
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 07:47:05 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Network detection and settings profiles for the Cloudflare One agent]]></title>
            <link>https://blog.cloudflare.com/location-aware-warp/</link>
            <pubDate>Tue, 10 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare WARP can now securely detect pre-configured locations and route traffic based on the needs of the organization for that location. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Teams can connect users, devices, and entire networks to Cloudflare One through several flexible on-ramps. Those on-ramps include traditional connectivity options like GRE or IPsec tunnels, our <a href="https://www.cloudflare.com/products/tunnel/">Cloudflare Tunnel</a> technology, and our Cloudflare One device agent.</p><p>Each of these on-ramps send nearly all traffic to Cloudflare’s network where we can filter security threats with products like our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">Data Loss Prevention</a> service. In other cases, the destination is an internal resource deployed in Cloudflare’s <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust private network</a>.</p><p>However, sometimes users want traffic to stay local. If a user is sitting within a few meters of their printer, they might prefer to connect through their local network instead of adding a hop through Cloudflare. They could configure Cloudflare to always ignore traffic bound for the printer, keeping it local, but when they leave the office they still need to use Cloudflare’s network to reach that printer remotely.</p><p>Solving this use case and others like it previously required manual changes from an administrator every time a user moved. An administrator would need to tell Cloudflare’s agent to include traffic sometimes and, in other situations, ignore it. This does not scale.</p><p>Starting today, any team using Cloudflare One has the flexibility to decide what traffic is sent to Cloudflare and what traffic stays local depending on the network of the user. End users do not need to change any settings when they enter or exit a managed network. Cloudflare One’s device agent will automatically detect and make the change for them.</p>
    <div>
      <h2>Not everyone needs the same controls</h2>
      <a href="#not-everyone-needs-the-same-controls">
        
      </a>
    </div>
    <p>Not every user in your enterprise needs the same network configuration. Sometimes you need to make exceptions for teams, certain members of staff, or speciality hardware/software based on business needs. Those exceptions can become a manual mess when you compound how locations and networks might also require different settings.</p><p>We’ve heard several examples from customers who run into that type of headache. Each case below describes a common theme: rigid network configuration breaks when it means real world usage.</p><p>In some cases, a user will work physically close to a server or another device that their device needs to reach. We talk to customers in manufacturing or lab environments who prefer to send all Internet-bound traffic to Cloudflare but want to continue to operate a private network inside their facility.</p><p>Today’s announcement allows teams to adapt to this type of model. When users operate inside the physical location in the trusted network, they can connect directly. When they leave, they can use Cloudflare’s network to reach back into the trusted network after they meet the conditions of the Zero Trust rules configured by an administrator.</p><p>In other situations, customers are in the process of phasing out legacy appliances in favor of Cloudflare One. However, the migration to a Zero Trust model sometimes needs to be stepwise and deliberate. In these cases, customers maintain some existing on-premise infrastructure while they deploy Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> solution.</p><p>As part of this release, teams can configure Cloudflare’s device agent to detect that a user sits inside a known location where those appliances still operate. The agent will automatically stop directing traffic to Cloudflare and instead send it to your existing appliances while you deprecate them over time.</p>
    <div>
      <h2>Configuration Profiles and Managed Networks</h2>
      <a href="#configuration-profiles-and-managed-networks">
        
      </a>
    </div>
    <p>Today’s release introduces the ability to <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/">create a profile</a>, a defined set of configuration options. You can create rules that decide when and where profiles apply, changing settings without manual intervention.</p><p>For our network-aware work, administrators can define a profile that decides what traffic is sent to Cloudflare and what stays local. Next, that profile can apply when users are in specific networks and not when they are in other locations.</p><p>Beyond network detection, profiles can apply based on user group membership. Not every user in your workforce needs the same on-ramp configuration. Some developers might need certain traffic excluded due to local development work. As part of this launch, you can configure profiles to apply based on who the user is in addition to where the user sits.</p>
    <div>
      <h2>Defining a secure way to detect a network you manage</h2>
      <a href="#defining-a-secure-way-to-detect-a-network-you-manage">
        
