
&lt;li&gt;Fixed a bug where in Gateway with DoH mode, connection to DNS servers was not automatically restored after reconnecting WARP.&lt;/li&gt;
&lt;li&gt;The WARP client now applies post-quantum cryptography end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;enabled by MDM&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Improvement to gracefully handle changes made by MDM while WARP is not running.&lt;/li&gt;
&lt;li&gt;Improvement for multi-user mode to avoid unnecessary key rotations when transitioning from a pre-login to a logged-in state.&lt;/li&gt;
&lt;li&gt;Added a WARP client device posture check for SAN attributes to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/posture-checks/warp-client-checks/client-certificate/&quot;&gt;client certificate check&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and Ethernet networks.&lt;/li&gt;
&lt;li&gt;Added &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/#sccm-vpn-boundary-support&quot;&gt;SCCM VPN boundary support&lt;/a&gt; to device profile settings. With SCCM VPN boundary support enabled, operating systems will register WARP&apos;s local interface IP with the on-premise DNS server when reachable.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Microsoft has confirmed a regression with Windows 11 starting around 24H2 that may cause performance issues for some users. These performance issues could manifest as mouse lag, audio cracking, or other slowdowns. A fix from Microsoft is expected in early July.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with &lt;code&gt;KB5055523&lt;/code&gt; installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.
To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 05 Jun 2025 20:38:05 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.5.735.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-06-05-warp-macos-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-06-05-warp-macos-beta/</guid><description>&lt;p&gt;A new Beta release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains improvements and new exciting features, including &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;post-quantum cryptography&lt;/a&gt;. By tunneling your corporate network traffic over Cloudflare, you can now gain the immediate protection of post-quantum cryptography without needing to upgrade any of your individual corporate applications or systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue where the Cloudflare WARP application may not have automatically relaunched after an update.&lt;/li&gt;
&lt;li&gt;Fixed a device registration issue causing WARP connection failures when changing networks.&lt;/li&gt;
&lt;li&gt;Captive portal improvements including showing connectivity status in the client and sending system notifications for captive portal sign in.&lt;/li&gt;
&lt;li&gt;The WARP client now applies post-quantum cryptography end-to-end on enabled devices accessing resources behind a Cloudflare Tunnel. This feature can be &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/mdm-deployment/parameters/#enable_post_quantum&quot;&gt;enabled by MDM&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Improvement to gracefully handle changes made by MDM while WARP is not running.&lt;/li&gt;
&lt;li&gt;Fixed an issue affecting Split Tunnel Include mode, where traffic outside the tunnel was blocked when switching between Wi-Fi and Ethernet networks.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 05 Jun 2025 20:38:04 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Access, Cloudflare One - Cloudflare One Analytics Dashboards and Exportable Access Report</title><link>https://developers.cloudflare.com/changelog/post/dashboards-access-report/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/dashboards-access-report/</guid><description>&lt;p&gt;Cloudflare One now offers powerful new analytics dashboards to help customers easily discover available insights into their application access and network activity. These dashboards provide a centralized, intuitive view for understanding user behavior, application usage, and security posture.&lt;/p&gt;
&lt;p&gt;![Cloudflare One Analytics Dashboards](~/assets/images/changelog/cloudflare-one/Analytics Dashboards.png)&lt;/p&gt;
&lt;p&gt;Additionally, a new exportable access report is available, allowing customers to quickly view high-level metrics and trends in their application access. A &lt;strong&gt;preview&lt;/strong&gt; of the report is shown below, with more to be found in the report:&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/access-report.C744W7JR_2uzMcN.webp&quot; alt=&quot;Cloudflare One Analytics Dashboards&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;Both features are accessible in the Cloudflare &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Zero Trust dashboard&lt;/a&gt;, empowering organizations with better visibility and control.&lt;/p&gt;</description><pubDate>Thu, 05 Jun 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category><category>Cloudflare One</category></item><item><title>Gateway, Cloudflare One - New Gateway Analytics in the Cloudflare One Dashboard</title><link>https://developers.cloudflare.com/changelog/post/gateway-analytics-v2/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/gateway-analytics-v2/</guid><description>&lt;p&gt;Users can now access significant enhancements to Cloudflare Gateway analytics, providing you with unprecedented visibility into your organization&apos;s DNS queries, HTTP requests, and Network sessions. These powerful new dashboards enable you to go beyond raw logs and gain actionable insights into how your users are interacting with the Internet and your protected resources.&lt;/p&gt;
&lt;p&gt;You can now visualize and explore:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Patterns Over Time: Understand trends in traffic volume and blocked requests, helping you identify anomalies and plan for future capacity.&lt;/li&gt;
&lt;li&gt;Top Users &amp;#x26; Destinations: Quickly pinpoint the most active users, enabling better policy enforcement and resource allocation.&lt;/li&gt;
&lt;li&gt;Actions Taken: See a clear breakdown of security actions applied by Gateway policies, such as blocks and allows, offering a comprehensive view of your security posture.&lt;/li&gt;
&lt;li&gt;Geographic Regions: Gain insight into the global distribution of your traffic.&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/gateway-analytics.BdSwbIBb_1WTkQL.webp&quot; alt=&quot;Gateway Analytics&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;To access the new overview, log in to your Cloudflare &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Zero Trust dashboard&lt;/a&gt; and go to Analytics in the side navigation bar.&lt;/p&gt;</description><pubDate>Thu, 29 May 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category><category>Cloudflare One</category></item><item><title>Gateway - Gateway Protocol Detection Now Available for PAYGO and Free Plans</title><link>https://developers.cloudflare.com/changelog/post/2025-05-27-protocol-detection-availability/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-27-protocol-detection-availability/</guid><description>&lt;p&gt;All Cloudflare One Gateway users can now use Protocol detection logging and filtering, including those on Pay-as-you-go and Free plans.&lt;/p&gt;
&lt;p&gt;With Protocol Detection, admins can identify and enforce policies on traffic proxied through Gateway based on the underlying network protocol (for example, HTTP, TLS, or SSH), enabling more granular traffic control and security visibility no matter your plan tier.&lt;/p&gt;
&lt;p&gt;This feature is available to enable in your account network settings for all accounts. For more information on using Protocol Detection, refer to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/network-policies/protocol-detection/&quot;&gt;Protocol detection documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 27 May 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.4.943.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-05-22-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-22-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains a hotfix for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/managed-networks/&quot;&gt;managed networks&lt;/a&gt; for the 2025.4.929.0 release.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue where it could take up to 3 minutes for the correct device profile to be applied in some circumstances. In the worst case, it should now only take up to 40 seconds. This will be improved further in a future release.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Microsoft has confirmed a regression with Windows 11 starting around 24H2 that may cause performance issues for some users. These performance issues could manifest as mouse lag, audio cracking, or other slowdowns. A fix from Microsoft is expected in early July.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with &lt;code&gt;KB5055523&lt;/code&gt; installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 22 May 2025 21:34:06 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.4.943.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-05-22-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-22-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains a hotfix for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/managed-networks/&quot;&gt;managed networks&lt;/a&gt; for the 2025.4.929.0 release.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue where it could take up to 3 minutes for the correct device profile to be applied in some circumstances. In the worst case, it should now only take up to 40 seconds. This will be improved further in a future release.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 22 May 2025 21:34:06 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for Linux (version 2025.4.943.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-05-22-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-22-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains a hotfix for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/managed-networks/&quot;&gt;managed networks&lt;/a&gt; for the 2025.4.929.0 release.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue where it could take up to 3 minutes for the correct device profile to be applied in some circumstances. In the worst case, it should now only take up to 40 seconds. This will be improved further in a future release.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 22 May 2025 19:22:32 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One - New Applications Added to Zero Trust</title><link>https://developers.cloudflare.com/changelog/post/new-applications-71825/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/new-applications-71825/</guid><description>&lt;p&gt;42 new applications have been added for Zero Trust support within the Application Library and Gateway policy enforcement, giving you the ability to investigate or apply inline policies to these applications.&lt;/p&gt;
