Skip to content

Commit a138b3b

Browse files
authored
[CF1 IA revamp] Misc UI updates (#26872)
* PCX-19657 * edit device profile * Update src/content/partials/learning-paths/zero-trust/device-profiles.mdx
1 parent 5f5af4b commit a138b3b

File tree

15 files changed

+16
-16
lines changed

15 files changed

+16
-16
lines changed

src/content/docs/cloudflare-one/insights/dex/monitoring.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ A fleet is a collection of user devices. All devices in a fleet have WARP instal
1717

1818
To view fleet status:
1919

20-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience**.
20+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Insights** > **Digital experience**.
2121
2. In **DEX Monitoring**, review the information under the **Fleet Status** tab.
2222

2323
### View metrics

src/content/docs/cloudflare-one/insights/logs/posture-logs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ sidebar:
88

99
Posture logs show the [device posture check](/cloudflare-one/reusable-components/posture-checks/) results reported by the WARP client.
1010

11-
To view device posture logs, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **Posture**. Logs will only display if you have configured [device posture checks](/cloudflare-one/reusable-components/posture-checks/) for your Zero Trust organization.
11+
To view device posture logs, log in to [Cloudflare One](https://one.dash.cloudflare.com/) and go to **Logs** > **Posture**. Logs will only display if you have configured [device posture checks](/cloudflare-one/reusable-components/posture-checks/) for your Zero Trust organization.
1212

1313
Enterprise users can generate more detailed logs with [Logpush](/cloudflare-one/insights/logs/logpush/).
1414

src/content/docs/cloudflare-one/insights/logs/scim-logs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ SCIM activity logs allow administrators to audit how [SCIM provisioning](/cloudf
1212

1313
## View SCIM logs
1414

15-
For an overview of SCIM events across all users, log in to [Zero Trust](https://one.dash.cloudflare.com/) and go to **Logs** > **SCIM provisioning**. This page lists the inbound SCIM requests from all identity providers configured with SCIM. You can select an individual request to view more details about the SCIM operation.
15+
For an overview of SCIM events across all users, log in to [Cloudflare One](https://one.dash.cloudflare.com/) and go to **Logs** > **SCIM provisioning**. This page lists the inbound SCIM requests from all identity providers configured with SCIM. You can select an individual request to view more details about the SCIM operation.
1616

1717
To investigate how SCIM events impacted a specific user, go to their [User Registry identity](/cloudflare-one/team-and-resources/users/users/).
1818

src/content/docs/email-security/migrate-to-email-security.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ In Area 1, you [invite users](/email-security/account-setup/manage-account-membe
3636

3737
To invite users in Zero Trust Email security:
3838

39-
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
39+
1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/).
4040
2. Go to **Manage Account**.
4141
3. Select **Members** > **Invite** > [Add account members](/fundamentals/manage-members/manage/#add-account-members).
4242

src/content/docs/learning-paths/replace-vpn/build-policies/create-policy.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ To ensure holistic security precautions, we recommend securing each distinct pri
1515

1616
## Create a Gateway policy
1717

18-
To create a new policy, open [Zero Trust](https://one.dash.cloudflare.com/) and go to **Gateway** > **Firewall policies**.
18+
To create a new policy, open [Cloudflare One](https://one.dash.cloudflare.com/) and go to **Gateway** > **Firewall policies**.
1919

2020
## Example DNS policy
2121

src/content/docs/learning-paths/secure-o365-email/configure-email-security/create-allow-policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ You can choose how Email security will handle messages that match your criteria:
1717

1818
To configure allow policies:
1919

20-
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
20+
1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/).
2121
2. Select **Email security**.
2222
3. Select **Settings**, then go to **Detection settings** > **Allow policies**.
2323
4. On the **Detection settings** page, select **Add a policy**.

src/content/docs/learning-paths/secure-o365-email/configure-email-security/impersonation-registry.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ The impersonation registry protects against these attacks by looking for spoofs
1111

1212
To add a user to the impersonation registry:
1313

14-
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
14+
1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/).
1515
2. Select **Email security**.
1616
3. Select **Settings** > **Impersonation registry**.
1717
4. Select **Add a user**.

src/content/docs/learning-paths/secure-o365-email/configure-email-security/set-additional-detections.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Email security allows you to configure the following additional detections:
1414

1515
To configure additional detections:
1616

17-
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
17+
1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/).
1818
2. Select **Email security**.
1919
3. Select **Settings**.
2020
4. On the Settings page, go to **Detection settings** > **Additional detections**, and select **Edit**.

src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/configure-auto-moves.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
To configure auto-move events:
99

10-
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
10+
1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/).
1111
2. Select **Email security**.
1212
3. Select **Settings**.
1313
4. Select **Moves**.

src/content/docs/learning-paths/secure-o365-email/get-started/setup-ms-graph-api.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 6
66
---
77

8-
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
8+
1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/).
99
2. Select **Email security**.
1010
3. Select **Monitoring**.
1111
4. Enable **Microsoft Integration**:

0 commit comments

Comments
 (0)