      </a>
    </div>
    <p>Cloudflare needs to be able to decide what network a device is using in a way that can’t easily be spoofed by someone looking to skirt policy. To solve that challenge, today’s release introduces the ability to define a known TLS endpoint which Cloudflare’s agent can reach. In just a few minutes, an administrator can create a certificate-validated check to indicate a device is operating within a <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks/">managed network</a>.</p><p>First, an administrator can create a <a href="https://www.cloudflare.com/application-services/products/ssl/">TLS certificate</a> that Cloudflare will use and match based on the SHA-256 hash of the certificate. You can leverage existing infrastructure or create a new TLS endpoint via the following example:</p><p>1. Create a local certificate you can use</p>
            <pre><code>openssl req -x509 -newkey rsa:4096 -sha256 -days 3650 -nodes -keyout example.key -out example.pem -subj "/CN=example.com" -addext "subjectAltName=DNS:example.com"</code></pre>
            <p>2. Extract the sha256 thumbprint of that certificate</p>
            <pre><code>openssl x509 -noout -fingerprint -sha256 -inform pem -in example.pem | tr -d :</code></pre>
            <p>Which will output something like this:</p>
            <pre><code>SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8662</code></pre>
            <p>Next, the Cloudflare agent running on the device needs to be able to reach that certificate to validate that it is connected to a network you manage. We recommend running a simple HTTP server inside your network which the device can reach to validate the certificate.</p><p>3. Create a python3 script and save as <code>myserver.py</code> as part of setting up a simple <a href="https://gist.github.com/dergachev/7028596">HTTP server</a>.</p>
            <pre><code>import ssl, http.server

class BasicHandler(http.server.BaseHTTPRequestHandler):
    def do_GET(self):
        self.send_response(200)
        self.send_header('Content-type', 'text/html')
        self.end_headers()
        self.wfile.write(b'OK')
        return

server = http.server.HTTPServer(('0.0.0.0', 4443), BasicHandler)
sslcontext = ssl.create_default_context(ssl.Purpose.CLIENT_AUTH)
sslcontext.load_cert_chain(certfile='./example.pem', keyfile='./example.key')
server.socket = sslcontext.wrap_socket(server.socket, server_side=True)
server.serve_forever()</code></pre>
            <p>Run the server</p>
            <pre><code>python3 myserver.py</code></pre>
            
    <div>
      <h3>Configure the network location in Zero Trust dashboard</h3>
      <a href="#configure-the-network-location-in-zero-trust-dashboard">
        
      </a>
    </div>
    <p>Once you’ve created the example TLS endpoint above, provide the fingerprint to Cloudflare to define a managed network.</p><ol><li><p>Login to your Zero Trust Dashboard and navigate to Settings → WARP Client</p></li><li><p>Scroll down to Network Locations and click <code>Add new</code> and complete the form. Use the Fingerprint generated in the previous step as the TLS Cert SHA-256 and the IP address of the device running the python script</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Mwd8xWdnqPjlaiqgWF7Lt/3a8ea0f884c6e0dcd8630f3b6a3e9fef/image2-14.png" />
            
            </figure>
    <div>
      <h3>Configure a Device Profile</h3>
      <a href="#configure-a-device-profile">
        
      </a>
    </div>
    <p>Once the network is defined, you can <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/">create profiles</a> that apply based on whether the agent is operating in this network. To do so, follow the steps below.</p><ol><li><p>Login to your Zero Trust Dashboard and navigate to Settings → WARP Client</p></li><li><p>Scroll down to <code>Device Settings</code> and create a new profile that includes Your newly created managed network as a location</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8GMjayplYNW1fxpM8f3VE/a5cf5bf8964cd10b190740430309d3eb/image3-10.png" />
            
            </figure>
    <div>
      <h3>Reconnect your Agent</h3>
      <a href="#reconnect-your-agent">
        
      </a>
    </div>
    <p>Each time the device agent detects a network change event from the operating systems (ex. waking up the device, changing Wi-Fi networks, etc.) the agent will also attempt to reach that endpoint inside your network to prove that it is operating within a network you manage.</p><p>If an endpoint that matches the SHA-256 fingerprint you’ve defined is detected, the device will get the settings profile as configured above. You can quickly validate that the device agent received the required settings by using warp-cli settings or warp-cli get-alternate-network from your command line / terminal.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Managed network detection and settings profiles are both new and available for you to use today. While settings profiles will work with any modern version of the agent from this last year, network detection requires at least version 2022.12.</p><p>The WARP device client currently runs on <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/download-warp/">all major operating systems</a> and is easy to deploy with the <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/">device management</a> tools your organization already uses. You can find the download links to all versions of our agent by visiting Settings →Downloads</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YQhXAsEd1SwYqefvewGK1/67fb9bca5a15461fd11b2fc804f4a0f3/image1-21.png" />
            
            </figure><p>Starting a Zero Trust journey can be daunting. We’re spending this week, CIO Week, to share features like this to make it less of a hassle to begin. If you want to talk to us to learn more about how to take that first step, please <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">reach out</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[WARP]]></category>
            <guid isPermaLink="false">1Cch33DIW8NEqcSFzG9Gjj</guid>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare partners to simplify China connectivity for corporate networks]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-in-china/</link>
            <pubDate>Tue, 29 Nov 2022 16:35:47 GMT</pubDate>
            <description><![CDATA[ Today we’re excited to announce expansion of our Cloudflare One product suite to tackle these problems, with the goal of creating the best SASE experience for users and organizations in China ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/59bEi3ASQdbRkn2o4KBhIp/14f5f5a20f816a36f1a48100134f8443/image2-57.png" />
            