&lt;p&gt;33 of the 42 applications are Artificial Intelligence applications. The others are Human Resources (2 applications), Development (2 applications), Productivity (2 applications), Sales &amp;#x26; Marketing, Public Cloud, and Security.&lt;/p&gt;
&lt;p&gt;To view all available applications, log in to your Cloudflare &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Zero Trust dashboard&lt;/a&gt;, navigate to the &lt;strong&gt;App Library&lt;/strong&gt; under &lt;strong&gt;My Team&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;For more information on creating Gateway policies, see our &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/&quot;&gt;Gateway policy documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Sun, 18 May 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category></item><item><title>Access, Cloudflare One - New Access Analytics in the Cloudflare One Dashboard</title><link>https://developers.cloudflare.com/changelog/post/access-analytics-v2/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/access-analytics-v2/</guid><description>&lt;p&gt;A new Access Analytics dashboard is now available to all Cloudflare One customers. Customers can apply and combine multiple filters to dive into specific slices of their Access metrics. These filters include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Logins granted and denied&lt;/li&gt;
&lt;li&gt;Access events by type (SSO, Login, Logout)&lt;/li&gt;
&lt;li&gt;Application name (Salesforce, Jira, Slack, etc.)&lt;/li&gt;
&lt;li&gt;Identity provider (Okta, Google, Microsoft, onetimepin, etc.)&lt;/li&gt;
&lt;li&gt;Users (&lt;code&gt;chris@cloudflare.com&lt;/code&gt;, &lt;code&gt;sally@cloudflare.com&lt;/code&gt;, &lt;code&gt;rachel@cloudflare.com&lt;/code&gt;, etc.)&lt;/li&gt;
&lt;li&gt;Countries (US, CA, UK, FR, BR, CN, etc.)&lt;/li&gt;
&lt;li&gt;Source IP address&lt;/li&gt;
&lt;li&gt;App type (self-hosted, Infrastructure, RDP, etc.)&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/accessanalytics.DYXgwZCl_Z2PPi7.webp&quot; alt=&quot;Access Analytics&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;To access the new overview, log in to your Cloudflare &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Zero Trust dashboard&lt;/a&gt; and find Analytics in the side navigation bar.&lt;/p&gt;</description><pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category><category>Cloudflare One</category></item><item><title>Email security - Open email attachments with Browser Isolation</title><link>https://developers.cloudflare.com/changelog/post/2025-05-08-open-attachments-with-browser-isolation/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-08-open-attachments-with-browser-isolation/</guid><description>&lt;p&gt;You can now safely open email attachments to view and investigate them.&lt;/p&gt;
&lt;p&gt;What this means is that messages now have a &lt;strong&gt;Attachments&lt;/strong&gt; section. Here, you can view processed attachments and their classifications (for example, &lt;em&gt;Malicious&lt;/em&gt;, &lt;em&gt;Suspicious&lt;/em&gt;, &lt;em&gt;Encrypted&lt;/em&gt;). Next to each attachment, a &lt;strong&gt;Browser Isolation&lt;/strong&gt; icon allows your team to safely open the file in a &lt;strong&gt;clientless, isolated browser&lt;/strong&gt; with no risk to the analyst or your environment.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/Attachment-RBI.U9Dp8dJO_265xjw.webp&quot; alt=&quot;Attachment-RBI&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;To use this feature, you must:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Enable &lt;strong&gt;Clientless Web Isolation&lt;/strong&gt; in your Zero Trust settings.&lt;/li&gt;
&lt;li&gt;Have &lt;strong&gt;Browser Isolation (BISO)&lt;/strong&gt; seats assigned.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more details, refer to our &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/&quot;&gt;setup guide&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Some attachment types may not render in Browser Isolation. If there is a file type that you would like to be opened with Browser Isolation, reach out to your Cloudflare contact.&lt;/p&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 15 May 2025 23:22:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.4.929.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-05-14-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-14-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains two significant changes all customers should be aware of:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local firewall rules to allow our &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/firewall/#doh-ip&quot;&gt;DoH IP addresses and domains&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we detect that HTTP/3 traffic is blocked. This allows for a much more reliable connection on some public WiFi networks.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue causing reconnection loops when captive portals are detected.&lt;/li&gt;
&lt;li&gt;Fixed an issue that caused WARP client disk encryption posture checks to fail due to missing drive names.&lt;/li&gt;
&lt;li&gt;Fixed an issue where managed network policies could incorrectly report network location beacons as missing.&lt;/li&gt;
&lt;li&gt;Improved DEX test error reporting.&lt;/li&gt;
&lt;li&gt;Fixed an issue where some parts of the WARP Client UI were missing in high contrast mode.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.&lt;/li&gt;
&lt;li&gt;Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or HTTP/3 specifically.&lt;/li&gt;
&lt;li&gt;Added new IP addresses for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/firewall/#connectivity-checks&quot;&gt;tunnel connectivity checks&lt;/a&gt;. If your organization uses a firewall or other policies you will need to exempt these IPs.&lt;/li&gt;
&lt;li&gt;DNS over HTTPS traffic is now included in the WARP tunnel by default.&lt;/li&gt;
&lt;li&gt;Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.&lt;/li&gt;
&lt;li&gt;Improved handling of non-SLAAC IPv6 interface addresses for better connectivity in IPv6 only environments.&lt;/li&gt;
&lt;li&gt;Fixed an issue where frequent network changes could cause WARP to become unresponsive.&lt;/li&gt;
&lt;li&gt;Improvement for WARP to check if tunnel connectivity fails or times out at device wake before attempting to reconnect.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing WARP connection disruptions after network changes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Microsoft has confirmed a regression with Windows 11 starting around 24H2 that may cause performance issues for some users. These performance issues could manifest as mouse lag, audio cracking, or other slowdowns. A fix from Microsoft is expected in early July.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Devices with &lt;code&gt;KB5055523&lt;/code&gt; installed may receive a warning about &lt;code&gt;Win32/ClickFix.ABA&lt;/code&gt; being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to &lt;a href=&quot;https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.429.19.0&quot;&gt;version 1.429.19.0&lt;/a&gt; or later.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Wed, 14 May 2025 21:32:45 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Gateway - Domain Categories improvements</title><link>https://developers.cloudflare.com/changelog/post/2025-05-14-domain-category-improvements/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-14-domain-category-improvements/</guid><description>&lt;p&gt;&lt;strong&gt;New categories added&lt;/strong&gt;&lt;/p&gt;





















































&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Parent ID&lt;/th&gt;&lt;th&gt;Parent Name&lt;/th&gt;&lt;th&gt;Category ID&lt;/th&gt;&lt;th&gt;Category Name&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;1&lt;/td&gt;&lt;td&gt;Ads&lt;/td&gt;&lt;td&gt;66&lt;/td&gt;&lt;td&gt;Advertisements&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;3&lt;/td&gt;&lt;td&gt;Business &amp;#x26; Economy&lt;/td&gt;&lt;td&gt;185&lt;/td&gt;&lt;td&gt;Personal Finance&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;3&lt;/td&gt;&lt;td&gt;Business &amp;#x26; Economy&lt;/td&gt;&lt;td&gt;186&lt;/td&gt;&lt;td&gt;Brokerage &amp;#x26; Investing&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;21&lt;/td&gt;&lt;td&gt;Security Threats&lt;/td&gt;&lt;td&gt;187&lt;/td&gt;&lt;td&gt;Compromised Domain&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;21&lt;/td&gt;&lt;td&gt;Security Threats&lt;/td&gt;&lt;td&gt;188&lt;/td&gt;&lt;td&gt;Potentially Unwanted Software&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;6&lt;/td&gt;&lt;td&gt;Education&lt;/td&gt;&lt;td&gt;189&lt;/td&gt;&lt;td&gt;Reference&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;9&lt;/td&gt;&lt;td&gt;Government &amp;#x26; Politics&lt;/td&gt;&lt;td&gt;190&lt;/td&gt;&lt;td&gt;Charity and Non-profit&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Changes to existing categories&lt;/strong&gt;&lt;/p&gt;





















&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Original Name&lt;/th&gt;&lt;th&gt;New Name&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Religion&lt;/td&gt;&lt;td&gt;Religion &amp;#x26; Spirituality&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Government&lt;/td&gt;&lt;td&gt;Government/Legal&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Redirect&lt;/td&gt;&lt;td&gt;URL Alias/Redirect&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;
&lt;p&gt;Refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/domain-categories/&quot;&gt;Gateway domain categories&lt;/a&gt; to learn more.&lt;/p&gt;</description><pubDate>Wed, 14 May 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Browser Isolation - SAML HTTP-POST bindings support for RBI</title><link>https://developers.cloudflare.com/changelog/post/2025-05-13-rbi-saml-post-support/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-13-rbi-saml-post-support/</guid><description>&lt;p&gt;Remote Browser Isolation (RBI) now supports SAML HTTP-POST bindings, enabling seamless authentication for SSO-enabled applications that rely on POST-based SAML responses from Identity Providers (IdPs) within a Remote Browser Isolation session. This update resolves a previous limitation that caused &lt;code&gt;405&lt;/code&gt; errors during login and improves compatibility with multi-factor authentication (MFA) flows.&lt;/p&gt;
&lt;p&gt;With expanded support for major IdPs like Okta and Azure AD, this enhancement delivers a more consistent and user-friendly experience across authentication workflows. Learn how to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/remote-browser-isolation/setup/&quot;&gt;set up Remote Browser Isolation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 13 May 2025 00:00:00 GMT</pubDate><product>Browser Isolation</product><category>Browser Isolation</category></item><item><title>Gateway - New Applications Added for DNS Filtering</title><link>https://developers.cloudflare.com/changelog/post/2025-05-13-new-applications-added/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-13-new-applications-added/</guid><description>&lt;p&gt;You can now create DNS policies to manage outbound traffic for an expanded list of applications.