            </figure><p>IT teams have historically faced challenges with performance, security, and reliability for employees and network resources in mainland China. Today, along with our strategic partners, we’re excited to announce expansion of our Cloudflare One product suite to tackle these problems, with the goal of creating the best <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> experience for users and organizations in China.</p><p>Cloudflare One, our comprehensive SASE platform, allows organizations to connect any source or destination and apply single-pass security policies from one unified control plane. Cloudflare One is built on our <a href="https://www.cloudflare.com/network/">global network</a>, which spans 275 cities across the globe and is within 50ms of 95% of the world’s Internet-connected population. Our ability to serve users extremely close to wherever they’re working—whether that’s in a corporate office, their home, or a <a href="https://www.cloudflare.com/learning/access-management/coffee-shop-networking/">coffee shop</a>—has been a key reason customers choose our platform since day one.</p><p>In 2015, we extended our <a href="https://www.cloudflare.com/application-services/">Application Services</a> portfolio to cities in mainland China; in 2020, we expanded these capabilities to offer better performance and security through our strategic partnership with <a href="/cloudflare-partners-with-jd-cloud/">JD Cloud</a>. Today, we’re unveiling our latest steps in this journey: extending the capabilities of Cloudflare One to users and organizations in mainland China, through additional strategic partnerships. Let’s break down a few ways you can achieve better connectivity, security, and performance for your China network and users with Cloudflare One.</p>
    <div>
      <h3>Accelerating traffic from China networks to private or public resources outside of China through China partner networks</h3>
      <a href="#accelerating-traffic-from-china-networks-to-private-or-public-resources-outside-of-china-through-china-partner-networks">
        
      </a>
    </div>
    <p>Performance and reliability for traffic flows across the mainland China border have been a consistent challenge for IT teams within multinational organizations. Packets crossing the China border often experience reachability, congestion, loss, and latency challenges on their way to an origin server outside of China (and vice versa on the return path). Security and IT teams can also struggle to enforce consistent policies across this traffic, since many aspects of China networking are often treated separately from the rest of an organization’s global network because of their unique challenges.</p><p>Cloudflare is excited to address these challenges with our strategic China partners, combining our network infrastructure to deliver a better end-to-end experience to customers. Here’s an example architecture demonstrating the optimized packet flow with our partners and Cloudflare together:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/doTXbrCkWraGqKxZeLky4/6899fdb9b2492b3f150cceff8beefef0/1-7.png" />
            
            </figure><p>Acme Corp, a multinational organization, has offices in Shanghai and Beijing. Users in those offices need to reach resources hosted in Acme’s data centers in Ashburn and London, as well as SaaS applications like Jira and Workday. Acme procures last mile connectivity at each office in mainland China from Cloudflare’s China partners.</p><p>Cloudflare’s partners route local traffic to its destination within China, and global traffic across a secure link to the closest available Cloudflare data center on the other side of the Chinese border.</p><p>At that data center, Cloudflare enforces a full stack of security functions across the traffic including network <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">firewall-as-a-service</a> and Secure Web Gateway policies. The traffic is then routed to its destination, whether that’s another connected location on Acme’s private network (via Anycast GRE or IPsec tunnel or <a href="https://www.cloudflare.com/network-interconnect/">direct connection</a>) or a resource on the public Internet, across an optimized middle-mile path. Acme can choose whether Internet-bound traffic egresses from a shared or dedicated Cloudflare-owned IP pool.</p><p>Return traffic back to Acme’s connected network location in China takes the opposite path: source → Cloudflare’s network (where, again, security policies are applied) → Partner network → Acme local network.</p><p>Cloudflare and our partners are excited to help customers solve challenges with cross-border performance and security. This <a href="https://www.cloudflare.com/application-services/solutions/">solution</a> is easy to deploy and available now - reach out to your account team to get started today.</p>
    <div>
      <h3>Enforcing uniform security policy across remote China user traffic</h3>
      <a href="#enforcing-uniform-security-policy-across-remote-china-user-traffic">
        
      </a>
    </div>
    <p>The same challenges that impact connectivity from China-based networks reaching out to global resources also impact remote users working in China. Expanding on the network connectivity solution we just described, we’re looking forward to improving user connectivity to cross-border resources by adapting our device client (WARP). This solution will also allow security teams to enforce consistent policy across devices connecting to corporate resources, rather than managing separate security stacks for users inside and outside of China.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aU3IiM5L9cZa0n6oQvd7q/669873c7e709dc2e18e271defe8e84a4/2-2.png" />
            