This update adds support for 273 new applications, giving you more control over your organization&apos;s outbound traffic.&lt;/p&gt;
&lt;p&gt;With this update, you can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Create DNS policies for a wider range of applications&lt;/li&gt;
&lt;li&gt;Manage outbound traffic more effectively&lt;/li&gt;
&lt;li&gt;Improve your organization&apos;s security and compliance posture&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more information on creating DNS policies, see our &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/dns-policies/&quot;&gt;DNS policy documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 13 May 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One Client - WARP client for Linux (version 2025.4.929.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-05-12-warp-linux-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-12-warp-linux-ga/</guid><description>&lt;p&gt;A new GA release for the Linux WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains two significant changes all customers should be aware of:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local firewall rules to allow our &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/firewall/#doh-ip&quot;&gt;DoH IP addresses and domains&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we detect that HTTP/3 traffic is blocked. This allows for a much more reliable connection on some public WiFi networks.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue where the managed network policies could incorrectly report network location beacons as missing.&lt;/li&gt;
&lt;li&gt;Improved DEX test error reporting.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.&lt;/li&gt;
&lt;li&gt;Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or HTTP/3 specifically.&lt;/li&gt;
&lt;li&gt;Added new IP addresses for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/firewall/#connectivity-checks&quot;&gt;tunnel connectivity checks&lt;/a&gt;. If your organization uses a firewall or other policies you will need to exempt these IPs.&lt;/li&gt;
&lt;li&gt;Fixed an issue where frequent network changes could cause WARP to become unresponsive.&lt;/li&gt;
&lt;li&gt;DNS over HTTPS traffic is now included in the WARP tunnel by default.&lt;/li&gt;
&lt;li&gt;Improvement for WARP to check if tunnel connectivity fails or times out at device wake before attempting to reconnect.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing WARP connection disruptions after network changes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/route-traffic/local-domains/#route-traffic-to-fallback-server&quot;&gt;Route traffic to fallback server&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 12 May 2025 23:21:47 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.4.929.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-05-12-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-12-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains two significant changes all customers should be aware of:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;All DNS traffic now flows inside the WARP tunnel. Customers are no longer required to configure their local firewall rules to allow our &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/firewall/#doh-ip&quot;&gt;DoH IP addresses and domains&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;When using MASQUE, the connection will fall back to HTTP/2 (TCP) when we detect that HTTP/3 traffic is blocked. This allows for a much more reliable connection on some public WiFi networks.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue where the managed network policies could incorrectly report network location beacons as missing.&lt;/li&gt;
&lt;li&gt;Improved DEX test error reporting.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.&lt;/li&gt;
&lt;li&gt;Improved captive portal detection.&lt;/li&gt;
&lt;li&gt;Added a TCP fallback for the MASQUE tunnel protocol to improve connectivity on networks that block UDP or HTTP/3 specifically.&lt;/li&gt;
&lt;li&gt;Added new IP addresses for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/firewall/#connectivity-checks&quot;&gt;tunnel connectivity checks&lt;/a&gt;. If your organization uses a firewall or other policies you will need to exempt these IPs.&lt;/li&gt;
&lt;li&gt;DNS over HTTPS traffic is now included in the WARP tunnel by default.&lt;/li&gt;
&lt;li&gt;Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.&lt;/li&gt;
&lt;li&gt;Improved handling of non-SLAAC IPv6 interface addresses for better connectivity in IPv6 only environments.&lt;/li&gt;
&lt;li&gt;Fixed an issue where frequent network changes could cause WARP to become unresponsive.&lt;/li&gt;
&lt;li&gt;Improvement for WARP to check if tunnel connectivity fails or times out at device wake before attempting to reconnect.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing WARP connection disruptions after network changes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 12 May 2025 23:20:27 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Data Loss Prevention - Case Sensitive Custom Word Lists</title><link>https://developers.cloudflare.com/changelog/post/2025-05-12-case-sensitive-cwl/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-12-case-sensitive-cwl/</guid><description>&lt;p&gt;You can now configure &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/detection-entries/#custom-wordlist&quot;&gt;custom word lists&lt;/a&gt; to enforce case sensitivity. This setting supports flexibility where needed and aims to reduce false positives where letter casing is critical.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/case-sesitive-cwl.MPuOc_3r_220dca.webp&quot; alt=&quot;dlp&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;</description><pubDate>Mon, 12 May 2025 00:00:00 GMT</pubDate><product>Data Loss Prevention</product><category>Data Loss Prevention</category></item><item><title>Email security - Open email links with Browser Isolation</title><link>https://developers.cloudflare.com/changelog/post/2025-05-15-open-links-browser-isolation/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-15-open-links-browser-isolation/</guid><description>&lt;p&gt;You can now safely open links in emails to view and investigate them.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/investigate-links.pYbpGkt5_Z1DQRHU.webp&quot; alt=&quot;Open links with Browser Isolation&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;From &lt;strong&gt;Investigation&lt;/strong&gt;, go to &lt;strong&gt;View details&lt;/strong&gt;, and look for the &lt;strong&gt;Links identified&lt;/strong&gt; section. Next to each link, the Cloudflare dashboard will display an &lt;strong&gt;Open in Browser Isolation&lt;/strong&gt; icon which allows your team to safely open the link in a clientless, isolated browser with no risk to the analyst or your environment. Refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/investigation/search-email/#open-links&quot;&gt;Open links&lt;/a&gt; to learn more about this feature.&lt;/p&gt;
&lt;p&gt;To use this feature, you must:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Enable &lt;strong&gt;Clientless Web Isolation&lt;/strong&gt; in your Zero Trust settings.&lt;/li&gt;
&lt;li&gt;Have &lt;strong&gt;Browser Isolation (RBI)&lt;/strong&gt; seats assigned.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more details, refer to our &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/&quot;&gt;setup guide&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 08 May 2025 23:22:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Data Loss Prevention - Send forensic copies to storage without DLP profiles</title><link>https://developers.cloudflare.com/changelog/post/2025-05-07-forensic-copy-update/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-07-forensic-copy-update/</guid><description>&lt;p&gt;You can now &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/dlp-policies/logging-options/#send-dlp-forensic-copies-to-logpush-destination&quot;&gt;send DLP forensic copies&lt;/a&gt; to third-party storage for any HTTP policy with an &lt;code&gt;Allow&lt;/code&gt; or &lt;code&gt;Block&lt;/code&gt; action, without needing to include a DLP profile. This change increases flexibility for data handling and forensic investigation use cases.&lt;/p&gt;
&lt;p&gt;By default, Gateway will send all matched HTTP requests to your configured DLP Forensic Copy jobs.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/forensic-copies-for-all.fxeFrCY4_Z1rCUy9.webp&quot; alt=&quot;DLP&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;</description><pubDate>Wed, 07 May 2025 00:00:00 GMT</pubDate><product>Data Loss Prevention</product><category>Data Loss Prevention</category></item><item><title>Browser Isolation - Browser Isolation Overview page for Zero Trust</title><link>https://developers.cloudflare.com/changelog/post/2025-05-01-browser-isolation-overview-page/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-05-01-browser-isolation-overview-page/</guid><description>&lt;p&gt;A new &lt;strong&gt;Browser Isolation Overview&lt;/strong&gt; page is now available in the Cloudflare Zero Trust dashboard. This centralized view simplifies the management of &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/remote-browser-isolation/&quot;&gt;Remote Browser Isolation (RBI)&lt;/a&gt; deployments, providing:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Streamlined Onboarding:&lt;/strong&gt; Easily set up and manage isolation policies from one location.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Quick Testing:&lt;/strong&gt; Validate &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/&quot;&gt;clientless web application isolation&lt;/a&gt; with ease.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Simplified Configuration:&lt;/strong&gt; Configure &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/policies/isolate-application/&quot;&gt;isolated access applications&lt;/a&gt; and policies efficiently.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized Monitoring:&lt;/strong&gt; Track aggregate usage and blocked actions.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This update consolidates previously disparate settings, accelerating deployment, improving visibility into isolation activity, and making it easier to ensure your protections are working effectively.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/browser-isolation-overview.Ljd5ax_O_Z1SURww.webp&quot; alt=&quot;Browser Isolation Overview&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;To access the new overview, log in to your Cloudflare &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Zero Trust dashboard&lt;/a&gt; and find Browser Isolation in the side navigation bar.&lt;/p&gt;</description><pubDate>Thu, 01 May 2025 00:00:00 GMT</pubDate><product>Browser Isolation</product><category>Browser Isolation</category></item><item><title>Cloudflare One - Dark Mode for Zero Trust Dashboard</title><link>https://developers.cloudflare.com/changelog/post/2025-04-30-zero-trust-dashboard-dark-mode/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-30-zero-trust-dashboard-dark-mode/</guid><description>&lt;p&gt;The &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Cloudflare Zero Trust dashboard&lt;/a&gt; now supports Cloudflare&apos;s native dark mode for all accounts and plan types.&lt;/p&gt;
&lt;p&gt;Zero Trust Dashboard will automatically accept your user-level preferences for system settings, so if your Dashboard appearance is set to &apos;system&apos; or &apos;dark&apos;, the Zero Trust dashboard will enter dark mode whenever the rest of your Cloudflare account does.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/dark-mode.DfLeS20d_Z2kTwNR.webp&quot; alt=&quot;Zero Trust dashboard supports dark mode&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;Zero Trust Dashboard&lt;/p&gt;&lt;div&gt; &lt;p&gt;To update your view preference in the Zero Trust dashboard:&lt;/p&gt;&lt;ol&gt;
&lt;li&gt;Log into the &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Zero Trust dashboard&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Select your user icon.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Dark Mode&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt; &lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Core Dashboard&lt;/p&gt;&lt;div&gt; &lt;p&gt;To update your view preference in the Core dashboard:&lt;/p&gt;&lt;ol&gt;
&lt;li&gt;Log into the &lt;a href=&quot;https://dash.cloudflare.com&quot; target=&quot;_blank&quot;&gt;Cloudflare dashboard&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Go to &lt;strong&gt;My Profile&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;For &lt;strong&gt;Appearance&lt;/strong&gt;, choose &lt;strong&gt;Dark&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt; &lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;</description><pubDate>Wed, 30 Apr 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category></item><item><title>Cloudflare One, Cloudflare WAN - Cloudflare One Appliance supports multiple DNS server IPs</title><link>https://developers.cloudflare.com/changelog/post/2025-04-30-appliance-multiple-dns-servers/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-30-appliance-multiple-dns-servers/</guid><description>&lt;p&gt;Cloudflare One Appliance DHCP server settings now support specifying multiple DNS server IP addresses in the DHCP pool.&lt;/p&gt;
&lt;p&gt;Previously, customers could only configure a single DNS server per DHCP pool. With this update, you can specify multiple DNS servers to provide redundancy for clients at branch locations.&lt;/p&gt;
&lt;p&gt;For configuration details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/network-options/dhcp/dhcp-server/&quot;&gt;DHCP server&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 30 Apr 2025 00:00:00 GMT</pubDate><product>Cloudflare One</product><category>Cloudflare One</category><category>Cloudflare WAN</category></item><item><title>Gateway - FQDN Filtering For Gateway Egress Policies</title><link>https://developers.cloudflare.com/changelog/post/2025-04-28-fdqn-filtering-egress-policies/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-28-fdqn-filtering-egress-policies/</guid><description>&lt;p&gt;Cloudflare One administrators can now control which egress IP is used based on a destination&apos;s fully qualified domain name (FDQN) within Gateway Egress policies.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Host, Domain, Content Categories, and Application selectors are now available in the Gateway Egress policy builder in beta.&lt;/li&gt;
&lt;li&gt;During the beta period, you can use these selectors with traffic on-ramped to Gateway with the WARP client, proxy endpoints (commonly deployed with PAC files), or Cloudflare Browser Isolation.