            </figure><p>Acme Corp has users that are either based in or traveling to China for business and need to access corporate resources that are hosted beyond China, without necessarily being physically in an Acme office in order to enable this access. Acme uses an MDM provider to install the WARP client on company-managed devices and enroll them in Acme’s Cloudflare Zero Trust organization. Within China, the WARP client utilizes Cloudflare’s China partner networks to establish the same Wireguard tunnel to the nearest Cloudflare point of presence outside of mainland China. Cloudflare’s partners act as the carrier of our customers’ IP traffic through their acceleration service and the content remains secure inside WARP.</p><p>Just as with traffic routed via our partners to Cloudflare at the network layer, WARP client traffic arriving at its first stop outside of China is filtered through Gateway and Access policies. Acme’s IT administrators can choose to enforce the same, or additional policies for device traffic from China vs other global locations. This setup makes life easier for Acme’s IT and security teams - they only need to worry about installing and managing a single device client in order to grant access and control security regardless of where employees are in the world.</p><p>Cloudflare and our partners are actively testing this solution in private beta. If you’re interested in getting access as soon as it’s available to the broader public, please contact your account team.</p>
    <div>
      <h3>Extending SASE filtering to local China data centers (future)</h3>
      <a href="#extending-sase-filtering-to-local-china-data-centers-future">
        
      </a>
    </div>
    <p>The last two use cases have focused primarily on granting network and user access from within China to resources on the other side of the border - but what about improving connectivity and security for local traffic?</p><p>We’ve heard from both China-based and multinational organizations that are excited to have the full suite of Cloudflare One functions available across China to achieve a full SASE architecture just a few milliseconds from everywhere their users and applications are in the world. We’re actively working toward this objective with our strategic partners, expanding upon the current availability of our application services platform across 45 data centers in 38 unique cities in mainland China.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/UxurdJVTv7uXteViJbplD/232f198ea2e618df95c9db12bcc934e8/image4-36.png" />
            
            </figure><p>Talk to your account team today to get on the waitlist for the full suite of Cloudflare One functions delivered across our China Network and be notified as soon as beta access is available!</p>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>We’re so excited to help organizations improve connectivity, performance and security for China networks and users. Contact your account team today to learn more about how Cloudflare One can help you transform your network and achieve a SASE architecture inside and outside of mainland China.</p><p>If you'd like to learn more, join us for a live webinar on Dec 6, 2022 10:00 AM PST through this <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4010917/navigating-the-challenges-of-connecting-with-your-audience-in-china?partnerref=blog">link</a> where we can answer all your questions about connectivity in China.</p> ]]></content:encoded>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Network]]></category>
            <guid isPermaLink="false">3qxWHx7DkFzf8F2FAc6UDl</guid>
            <dc:creator>Kyle Krum</dc:creator>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare integrates with
Microsoft Intune to give CISOs
secure control across devices,
applications, and corporate networks]]></title>
            <link>https://blog.cloudflare.com/cloudflare-microsoft-intune-partner-to-give-cisos-secure-control-across-devices-applications/</link>
            <pubDate>Thu, 23 Jun 2022 13:35:10 GMT</pubDate>
            <description><![CDATA[ Cloudflare integrates with Microsoft Intune and combines the power of Cloudflare’s expansive network and Zero Trust suite with Endpoint Manager ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we are very excited to announce our new integration with Microsoft Endpoint Manager (Intune). This integration combines the power of Cloudflare’s expansive network and Zero Trust suite, with Endpoint Manager. Via our existing Intune integration, joint customers can check if a device management profile such as Intune is running on the device or not and grant access accordingly.</p><p>With this expanded integration, joint customers can identify, investigate, and remediate threats faster. The integration also includes the latest information from Microsoft Graph API which provides many added, real-time device posture assessments and enables organizations to verify users' device posture before granting access to internal or external applications.</p><blockquote><p><i>"In today’s work-from-anywhere business culture, the risk of compromise has substantially increased as employees and their devices are continuously surrounded by a hostile threat environment outside the traditional castle-and-moat model. By expanding our integration with Cloudflare, we are making it easier for joint customers to strengthen their Zero Trust security posture across all endpoints and their entire corporate network."</i><b>– Dave Randall, Sr Program Manager, Microsoft Endpoint Manager</b></p></blockquote><p>Before we get deep into how the integration works, let’s first recap Cloudflare’s Zero Trust Services.</p>
    <div>
      <h3>Cloudflare Access and Gateway</h3>
      <a href="#cloudflare-access-and-gateway">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a> determines if a user should be allowed access to an application or not. It uses our global network to check every request or connection for identity, device posture, location, multifactor method, and many more attributes to do so. Access also logs every request and connection — providing administrators with high-visibility. The upshot of all of this: it enables customers to deprecate their legacy VPNs.</p><p><a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> protects users as they connect to the rest of the Internet. Instead of backhauling traffic to a centralized location, users connect to a nearby Cloudflare data center where we apply one or more layers of security, filtering, and logging, before accelerating their traffic to its final destination.</p>
    <div>
      <h3>Zero Trust integration with Microsoft Endpoint Manager</h3>
      <a href="#zero-trust-integration-with-microsoft-endpoint-manager">
        
      </a>
    </div>
    <p>Cloudflare’s customers can now build Access and Gateway policies based on the device being managed by Endpoint Manager (Intune) with a <a href="https://docs.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started">compliance policy</a> defined. In conjunction with our Zero Trust client, we are able to leverage the enhanced telemetry that Endpoint Manager (Intune) provides surrounding a user’s device.</p><p>Microsoft’s Graph API delivers continuous real-time security posture assessments such as <a href="https://docs.microsoft.com/en-us/graph/api/resources/intune-devices-compliancestate?view=graph-rest-1.0">Compliance State</a> across all endpoints in an organization regardless of the location, network or user. Those key additional device posture data enable enforcement of conditional policies based on device health and compliance checks to mitigate risks. These policies are evaluated each time a connection request is made, making the conditional access adaptive to the evolving condition of the device.</p><p>With this integration, organizations can build on top of their existing Cloudflare Access and Gateway policies ensuring that a ‘Compliance State’ has been met before a user is granted access. Because these policies work across our entire <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> platform, organizations can use these to build powerful rules invoking Browser Isolation, <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/tenant-control/">tenant control</a>, antivirus or any part of their Cloudflare deployment.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/26Rgfz8AF2otBTft1pqEzD/f5697687185a16e3e044fc4d7ea05549/image4-23.png" />
            
            </figure>
    <div>
      <h3>How the integration works</h3>
      <a href="#how-the-integration-works">
        
      </a>
    </div>
    <p>Customers using our Zero Trust suite can add Microsoft Intune as a device posture provider in the Cloudflare Zero Trust dashboard under Settings → Devices → Device Posture Providers. The details required from the Microsoft Endpoint Manager admin center to set up policies on Cloudflare dashboard include: ClientID, Client Secret, and Customer ID.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6fdgVepyKoPhzB5IKWg60/e1d3d1a671f7db84e480413d20b48158/image5-12.png" />
            
            </figure><p>After creating the Microsoft Endpoint Manager Posture Provider, customers can create specific device posture checks requiring users’ devices to meet certain criteria such as device ‘Compliance State’.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2GThgDqgAaJCp7PTLTx3WA/3d6267b670e94c76354e9fe61ad439d7/image2-37.png" />
            
            </figure><p>These rules can now be used to create conditional <a href="https://developers.cloudflare.com/cloudflare-one/policies/zero-trust/">Access</a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/">Gateway</a> policies to allow or deny access to applications, networks, or sites. Administrators can choose to block or isolate users or user groups with malicious or insecure devices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7CNQuqGd65N2buO2MSgJkW/4f1327d74bc683dac41edb53b729874e/image3-25.png" />
            
            </figure>
    <div>
      <h3>What comes next?</h3>
      <a href="#what-comes-next">
        
      </a>
    </div>
    <p>In the coming months, we will be further strengthening our integrations with the Microsoft Graph API by allowing customers to correlate many other fields in the <a href="https://docs.microsoft.com/en-us/graph/api/resources/intune-device-mgt-conceptual?view=graph-rest-1.0">Graph API</a> to enhance our joint customers’ security policies.</p><p>If you’re using Cloudflare Zero Trust products today and are interested in using this integration with Microsoft Intune, please visit our <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/microsoft/">documentation</a> to learn about how you can enable it. If you want to learn more or have additional questions, please fill out the <a href="https://www.cloudflare.com/partners/technology-partners/microsoft/">form</a> or get in touch with your Cloudflare CSM or AE, and we'll be happy to help you.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Microsoft]]></category>
            <guid isPermaLink="false">5nUqasjyedTRF4i5R5PRZS</guid>
            <dc:creator>Abhi Das</dc:creator>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare and CrowdStrike partner to give CISOs secure control across devices, applications, and corporate networks]]></title>
            <link>https://blog.cloudflare.com/cloudflare-crowdstrike-partnership/</link>
            <pubDate>Thu, 17 Mar 2022 09:59:08 GMT</pubDate>
            <description><![CDATA[ We're very excited to announce multiple new integrations with CrowdStrike. These integrations combine the power of Cloudflare’s expansive network and Zero Trust suite, with CrowdStrike’s Endpoint Detection and Response (EDR) and incident remediation offerings ]]></description>
            <content:encoded><![CDATA[ <p>Today, we are very excited to announce multiple new integrations with CrowdStrike. These integrations combine the power of Cloudflare’s expansive network and Zero Trust suite, with CrowdStrike’s Endpoint Detection and Response (EDR) and incident remediation offerings.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EQn2t3p7cIUbbrrpQNDvd/10dee97ffae460a6264ddb4cc8c37711/Crowdstrike-Partnership.png" />
            