&lt;ul&gt;
&lt;li&gt;For WARP client support, additional configuration is required. For more information, refer to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/egress-policies/#limitations&quot;&gt;WARP client configuration documentation&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/Gateway-Egress-FQDN-Policy-preview.Civon5p8_Z2hcuQE.webp&quot; alt=&quot;Egress by FQDN and Hostname&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This will help apply egress IPs to your users&apos; traffic when an upstream application or network requires it, while the rest of their traffic can take the most performant egress path.&lt;/p&gt;</description><pubDate>Mon, 28 Apr 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.4.589.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-04-22-warp-windows-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-22-warp-windows-beta/</guid><description>&lt;p&gt;A new Beta release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue causing reconnection loops when captive portals are detected.&lt;/li&gt;
&lt;li&gt;Fixed an issue that caused WARP client disk encryption posture checks to fail due to missing drive names.&lt;/li&gt;
&lt;li&gt;Fixed an issue where managed network policies could incorrectly report network location beacons as missing.&lt;/li&gt;
&lt;li&gt;Improved error reporting for DEX tests.&lt;/li&gt;
&lt;li&gt;Improved WARP client UI high contrast mode.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.&lt;/li&gt;
&lt;li&gt;Added a TCP fallback for the MASQUE tunnel protocol to improve compatibility with networks on MASQUE.&lt;/li&gt;
&lt;li&gt;Added new IP addresses for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/firewall/#connectivity-checks&quot;&gt;tunnel connectivity checks&lt;/a&gt;. If your organization uses a firewall or other policies you will need to exempt these IPs.&lt;/li&gt;
&lt;li&gt;DNS over HTTPS traffic is now included in the WARP tunnel by default.&lt;/li&gt;
&lt;li&gt;Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.&lt;/li&gt;
&lt;li&gt;Added a &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/captive-portals/#get-captive-portal-logs&quot;&gt;Collect Captive Portal Diag&lt;/a&gt; button in the client GUI to make it easier for users to collect captive portal debugging diagnostics.&lt;/li&gt;
&lt;li&gt;Improved handling of non-SLAAC IPv6 interface addresses for better connectivity in IPv6 only environments.&lt;/li&gt;
&lt;li&gt;Fixed an issue where frequent network changes could cause WARP to become unresponsive.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 22 Apr 2025 20:20:21 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.4.589.1)</title><link>https://developers.cloudflare.com/changelog/post/2025-04-22-warp-macos-beta/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-22-warp-macos-beta/</guid><description>&lt;p&gt;A new Beta release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/beta-releases/&quot;&gt;beta releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed an issue where managed network policies could incorrectly report network location beacons as missing.&lt;/li&gt;
&lt;li&gt;Improved DEX test error reporting.&lt;/li&gt;
&lt;li&gt;Fixed an issue causing client notifications to fail in IPv6 only environments which prevented the client from receiving configuration changes to settings like device profile.&lt;/li&gt;
&lt;li&gt;Improved captive portal detection.&lt;/li&gt;
&lt;li&gt;Added a TCP fallback for the MASQUE tunnel protocol to improve compatibility with networks on MASQUE.&lt;/li&gt;
&lt;li&gt;Added new IP addresses for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/firewall/#connectivity-checks&quot;&gt;tunnel connectivity checks&lt;/a&gt;. If your organization uses a firewall or other policies you will need to exempt these IPs.&lt;/li&gt;
&lt;li&gt;DNS over HTTPS traffic is now included in the WARP tunnel by default.&lt;/li&gt;
&lt;li&gt;Improved the error message displayed in the client GUI when the rate limit for entering an incorrect admin override code is met.&lt;/li&gt;
&lt;li&gt;Added a &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/configure/settings/captive-portals/#get-captive-portal-logs&quot;&gt;Collect Captive Portal Diag&lt;/a&gt; button in the client GUI to make it easier for users to collect captive portal debugging diagnostics.&lt;/li&gt;
&lt;li&gt;Improved handling of non-SLAAC IPv6 interface addresses for better connectivity in IPv6 only environments.&lt;/li&gt;
&lt;li&gt;Fixed an issue where frequent network changes could cause WARP to become unresponsive.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 22 Apr 2025 20:20:21 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Access - Access bulk policy tester</title><link>https://developers.cloudflare.com/changelog/post/2025-04-21-access-bulk-policy-tester/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-21-access-bulk-policy-tester/</guid><description>&lt;p&gt;The &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/policies/policy-management/#test-all-policies-in-an-application&quot;&gt;Access bulk policy tester&lt;/a&gt; is now available in the Cloudflare Zero Trust dashboard. The bulk policy tester allows you to simulate Access policies against your entire user base before and after deploying any changes. The policy tester will simulate the configured policy against each user&apos;s last seen identity and device posture (if applicable).&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/example-policy-tester.DCY8hQvx_2nxAfs.webp&quot; alt=&quot;Example policy tester&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;</description><pubDate>Mon, 21 Apr 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Data Loss Prevention - New predefined detection entry for ICD-11</title><link>https://developers.cloudflare.com/changelog/post/2025-04-14-icd11-support/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-14-icd11-support/</guid><description>&lt;p&gt;You now have access to the World Health Organization (WHO) 2025 edition of the &lt;a href=&quot;https://www.who.int/news/item/14-02-2025-who-releases-2025-update-to-the-international-classification-of-diseases-%28icd-11%29&quot; target=&quot;_blank&quot;&gt;International Classification of Diseases 11th Revision (ICD-11)&lt;/a&gt; as a predefined detection entry. The new dataset can be found in the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/dlp-profiles/predefined-profiles/#health-information&quot;&gt;Health Information&lt;/a&gt; predefined profile.&lt;/p&gt;
&lt;p&gt;ICD-10 dataset remains available for use.&lt;/p&gt;</description><pubDate>Mon, 14 Apr 2025 00:00:00 GMT</pubDate><product>Data Loss Prevention</product><category>Data Loss Prevention</category></item><item><title>Gateway - HTTP redirect and custom block page redirect</title><link>https://developers.cloudflare.com/changelog/post/2025-04-11-http-redirect-custom-block-page-redirect/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-11-http-redirect-custom-block-page-redirect/</guid><description>&lt;p&gt;You can now use more flexible redirect capabilities in Cloudflare One with Gateway.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A new &lt;strong&gt;Redirect&lt;/strong&gt; action is available in the HTTP policy builder, allowing admins to redirect users to any URL when their request matches a policy. You can choose to preserve the original URL and query string, and optionally include policy context via query parameters.&lt;/li&gt;
&lt;li&gt;For &lt;strong&gt;Block&lt;/strong&gt; actions, admins can now configure a custom URL to display when access is denied. This block page redirect is set at the account level and can be overridden in DNS or HTTP policies. Policy context can also be passed along in the URL.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Learn more in our documentation for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/#redirect&quot;&gt;HTTP Redirect&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/reusable-components/custom-pages/gateway-block-page/#redirect-to-a-block-page&quot;&gt;Block page redirect&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 11 Apr 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Access - Cloudflare Zero Trust SCIM User and Group Provisioning Logs</title><link>https://developers.cloudflare.com/changelog/post/2025-04-09-scim-provisioning-logs/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-09-scim-provisioning-logs/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/users/scim&quot;&gt;Cloudflare Zero Trust SCIM provisioning&lt;/a&gt; now has a full audit log of all create, update and delete event from any SCIM Enabled IdP. The &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/dashboard-logs/scim-logs/&quot;&gt;SCIM logs&lt;/a&gt; support filtering by IdP, Event type, Result and many more fields. This will help with debugging user and group update issues and questions.&lt;/p&gt;
&lt;p&gt;SCIM logs can be found on the Zero Trust Dashboard under &lt;strong&gt;Logs&lt;/strong&gt; -&gt; &lt;strong&gt;SCIM provisioning&lt;/strong&gt;.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/example-scim-log.Bv5Zqckh_BY26C.webp&quot; alt=&quot;Example SCIM Logs&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;</description><pubDate>Wed, 09 Apr 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Cloudflare One Client - WARP client for Windows (version 2025.2.664.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-04-08-warp-windows-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-08-warp-windows-ga/</guid><description>&lt;p&gt;A new GA release for the Windows WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains a hotfix for captive portal detection for the 2025.2.600.0 release.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fix to reduce the number of browser tabs opened during captive portal logins.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;DNS resolution may be broken when the following conditions are all true:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.&lt;/li&gt;
&lt;li&gt;A custom DNS server address is configured on the primary network adapter.&lt;/li&gt;
&lt;li&gt;The custom DNS server address on the primary network adapter is changed while WARP is connected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To work around this issue, reconnect the WARP client by toggling off and back on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 08 Apr 2025 21:25:24 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - WARP client for macOS (version 2025.2.664.0)</title><link>https://developers.cloudflare.com/changelog/post/2025-04-08-warp-macos-ga/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-08-warp-macos-ga/</guid><description>&lt;p&gt;A new GA release for the macOS WARP client is now available on the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/download/&quot;&gt;stable releases downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This release contains a hotfix for captive portal detection and PF state tables for the 2025.2.600.0 release.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fix to reduce the number of browser tabs opened during captive portal logins.&lt;/li&gt;
&lt;li&gt;Improvement to exclude local DNS traffic entries from PF state table to reduce risk of connectivity issues from exceeding table capacity.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Known issues&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 08 Apr 2025 21:25:07 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Email security - CASB and Email security</title><link>https://developers.cloudflare.com/changelog/post/2025-04-01-casb-email-security/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-04-01-casb-email-security/</guid><description>&lt;p&gt;With Email security, you get two free CASB integrations.&lt;/p&gt;
&lt;p&gt;Use one SaaS integration for Email security to sync with your directory of users, take actions on delivered emails, automatically provide EMLs for reclassification requests for clean emails, discover CASB findings and more.&lt;/p&gt;
&lt;p&gt;With the other integration, you can have a separate SaaS integration for CASB findings for another SaaS provider.&lt;/p&gt;
&lt;p&gt;Refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/&quot;&gt;Add an integration&lt;/a&gt; to learn more about this feature.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/CASB-EmailSecurity.B1wd9be2_PR5LD.webp&quot; alt=&quot;CASB-EmailSecurity&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 01 Apr 2025 23:22:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Gateway - Secure DNS Locations Management User Role</title><link>https://developers.cloudflare.com/changelog/post/2025-03-21-pdns-user-locations-role/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-03-21-pdns-user-locations-role/</guid><description>&lt;p&gt;We&apos;re excited to introduce the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/dns/locations/#secure-dns-locations&quot;&gt;&lt;strong&gt;Cloudflare Zero Trust Secure DNS Locations Write role&lt;/strong&gt;&lt;/a&gt;, designed to provide DNS filtering customers with granular control over third-party access when configuring their Protective DNS (PDNS) solutions.&lt;/p&gt;
&lt;p&gt;Many DNS filtering customers rely on external service partners to manage their DNS location endpoints. This role allows you to grant access to external parties to administer DNS locations without overprovisioning their permissions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Secure DNS Location Requirements:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Mandate usage of &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/dns/locations/dns-resolver-ips/#bring-your-own-dns-resolver-ip&quot; target=&quot;_blank&quot;&gt;Bring your own DNS resolver IP addresses&lt;/a&gt; if available on the account.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Require source network filtering for IPv4/IPv6/DoT endpoints; token authentication or source network filtering for the DoH endpoint.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can assign the new role via Cloudflare Dashboard (&lt;code&gt;Manage Accounts &gt; Members&lt;/code&gt;) or via API. For more information, refer to the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/dns/locations/#secure-dns-locations&quot; target=&quot;_blank&quot;&gt;Secure DNS Locations documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 21 Mar 2025 00:00:00 GMT</pubDate><product>Gateway</product><category>Gateway</category></item><item><title>Cloudflare One Client - Cloudflare One Agent for Android (version 2.4)</title><link>https://developers.cloudflare.com/changelog/post/2025-03-17-warp-ga-android/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-03-17-warp-ga-android/</guid><description>&lt;p&gt;A new GA release for the Android Cloudflare One Agent is now available in the &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.cloudflare.cloudflareoneagent&quot; target=&quot;_blank&quot;&gt;Google Play Store&lt;/a&gt;. This release includes a new feature allowing &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/manual-deployment/#enroll-using-a-url&quot;&gt;team name insertion by URL&lt;/a&gt; during enrollment, as well as fixes and minor improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improved in-app error messages.&lt;/li&gt;
&lt;li&gt;Improved mobile client login with support for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/manual-deployment/#enroll-using-a-url&quot;&gt;team name insertion by URL&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Fixed an issue preventing admin split tunnel settings taking priority for traffic from certain applications.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 17 Mar 2025 00:00:00 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare One Client - Cloudflare One Agent for iOS (version 1.10)</title><link>https://developers.cloudflare.com/changelog/post/2025-03-17-warp-ga-ios/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-03-17-warp-ga-ios/</guid><description>&lt;p&gt;A new GA release for the iOS Cloudflare One Agent is now available in the &lt;a href=&quot;https://apps.apple.com/us/app/cloudflare-one-agent/id6443476492&quot; target=&quot;_blank&quot;&gt;iOS App Store&lt;/a&gt;. This release includes a new feature allowing &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/manual-deployment/#enroll-using-a-url&quot;&gt;team name insertion by URL&lt;/a&gt; during enrollment, as well as fixes and minor improvements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Changes and improvements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improved in-app error messages.&lt;/li&gt;
&lt;li&gt;Improved mobile client login with support for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/deployment/manual-deployment/#enroll-using-a-url&quot;&gt;team name insertion by URL&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Bug fixes and performance improvements.&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Mon, 17 Mar 2025 00:00:00 GMT</pubDate><product>Cloudflare One Client</product><category>Cloudflare One Client</category></item><item><title>Cloudflare Network Firewall - Cloudflare IP Ranges List</title><link>https://developers.cloudflare.com/changelog/post/2025-03-13-new-managed-iplist/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-03-13-new-managed-iplist/</guid><description>&lt;p&gt;Magic Firewall now supports a new managed list of Cloudflare IP ranges. This list is available as an option when creating a Magic Firewall policy based on IP source/destination addresses. When selecting &quot;is in list&quot; or &quot;is not in list&quot;, the option &quot;&lt;strong&gt;Cloudflare IP Ranges&lt;/strong&gt;&quot; will appear in the dropdown menu.&lt;/p&gt;
&lt;p&gt;This list is based on the IPs listed in the Cloudflare &lt;a href=&quot;https://www.cloudflare.com/en-gb/ips/&quot; target=&quot;_blank&quot;&gt;IP ranges&lt;/a&gt;.
Updates to this managed list are applied automatically.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/cloudflare-ips.DetyOndL_10JG5B.webp&quot; alt=&quot;Cloudflare IPs Managed List&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;Note: IP Lists require a Cloudflare Advanced Network Firewall subscription. For more details about Cloudflare Network Firewall plans, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-network-firewall/plans&quot;&gt;Plans&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 13 Mar 2025 00:00:00 GMT</pubDate><product>Cloudflare Network Firewall</product><category>Cloudflare Network Firewall</category></item><item><title>Digital Experience Monitoring - Cloudflare One Agent now supports Endpoint Monitoring</title><link>https://developers.cloudflare.com/changelog/post/2025-03-07-cloudflare-one-device-health-monitoring/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-03-07-cloudflare-one-device-health-monitoring/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/dex/&quot;&gt;Digital Experience Monitoring (DEX)&lt;/a&gt; provides visibility into device, network, and application performance across your Cloudflare SASE deployment. The latest release of the Cloudflare One agent (v2025.1.861) now includes device endpoint monitoring capabilities
to provide deeper visibility into end-user device performance which can be analyzed directly from the dashboard.&lt;/p&gt;
&lt;p&gt;Device health metrics are now automatically collected, allowing administrators to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;View the last network a user was connected to&lt;/li&gt;
&lt;li&gt;Monitor CPU and RAM utilization on devices&lt;/li&gt;
&lt;li&gt;Identify resource-intensive processes running on endpoints&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/cloudflare-one-agent-health-monitoring.XXtiRuOp_Z25TN9Q.webp&quot; alt=&quot;Device endpoint monitoring dashboard&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This feature complements existing DEX features like &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/dex/tests/&quot;&gt;synthetic application monitoring&lt;/a&gt; and &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/dex/tests/traceroute/&quot;&gt;network path visualization&lt;/a&gt;, creating a comprehensive troubleshooting workflow that connects application performance with device state.&lt;/p&gt;
&lt;p&gt;For more details refer to our &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/dex/&quot;&gt;DEX&lt;/a&gt; documentation.&lt;/p&gt;</description><pubDate>Fri, 07 Mar 2025 00:00:00 GMT</pubDate><product>Digital Experience Monitoring</product><category>Digital Experience Monitoring</category></item><item><title>Browser Isolation - Gain visibility into user actions in Zero Trust Browser Isolation sessions</title><link>https://developers.cloudflare.com/changelog/post/2025-03-03-user-action-logging/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-03-03-user-action-logging/</guid><description>&lt;p&gt;We&apos;re excited to announce that new logging capabilities for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/remote-browser-isolation/&quot;&gt;Remote Browser Isolation (RBI)&lt;/a&gt; through &lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/logpush-job/datasets/account/&quot;&gt;Logpush&lt;/a&gt; are available in Beta starting today!&lt;/p&gt;
&lt;p&gt;With these enhanced logs, administrators can gain visibility into end user behavior in the remote browser and track blocked data extraction attempts, along with the websites that triggered them, in an isolated session.&lt;/p&gt;
&lt;div&gt;&lt;figure&gt;&lt;pre data-language=&quot;json&quot;&gt;&lt;code class=&quot;language-json&quot;&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;{&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;  &lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;AccountID&lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&quot;$ACCOUNT_ID&quot;&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;  &lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;Decision&lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&quot;block&quot;&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;  &lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;DomainName&lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&quot;www.example.com&quot;&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;  &lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;Timestamp&lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&quot;2025-02-27T23:15:06Z&quot;&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;  &lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;Type&lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&quot;copy&quot;&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;  &lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;UserID&lt;/span&gt;&lt;span&gt;&quot;&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;&quot;$USER_ID&quot;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;}&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/code&gt;&lt;/pre&gt;&lt;div&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/figure&gt;&lt;/div&gt;