            </figure><p>At Cloudflare, we believe in making our solutions easily integrate with the existing technology stack of our customers. Through our partnerships and integrations, we make it easier for our customers to use Cloudflare solutions jointly with that of partners, to further strengthen their security posture and unlock more value. Our partnership with CrowdStrike is an apt example of such efforts.</p><p>Together, Cloudflare and CrowdStrike are working to simplify the adoption of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> for IT and security teams. With this expanded partnership, joint customers can identify, investigate, and remediate threats faster through multiple integrations:</p><p><b>First,</b> by integrating <a href="https://www.cloudflare.com/zero-trust/solutions/">Cloudflare’s Zero Trust services</a> with CrowdStrike Falcon Zero Trust Assessment (ZTA), which provides continuous real-time device posture assessments, our customers can verify users’ device posture before granting them access to internal or external applications.</p><p><b>Second,</b> we joined the <a href="https://www.crowdstrike.com/press-releases/crowdstrike-adds-new-strategic-partners-to-groundbreaking-crowdxdr-alliance/#:~:text=Cloudflare%2C%20Armis%20and%20ThreatWarrior%20are,%2C%20Mimecast%2C%20Claroty%20and%20Corelight.">CrowdXDR Alliance</a> in December 2021 and are partnering with CrowdStrike to share security telemetry and other insights to make it easier for customers to identify and mitigate threats. Cloudflare’s global network spans more than 250 cities in over 100 countries, blocking an average of 76 billion cyber threats each day. This provides customers with unparalleled insights, helping security teams better protect their organization. By joining the CrowdXDR Alliance, we will be able to use security signals from Cloudflare’s global network with CrowdStrike’s leading endpoint protection to help mutual customers stop cyber attacks anywhere in their network.</p><p><b>Third,</b> CrowdStrike is one of Cloudflare’s incident response partners, providing rapid and effective support. CrowdStrike’s incident response team deals with active under attack situations day in, day out — helping customers mitigate the attack and get their web property and network back online. Our partnership with CrowdStrike enables rapid remediation of under attack scenarios to safeguard organizations from adversaries.</p><blockquote><p><i>“The speed in which a company is able to identify, investigate and remediate a threat heavily determines how it will fare in the end. Our partnership with Cloudflare provides companies the ability to take action rapidly and contain exposure at the time of an attack, enabling them to get back on their feet and return to business as usual as quickly as possible.”</i>- <b>Thomas Etheridge</b>, Senior Vice President, CrowdStrike Services</p></blockquote><p>CrowdStrike’s endpoint security meets Cloudflare’s Zero Trust Services</p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2uD91HZrTzA9yoIVsNgOAk/a11987d539f1b9c7f97bc3d618ec97a0/pasted-image-0--1--1.png" />
            
            </figure><p>Before we get deep into how the integration works, let’s first recap Cloudflare’s Zero Trust Services.</p>
    <div>
      <h3>Cloudflare Access and Gateway</h3>
      <a href="#cloudflare-access-and-gateway">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a> determines if a user should be allowed access to an application or not. It uses our global network to check every request or connection for identity, device posture, location, multifactor method, and many more attributes to do so. Access also logs every request and connection — providing administrators with high-visibility. The upshot of all of this: it enables customers to deprecate their legacy VPNs.</p><p><a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> protects users as they connect to the rest of the Internet. Instead of back hauling traffic to a centralized location, users connect to a nearby Cloudflare data center where we apply one or more layers of security, filtering, and logging, before accelerating their traffic to its final destination.</p>
    <div>
      <h3>Zero Trust Integration with CrowdStrike</h3>
      <a href="#zero-trust-integration-with-crowdstrike">
        
      </a>
    </div>
    <p>Cloudflare’s customers can now build Access and Gateway policies based on the presence of a CrowdStrike agent at the endpoint. In conjunction with our Zero Trust client, we are able to leverage the enhanced telemetry that CrowdStrike provides surrounding a user’s device.</p><p>CrowdStrike’s Zero Trust Assessment (ZTA) delivers continuous real-time security posture assessments across all endpoints in an organization regardless of the location, network or user. The ZTA scores enable enforcement of conditional policies based on device health and compliance checks to mitigate risks. These policies are evaluated each time a connection request is made, making the conditional access adaptive to the evolving condition of the device.</p><p>With this integration, organizations can build on top of their existing Cloudflare Access and Gateway policies ensuring that a minimum ZTA score or version has been met before a user is granted access. Because these policies work across our entire Zero Trust platform, organizations can use these to build powerful rules invoking Browser Isolation, <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/tenant-control/">tenant control</a>, antivirus or any part of their Cloudflare deployment.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7EB1HVVJRq3hHI01r3hXK9/1f76feee182a8ca2ee9fc2076851628a/pasted-image-0--2--1.png" />
            