&lt;p&gt;User Actions available:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Copy &amp;#x26; Paste&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Downloads &amp;#x26; Uploads&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Printing&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Learn more about how to get started with Logpush in our &lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/&quot;&gt;documentation&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 04 Mar 2025 00:00:00 GMT</pubDate><product>Browser Isolation</product><category>Browser Isolation</category></item><item><title>Access - New SAML and OIDC Fields and SAML transforms for Access for SaaS</title><link>https://developers.cloudflare.com/changelog/post/2025-03-03-saml-oidc-fields-saml-transformations/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-03-03-saml-oidc-fields-saml-transformations/</guid><description>&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/http-apps/saas-apps/&quot;&gt;Access for SaaS applications&lt;/a&gt; now include more configuration options to support a wider array of SaaS applications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SAML and OIDC Field Additions&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;OIDC apps now include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Group Filtering via RegEx&lt;/li&gt;
&lt;li&gt;OIDC Claim mapping from an IdP&lt;/li&gt;
&lt;li&gt;OIDC token lifetime control&lt;/li&gt;
&lt;li&gt;Advanced OIDC auth flows including hybrid and implicit flows&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/oidc-claims.2di8l9Lv_ZrD1mx.webp&quot; alt=&quot;OIDC field additions&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;SAML apps now include improved SAML attribute mapping from an IdP.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/saml-attribute-statements.CW45j5Qi_1ydeSQ.webp&quot; alt=&quot;SAML field additions&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;&lt;strong&gt;SAML transformations&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;SAML identities sent to Access applications can be fully customized using JSONata expressions. This allows admins to configure the precise identity SAML statement sent to a SaaS application.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/transformation-box.DyKn-DdN_2rtirg.webp&quot; alt=&quot;Configured SAML statement sent to application&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;</description><pubDate>Mon, 03 Mar 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Email security - Use Logpush for Email security detections</title><link>https://developers.cloudflare.com/changelog/post/2025-03-01-logpush-detections/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-03-01-logpush-detections/</guid><description>&lt;p&gt;You can now send detection logs to an endpoint of your choice with Cloudflare Logpush.&lt;/p&gt;
&lt;p&gt;Filter logs matching specific criteria you have set and select from over 25 fields you want to send. When creating a new Logpush job, remember to select &lt;strong&gt;Email security alerts&lt;/strong&gt; as the dataset.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/Logpush-Detections.Dc5tHta3_1PsIMk.webp&quot; alt=&quot;logpush-detections&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/logpush/email-security-logs/#enable-detection-logs&quot;&gt;Enable detection logs&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Sat, 01 Mar 2025 23:22:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Email security - Check status of Email security or Area 1</title><link>https://developers.cloudflare.com/changelog/post/2025-02-07-check-status/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-02-07-check-status/</guid><description>&lt;p&gt;Concerns about performance for Email security or Area 1? You can now check the operational status of both on the &lt;a href=&quot;https://www.cloudflarestatus.com/&quot; target=&quot;_blank&quot;&gt;Cloudflare Status page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For Email security, look under &lt;strong&gt;Cloudflare Sites and Services&lt;/strong&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Dashboard&lt;/strong&gt; is the dashboard for Cloudflare, including Email security&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Email security (Zero Trust)&lt;/strong&gt; is the processing of email&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;API&lt;/strong&gt; are the Cloudflare endpoints, including the ones for Email security&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For Area 1, under &lt;strong&gt;Cloudflare Sites and Services&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Area 1 - Dash&lt;/strong&gt; is the dashboard for Cloudflare, including Email security&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Email security (Area1)&lt;/strong&gt; is the processing of email&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Area 1 - API&lt;/strong&gt; are the Area 1 endpoints&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/Status-Page.DcFJ1286_2qTtkN.webp&quot; alt=&quot;Status-page&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 27 Feb 2025 23:22:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Email security - Use DLP Assist for M365</title><link>https://developers.cloudflare.com/changelog/post/2025-02-25-dlp-assist-for-m365/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-02-25-dlp-assist-for-m365/</guid><description>&lt;p&gt;Cloudflare Email security customers who have Microsoft 365 environments can quickly deploy an Email DLP (Data Loss Prevention) solution for free.&lt;/p&gt;
&lt;p&gt;Simply deploy our add-in, create a DLP policy in Cloudflare, and configure Outlook to trigger behaviors like displaying a banner, alerting end users before sending, or preventing delivery entirely.&lt;/p&gt;
&lt;p&gt;Refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/outbound-dlp/&quot;&gt;Outbound Data Loss Prevention&lt;/a&gt; to learn more about this feature.&lt;/p&gt;
&lt;p&gt;In GUI alert:&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/DLP-Alert.5s-fbKn3_1xfB14.webp&quot; alt=&quot;DLP-Alert&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;Alert before sending:&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/DLP-Pop-up.0gkYy7o5_ZgIo8K.webp&quot; alt=&quot;DLP-Pop-up&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;Prevent delivery:&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/DLP-Blocked.CmQkGrnM_ZewJi3.webp&quot; alt=&quot;DLP-Blocked&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 25 Feb 2025 23:22:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Cloudflare WAN - Configure your Magic WAN Connector to connect via static IP assigment</title><link>https://developers.cloudflare.com/changelog/post/2025-02-14-local-console-access/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-02-14-local-console-access/</guid><description>&lt;p&gt;You can now locally configure your &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/&quot;&gt;Magic WAN Connector&lt;/a&gt; to work in a static IP configuration.&lt;/p&gt;
&lt;p&gt;This local method does not require having access to a DHCP Internet connection. However, it does require being comfortable with using tools to access the serial port on Magic WAN Connector as well as using a serial terminal client to access the Connector&apos;s environment.&lt;/p&gt;
&lt;p&gt;For more details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/appliance/configure-hardware-appliance/#bootstrap-via-serial-console&quot;&gt;WAN with a static IP address&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 14 Feb 2025 00:00:00 GMT</pubDate><product>Cloudflare WAN</product><category>Cloudflare WAN</category></item><item><title>Email security - Open email links with Security Center</title><link>https://developers.cloudflare.com/changelog/post/2025-02-07-open-links-security-center/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-02-07-open-links-security-center/</guid><description>&lt;p&gt;You can now investigate links in emails with Cloudflare Security Center to generate a report containing a myriad of technical details: a phishing scan, SSL certificate data, HTTP request and response data, page performance data, DNS records, what technologies and libraries the page uses, and more.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/Open-Links-Security-Center.b-LJU4YB_2dBHq8.webp&quot; alt=&quot;Open links in Security Center&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;From &lt;strong&gt;Investigation&lt;/strong&gt;, go to &lt;strong&gt;View details&lt;/strong&gt;, and look for the &lt;strong&gt;Links identified&lt;/strong&gt; section. Select &lt;strong&gt;Open in Security Center&lt;/strong&gt; next to each link. &lt;strong&gt;Open in Security Center&lt;/strong&gt; allows your team to quickly generate a detailed report about the link with no risk to the analyst or your environment.&lt;/p&gt;
&lt;p&gt;For more details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/investigation/search-email/#open-links&quot;&gt;Open links&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Fri, 07 Feb 2025 23:22:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Data Loss Prevention, Gateway - Block files that are password-protected, compressed, or otherwise unscannable.</title><link>https://developers.cloudflare.com/changelog/post/2025-02-13-improvements-unscannable-files/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-02-13-improvements-unscannable-files/</guid><description>&lt;p&gt;Gateway HTTP policies can now block files that are password-protected, compressed, or otherwise unscannable.&lt;/p&gt;
&lt;p&gt;These unscannable files are now matched with the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/#download-and-upload-file-types&quot;&gt;Download and Upload File Types traffic selectors&lt;/a&gt; for HTTP policies:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Password-protected Microsoft Office document&lt;/li&gt;
&lt;li&gt;Password-protected PDF&lt;/li&gt;
&lt;li&gt;Password-protected ZIP archive&lt;/li&gt;
&lt;li&gt;Unscannable ZIP archive&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To get started inspecting and modifying behavior based on these and other rules, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/traffic-policies/get-started/http/&quot;&gt;HTTP filtering&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Mon, 03 Feb 2025 00:00:00 GMT</pubDate><product>Data Loss Prevention</product><category>Data Loss Prevention</category><category>Gateway</category></item><item><title>Data Loss Prevention - Detect source code leaks with Data Loss Prevention</title><link>https://developers.cloudflare.com/changelog/post/2025-01-03-source-code-confidence-level/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-01-03-source-code-confidence-level/</guid><description>&lt;p&gt;You can now detect source code leaks with Data Loss Prevention (DLP) with predefined checks against common programming languages.&lt;/p&gt;
&lt;p&gt;The following programming languages are validated with natural language processing (NLP).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;C&lt;/li&gt;
&lt;li&gt;C++&lt;/li&gt;
&lt;li&gt;C#&lt;/li&gt;
&lt;li&gt;Go&lt;/li&gt;