            </figure><blockquote><p>_"The CrowdStrike Falcon platform secures customers through verified access controls, helping customers reduce their attack surface and simplify, empower and accelerate their Zero Trust journey. By expanding our partnership with Cloudflare, we are making it easier for joint customers to strengthen their Zero Trust security posture across all endpoints and their entire corporate network."_- <b>Michael Sentonas</b>, Chief Technology Officer, CrowdStrike</p></blockquote>
    <div>
      <h3>How the integration works</h3>
      <a href="#how-the-integration-works">
        
      </a>
    </div>
    <p>Customers using our Zero Trust suite can add CrowdStrike as a device posture provider in the Cloudflare Zero Trust dashboard under Settings → Devices → Device Posture Providers. The details required from the CrowdStrike dashboard include: ClientID, Client Secret, REST API URL, and Customer ID.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ODgmsQQuKOvgiJOeSL1Vt/7d9f7e168f3f0b51e46a8c2cc2b3d61d/pasted-image-0--3--1.png" />
            
            </figure><p>After creating the CrowdStrike Posture Provider, customers can create specific device posture checks requiring users’ devices to meet a certain threshold of <a href="https://falcon.us-2.crowdstrike.com/documentation/156/zero-trust-assessment-apis">ZTA scores</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Akw1cK9qyCYbKIz34l4It/c6920245f80941c52e21eb271c07e1e7/Screen-Shot-2022-03-16-at-4.48.42-PM.png" />
            
            </figure><p>These rules can now be used to create conditional <a href="https://developers.cloudflare.com/cloudflare-one/policies/zero-trust/">Access</a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/">Gateway</a> policies to allow or deny access to applications, networks, or sites. Administrators can choose to block or isolate users or user groups with malicious or insecure devices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gwoBIcA58pmUqjhgvgxxr/28a1903ece64e5bbf60fbf33bdb7625b/pasted-image-0--5-.png" />
            
            </figure>
    <div>
      <h2>What comes next?</h2>
      <a href="#what-comes-next">
        
      </a>
    </div>
    <p>In the coming months, we will be further strengthening our integrations with CrowdStrike by allowing customers to correlate their Cloudflare logs with Falcon telemetry, for timely detection and mitigation of sophisticated threats.If you’re using Cloudflare Zero Trust products today and are interested in using this integration with CrowdStrike, please visit our <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/crowdstrike/">documentation</a> to learn about how you can enable it. If you want to learn more or have additional questions, please fill out the <a href="https://www.cloudflare.com/partners/technology-partners/crowdstrike/">form</a> or get in touch with your Cloudflare CSM or AE, and we'll be happy to help you.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">4TrcHN6XAjvNLiDb1M8DZF</guid>
            <dc:creator>Deeksha Lamba</dc:creator>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare One helps optimize user connectivity to Microsoft 365]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-helps-optimize-user-connectivity-to-microsoft-365/</link>
            <pubDate>Fri, 10 Dec 2021 13:59:17 GMT</pubDate>
            <description><![CDATA[ Cloudflare One partners with Microsoft to optimize user connectivity to Microsoft 365 ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39WExaQOQLJYVrK0VBqMDK/496cf5d5bb22c8f97e3d17286105c2ec/image1-48.png" />
            
            </figure><p>We are excited to announce that Cloudflare has joined the Microsoft 365 Networking Partner Program (NPP).  Cloudflare One, which provides an optimized path for traffic from Cloudflare customers to Microsoft 365, recently qualified for the NPP by demonstrating that on-ramps through Cloudflare’s network help optimize user connectivity to Microsoft.</p>
    <div>
      <h3>Connecting users to the Internet on a faster network</h3>
      <a href="#connecting-users-to-the-internet-on-a-faster-network">
        