&lt;li&gt;Haskell&lt;/li&gt;
&lt;li&gt;Java&lt;/li&gt;
&lt;li&gt;JavaScript&lt;/li&gt;
&lt;li&gt;Lua&lt;/li&gt;
&lt;li&gt;Python&lt;/li&gt;
&lt;li&gt;R&lt;/li&gt;
&lt;li&gt;Rust&lt;/li&gt;
&lt;li&gt;Swift&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;DLP also supports confidence level for &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/dlp-profiles/predefined-profiles/#source-code&quot;&gt;source code profiles&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For more details, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/dlp-profiles/&quot;&gt;DLP profiles&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Mon, 20 Jan 2025 00:00:00 GMT</pubDate><product>Data Loss Prevention</product><category>Data Loss Prevention</category></item><item><title>Access - Export SSH command logs with Access for Infrastructure using Logpush</title><link>https://developers.cloudflare.com/changelog/post/2025-01-15-ssh-logs-and-logpush/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-01-15-ssh-logs-and-logpush/</guid><description>&lt;aside&gt;&lt;p&gt;Availability&lt;/p&gt;&lt;div&gt;&lt;p&gt;Only available on Enterprise plans.&lt;/p&gt;&lt;/div&gt;&lt;/aside&gt;
&lt;p&gt;Cloudflare now allows you to send SSH command logs to storage destinations configured in &lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/&quot;&gt;Logpush&lt;/a&gt;, including third-party destinations. Once exported, analyze and audit the data as best fits your organization! For a list of available data fields, refer to the &lt;a href=&quot;https://developers.cloudflare.com/logs/logpush/logpush-job/datasets/account/ssh_logs/&quot;&gt;SSH logs dataset&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;To set up a Logpush job, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/logpush/&quot;&gt;Logpush integration&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 15 Jan 2025 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Email security - Escalate user submissions</title><link>https://developers.cloudflare.com/changelog/post/2024-12-19-escalate-user-submissions/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-12-19-escalate-user-submissions/</guid><description>&lt;p&gt;After you triage your users&apos; submissions (that are machine reviewed), you can now escalate them to our team for reclassification (which are instead human reviewed). User submissions from the submission alias, PhishNet, and our API can all be escalated.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/Escalate.CwXPIyM3_ZxuRN6.webp&quot; alt=&quot;Escalate&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;From &lt;strong&gt;Reclassifications&lt;/strong&gt;, go to &lt;strong&gt;User submissions&lt;/strong&gt;. Select the three dots next to any of the user submissions, then select &lt;strong&gt;Escalate&lt;/strong&gt; to create a team request for reclassification. The Cloudflare dashboard will then show you the submissions on the &lt;strong&gt;Team Submissions&lt;/strong&gt; tab.&lt;/p&gt;
&lt;p&gt;Refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/submissions/user-submissions/&quot;&gt;User submissions&lt;/a&gt; to learn more about this feature.&lt;/p&gt;
&lt;p&gt;This feature is available across these Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advantage&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 19 Dec 2024 23:22:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Email security - Increased transparency for phishing email submissions</title><link>https://developers.cloudflare.com/changelog/post/2024-12-19-reclassification-tab/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-12-19-reclassification-tab/</guid><description>&lt;p&gt;You now have more transparency about team and user submissions for phishing emails through a &lt;strong&gt;Reclassification&lt;/strong&gt; tab in the Zero Trust dashboard.&lt;/p&gt;
&lt;p&gt;Reclassifications happen when users or admins &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/email-security/settings/phish-submissions/&quot;&gt;submit a phish&lt;/a&gt; to Email security. Cloudflare reviews and - in some cases - reclassifies these emails based on improvements to our machine learning models.&lt;/p&gt;
&lt;p&gt;This new tab increases your visibility into this process, allowing you to view what submissions you have made and what the outcomes of those submissions are.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/reclassifications-tab.yDgtjG51_Z1TVbIE.webp&quot; alt=&quot;Use the Reclassification area to review submitted phishing emails&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;</description><pubDate>Thu, 19 Dec 2024 00:00:00 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Cloudflare Tunnel, Cloudflare Tunnel for SASE - Troubleshoot tunnels with diagnostic logs</title><link>https://developers.cloudflare.com/changelog/post/2024-12-19-diagnostic-logs/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-12-19-diagnostic-logs/</guid><description>&lt;p&gt;The latest &lt;code&gt;cloudflared&lt;/code&gt; build &lt;a href=&quot;https://github.com/cloudflare/cloudflared/releases/tag/2024.12.2&quot; target=&quot;_blank&quot;&gt;2024.12.2&lt;/a&gt; introduces the ability to collect all the diagnostic logs needed to troubleshoot a &lt;code&gt;cloudflared&lt;/code&gt; instance.&lt;/p&gt;
&lt;p&gt;A diagnostic report collects data from a single instance of &lt;code&gt;cloudflared&lt;/code&gt; running on the local machine and outputs it to a &lt;code&gt;cloudflared-diag&lt;/code&gt; file.&lt;/p&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/troubleshoot-tunnels/diag-logs/&quot;&gt;Diagnostic logs&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 19 Dec 2024 00:00:00 GMT</pubDate><product>Cloudflare Tunnel</product><category>Cloudflare Tunnel</category><category>Cloudflare Tunnel for SASE</category></item><item><title>Magic Transit, Cloudflare WAN, Network Interconnect - Establish BGP peering over Direct CNI circuits</title><link>https://developers.cloudflare.com/changelog/post/2024-12-17-bgp-support-cni/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-12-17-bgp-support-cni/</guid><description>&lt;p&gt;Magic WAN and Magic Transit customers can use the Cloudflare dashboard to configure and manage BGP peering between their networks and their Magic routing table when using a Direct CNI on-ramp.&lt;/p&gt;
&lt;p&gt;Using BGP peering allows customers to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Automate the process of adding or removing networks and subnets.&lt;/li&gt;
&lt;li&gt;Take advantage of failure detection and session recovery features.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;With this functionality, customers can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Establish an eBGP session between their devices and the Magic WAN / Magic Transit service when connected via CNI.&lt;/li&gt;
&lt;li&gt;Secure the session by MD5 authentication to prevent misconfigurations.&lt;/li&gt;
&lt;li&gt;Exchange routes dynamically between their devices and their Magic routing table.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/configuration/manually/how-to/configure-routes/#configure-bgp-routes&quot;&gt;Magic WAN BGP peering&lt;/a&gt; or &lt;a href=&quot;https://developers.cloudflare.com/magic-transit/how-to/configure-routes/#configure-bgp-routes&quot;&gt;Magic Transit BGP peering&lt;/a&gt; to learn more about this feature and how to set it up.&lt;/p&gt;</description><pubDate>Tue, 17 Dec 2024 00:00:00 GMT</pubDate><product>Magic Transit</product><category>Magic Transit</category><category>Cloudflare WAN</category><category>Network Interconnect</category></item><item><title>Multi-Cloud Networking - Generate customized terraform files for building cloud network on-ramps</title><link>https://developers.cloudflare.com/changelog/post/2024-12-05-cloud-onramp-terraform/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-12-05-cloud-onramp-terraform/</guid><description>&lt;p&gt;You can now generate customized terraform files for building cloud network on-ramps to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/&quot;&gt;Magic WAN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://developers.cloudflare.com/multi-cloud-networking/&quot;&gt;Magic Cloud&lt;/a&gt; can scan and discover existing network resources and generate the required terraform files to automate cloud resource deployment using their existing infrastructure-as-code workflows for cloud automation.&lt;/p&gt;
&lt;p&gt;You might want to do this to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Review the proposed configuration for an on-ramp before deploying it with Cloudflare.&lt;/li&gt;
&lt;li&gt;Deploy the on-ramp using your own infrastructure-as-code pipeline instead of deploying it with Cloudflare.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more details, refer to &lt;a href=&quot;https://developers.cloudflare.com/multi-cloud-networking/cloud-on-ramps/#set-up-with-terraform&quot;&gt;Set up with Terraform&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 05 Dec 2024 00:00:00 GMT</pubDate><product>Multi-Cloud Networking</product><category>Multi-Cloud Networking</category></item><item><title>CASB - Find security misconfigurations in your AWS cloud environment</title><link>https://developers.cloudflare.com/changelog/post/2024-11-22-cloud-data-extraction-aws/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-11-22-cloud-data-extraction-aws/</guid><description>&lt;p&gt;You can now use CASB to find security misconfigurations in your AWS cloud environment using &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/&quot;&gt;Data Loss Prevention&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;You can also &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/aws-s3/#compute-account&quot;&gt;connect your AWS compute account&lt;/a&gt; to extract and scan your S3 buckets for sensitive data while avoiding egress fees. CASB will scan any objects that exist in the bucket at the time of configuration.&lt;/p&gt;
&lt;p&gt;To connect a compute account to your AWS integration:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In &lt;a href=&quot;https://one.dash.cloudflare.com&quot; target=&quot;_blank&quot;&gt;Cloudflare One&lt;/a&gt;, go to &lt;strong&gt;Cloud &amp;#x26; SaaS findings&lt;/strong&gt; &gt; &lt;strong&gt;Integrations&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Find and select your AWS integration.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Open connection instructions&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Follow the instructions provided to connect a new compute account.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Refresh&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;</description><pubDate>Fri, 22 Nov 2024 00:00:00 GMT</pubDate><product>CASB</product><category>CASB</category></item><item><title>Browser Isolation - Improved non-English keyboard support</title><link>https://developers.cloudflare.com/changelog/post/2024-11-21-non-english-keyboard/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-11-21-non-english-keyboard/</guid><description>&lt;p&gt;You can now type in languages that use diacritics (like á or ç) and character-based scripts (such as Chinese, Japanese, and Korean) directly within the remote browser. The isolated browser now properly recognizes non-English keyboard input, eliminating the need to copy and paste content from a local browser or device.&lt;/p&gt;</description><pubDate>Thu, 21 Nov 2024 00:00:00 GMT</pubDate><product>Browser Isolation</product><category>Browser Isolation</category></item><item><title>Email security - Use Logpush for Email security user actions</title><link>https://developers.cloudflare.com/changelog/post/2024-11-07-logpush-user-actions/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-11-07-logpush-user-actions/</guid><description>&lt;p&gt;You can now send user action logs for Email security to an endpoint of your choice with Cloudflare Logpush.&lt;/p&gt;
&lt;p&gt;Filter logs matching specific criteria you have set or select from multiple fields you want to send. For all users, we will log the date and time, user ID, IP address, details about the message they accessed, and what actions they took.&lt;/p&gt;
&lt;p&gt;When creating a new Logpush job, remember to select &lt;strong&gt;Audit logs&lt;/strong&gt; as the dataset and filter by:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Field&lt;/strong&gt;: &lt;code&gt;&quot;ResourceType&quot;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Operator&lt;/strong&gt;: &lt;code&gt;&quot;starts with&quot;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Value&lt;/strong&gt;: &lt;code&gt;&quot;email_security&quot;&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/Logpush-User-Actions.D14fWgmq_CYM35.webp&quot; alt=&quot;Logpush-user-actions&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;For more information, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/insights/logs/logpush/email-security-logs/#enable-user-action-logs&quot;&gt;Enable user action logs&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This feature is available across all Email security packages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise + PhishGuard&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Thu, 07 Nov 2024 23:22:49 GMT</pubDate><product>Email security</product><category>Email security</category></item><item><title>Cloudflare Network Firewall - Search for custom rules using rule name and/or ID</title><link>https://developers.cloudflare.com/changelog/post/2024-10-02-custom-rule-search/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-10-02-custom-rule-search/</guid><description>&lt;p&gt;The Magic Firewall dashboard now allows you to search custom rules using the rule name and/or ID.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Log into the &lt;a href=&quot;https://dash.cloudflare.com&quot; target=&quot;_blank&quot;&gt;Cloudflare dashboard&lt;/a&gt; and select your account.&lt;/li&gt;
&lt;li&gt;Go to &lt;strong&gt;Analytics &amp;#x26; Logs&lt;/strong&gt; &gt; &lt;strong&gt;Network Analytics&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Magic Firewall&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Add a filter for &lt;strong&gt;Rule ID&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/search-with-rule-id.DJgzqgKk_2jJ9x8.webp&quot; alt=&quot;Search for firewall rules with rule IDs&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;Additionally, the rule ID URL link has been added to Network Analytics.&lt;/p&gt;</description><pubDate>Wed, 02 Oct 2024 00:00:00 GMT</pubDate><product>Cloudflare Network Firewall</product><category>Cloudflare Network Firewall</category></item><item><title>Access - Eliminate long-lived credentials and enhance SSH security with Cloudflare Access for Infrastructure</title><link>https://developers.cloudflare.com/changelog/post/2024-10-01-ssh-with-access-for-infrastructure/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-10-01-ssh-with-access-for-infrastructure/</guid><description>&lt;p&gt;Organizations can now eliminate long-lived credentials from their SSH setup and enable strong multi-factor authentication for SSH access, similar to other Access applications, all while generating access and command logs.&lt;/p&gt;
&lt;p&gt;SSH with &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/access-controls/applications/non-http/infrastructure-apps/&quot;&gt;Access for Infrastructure&lt;/a&gt; uses short-lived SSH certificates from Cloudflare, eliminating SSH key management and reducing the security risks associated with lost or stolen keys. It also leverages a common deployment model for Cloudflare One customers: &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/ssh-device-client/&quot;&gt;WARP-to-Tunnel&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;SSH with Access for Infrastructure enables you to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Author fine-grained policy&lt;/strong&gt; to control who may access your SSH servers, including specific ports, protocols, and SSH users.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Monitor infrastructure access&lt;/strong&gt; with Access and SSH command logs, supporting regulatory compliance and providing visibility in case of security breach.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Preserve your end users&apos; workflows.&lt;/strong&gt; SSH with Access for Infrastructure supports native SSH clients and does not require any modifications to users’ SSH configs.&lt;/li&gt;
&lt;/ul&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/infrastructure-app.BhpJOgxs_Z1M0wLH.webp&quot; alt=&quot;Example of an infrastructure Access application&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;To get started, refer to &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/ssh-infrastructure-access/&quot;&gt;SSH with Access for Infrastructure&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 01 Oct 2024 00:00:00 GMT</pubDate><product>Access</product><category>Access</category></item><item><title>Risk Score - Exchange user risk scores with Okta</title><link>https://developers.cloudflare.com/changelog/post/2024-06-17-okta-risk-exchange/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-06-17-okta-risk-exchange/</guid><description>&lt;p&gt;Beyond the controls in &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/&quot;&gt;Zero Trust&lt;/a&gt;, you can now &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/team-and-resources/users/risk-score/#send-risk-score-to-okta&quot;&gt;exchange user risk scores&lt;/a&gt; with Okta to inform SSO-level policies.&lt;/p&gt;
&lt;p&gt;First, configure Cloudflare One to send user risk scores to Okta.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Set up the &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/integrations/identity-providers/okta/&quot;&gt;Okta SSO integration&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;In &lt;a href=&quot;https://one.dash.cloudflare.com/&quot; target=&quot;_blank&quot;&gt;Cloudflare One&lt;/a&gt;, go to &lt;strong&gt;Integrations&lt;/strong&gt; &gt; &lt;strong&gt;Identity providers&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;In &lt;strong&gt;Your identity providers&lt;/strong&gt;, locate your Okta integration and select &lt;strong&gt;Edit&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Turn on &lt;strong&gt;Send risk score to Okta&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Upon saving, Cloudflare One will display the well-known URL for your organization. Copy the value.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Next, configure Okta to receive your risk scores.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;On your Okta admin dashboard, go to &lt;strong&gt;Security&lt;/strong&gt; &gt; &lt;strong&gt;Device Integrations&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Go to &lt;strong&gt;Receive shared signals&lt;/strong&gt;, then select &lt;strong&gt;Create stream&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Name your integration. In &lt;strong&gt;Set up integration with&lt;/strong&gt;, choose &lt;em&gt;Well-known URL&lt;/em&gt;.&lt;/li&gt;
&lt;li&gt;In &lt;strong&gt;Well-known URL&lt;/strong&gt;, enter the well-known URL value provided by Cloudflare One.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Create&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;</description><pubDate>Mon, 17 Jun 2024 00:00:00 GMT</pubDate><product>Risk Score</product><category>Risk Score</category></item><item><title>Access, Browser Isolation, CASB, Cloudflare Tunnel for SASE, Digital Experience Monitoring, Data Loss Prevention, Email security, Gateway, Multi-Cloud Networking, Cloudflare Network Firewall, Network Flow, Magic Transit, Cloudflare WAN, Network Interconnect, Risk Score, Cloudflare One Client - Explore product updates for Cloudflare One</title><link>https://developers.cloudflare.com/changelog/post/2024-06-16-cloudflare-one/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2024-06-16-cloudflare-one/</guid><description>&lt;p&gt;Welcome to your new home for product updates on &lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/&quot;&gt;Cloudflare One&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Our &lt;a href=&quot;https://developers.cloudflare.com/changelog/&quot;&gt;new changelog&lt;/a&gt; lets you read about changes in much more depth, offering in-depth examples, images, code samples, and even gifs.&lt;/p&gt;
&lt;p&gt;If you are looking for older product updates, refer to the following locations.&lt;/p&gt;
&lt;details&gt; &lt;summary&gt;&lt;p&gt;Older product updates&lt;/p&gt;
&lt;/summary&gt; &lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/access/&quot;&gt;Access&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/browser-isolation/&quot;&gt;Browser Isolation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/casb/&quot;&gt;CASB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/tunnel/&quot;&gt;Cloudflare Tunnel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/dlp/&quot;&gt;Data Loss Prevention&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/dex/&quot;&gt;Digital Experience Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/email-security/&quot;&gt;Email security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/gateway/&quot;&gt;Gateway&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/multi-cloud-networking/changelog/&quot;&gt;Multi-Cloud Networking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-network-firewall/changelog/&quot;&gt;Cloudflare Network Firewall&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/network-flow/changelog/&quot;&gt;Magic Network Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/magic-transit/changelog/&quot;&gt;Magic Transit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-wan/changelog/&quot;&gt;Magic WAN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/network-interconnect/changelog/&quot;&gt;Network Interconnect&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/cloudflare-one/changelog/risk-score/&quot;&gt;Risk score&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.cloudflare.com/changelog/cloudflare-one-client/&quot;&gt;Cloudflare One Client&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt; &lt;/details&gt;</description><pubDate>Sun, 16 Jun 2024 00:00:00 GMT</pubDate><product>Access</product><category>Access</category><category>Browser Isolation</category><category>CASB</category><category>Cloudflare Tunnel for SASE</category><category>Digital Experience Monitoring</category><category>Data Loss Prevention</category><category>Email security</category><category>Gateway</category><category>Multi-Cloud Networking</category><category>Cloudflare Network Firewall</category><category>Network Flow</category><category>Magic Transit</category><category>Cloudflare WAN</category><category>Network Interconnect</category><category>Risk Score</category><category>Cloudflare One Client</category></item></channel></rss>