      </a>
    </div>
    <p>Customers who deploy Cloudflare One give their team members access to the world’s fastest network, <a href="/benchmarking-edge-network-performance/">on average</a>, as their on-ramp to the rest of the Internet. Users connect from their devices or offices and reach Cloudflare’s network in over 250 cities around the world. Cloudflare’s network accelerates traffic to its final destination through a combination of intelligent routing and software improvements.</p><p>We’re also excited that, in many cases, the final destination that a user visits already sits on Cloudflare’s network. Cloudflare serves over 28M HTTP requests per second, on average, for the millions of customers who secure their applications on our network. When those applications do not run on our network, we can rely on our own global private backbone and our connectivity with over 10,000 networks globally to connect the user.</p><p>For Microsoft 365 traffic, we focus on breaking out traffic as locally and direct as possible to bring users to the productivity tools they need without slowing them down. Legacy security solutions can introduce additional hops or backhauling that slows down connectivity to tools like Microsoft 365. With Cloudflare One, we provide the flexibility to identify that traffic and give it the most direct path to Microsoft’s own network of service endpoints around the world.</p>
    <div>
      <h3>Securing data and users with Cloudflare Zero Trust</h3>
      <a href="#securing-data-and-users-with-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>With this setting, trusted traffic to Microsoft uses the most direct path without additional processing. However, the rest of the Internet should not be trusted. Cloudflare’s network also secures the connections, queries, and requests your teams make to protect organizations from attacks and data loss. We can do that without slowing users down because we deliver that security in the data centers at our edge.</p><p>SaaS applications delivered over the Internet can make any device with a browser into a workstation. However, that also means that those same devices can connect to the rest of the Internet. Attackers try to lure users into lookalike sites to steal credentials, or they attempt to have users download malware to compromise the device. Either type of attack can put the data stored in SaaS applications at risk.</p><p>Cloudflare helps organizations stop those types of attacks through a defense-in-depth strategy. First, Cloudflare starts by delivering a next-generation network firewall in our data centers, filtering traffic for connections to potentially dangerous destinations. Next, Cloudflare runs the world’s fastest DNS resolver and combines it with the data we see about the rest of the Internet to filter queries to phishing domains or sites that host malware.</p><p>Finally, Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> can inspect HTTP traffic for data loss, viruses, or can choose to isolate the browser for specific sites or entire categories. While Cloudflare’s network secures users from attacks on the rest of the Internet, Cloudflare One ensures that users have a direct, unfettered connection to the Microsoft 365 tools they need.</p><p>With traffic secured, Cloudflare can also give administrators visibility into the other applications used in their organization. Without any additional software or features, Cloudflare uses its <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust security suite</a> to analyze and categorize the requests to all applications in a comprehensive Shadow IT report. Administrators can mark applications as approved, unapproved, or unknown and pending investigation so for example Administrators could mark Microsoft 365 traffic as approved -- which is also the default setting in deployments that use the one-click enablement being released today.</p><p>In some cases, that visibility leads to surprises. Security and IT teams discover that users are doing work in SaaS platforms that have not been reviewed and approved by the organization. In those cases, teams can use Cloudflare’s Secure Web Gateway to block requests to those destinations or just to prevent certain types of activities like blocking file uploads to tools other than OneDrive. With Shadow IT, we can help teams that use Microsoft 365 ensure that data only stays in Microsoft 365.</p>
    <div>
      <h3>Our participation in Microsoft 365 Networking Partner Program</h3>
      <a href="#our-participation-in-microsoft-365-networking-partner-program">
        
      </a>
    </div>
    <p>Cloudflare has joined the Microsoft 365 Networking Partner Program (NPP). The program is designed to offer customers a set of partners whose deployment practices and guidance are aligned with Microsoft’s networking principles for Microsoft 365 to provide users with the best user experience. Microsoft established the NPP to work with networking companies for optimal connectivity to its service. We are excited to work with a partner whose global network and security principles align with ours.</p><p>Starting today, through Cloudflare One, organizations have the ability to ensure as direct a connection as possible for Microsoft 365 traffic. This allows our customers with our WARP client to benefit from a seamless user experience for Microsoft 365, while at the same time securing the rest of their traffic either to SaaS apps, on-prem apps or direct internet traffic through Cloudflare’s global network and security suite of products.</p><p>To do this all customers need to do is to enable the Microsoft 365 traffic optimization setting in their Cloudflare One dashboard. Via the setting even if Microsoft 365 connections are routed through the Cloudflare gateways, they are being handled with the least amount of additional overhead for example "Do not inspect" policy is automatically enabled.</p><p>It's very easy to enable with just a few clicks:</p><ol><li><p>Log into the <a href="https://dash.teams.cloudflare.com/">Cloudflare for Teams dashboard</a>.</p></li><li><p>Go to <b>Settings &gt; Network.</b></p></li><li><p>For <b>Exclude Office 365 traffic</b> and <b>Bypass Office 365 traffic</b>, click <b>Create entries</b>.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4oLW9UIG39nubVxYaVmVTr/4b8c14deb429abedcff5a8af972bf412/image2-31.png" />
            
            </figure><blockquote><p><i>“We’re thrilled to welcome Cloudflare into the Networking Partner Program for Microsoft 365,” said Scott Schnoll, Senior Product Marketing Manager, Microsoft. “Cloudflare is a valued partner that is focused on helping Microsoft 365 customers implement the Microsoft 365 Network Connectivity Principles. Microsoft only recommends Networking Partner Program member solutions for connectivity to Microsoft 365.”</i></p></blockquote>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Your organization can start deploying Cloudflare One today alongside your existing Microsoft 365 usage. We’re excited to work with Microsoft to give your team members fast, reliable, and secure connectivity to the tools they need to do their jobs.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Microsoft]]></category>
            <guid isPermaLink="false">622yC8oPKvVFM7NHcToB0t</guid>
            <dc:creator>Kyle Krum</dc:creator>
            <dc:creator>Abhi Das</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare announces integrations with MDM companies]]></title>
            <link>https://blog.cloudflare.com/mdm-partnerships/</link>
            <pubDate>Fri, 10 Dec 2021 13:58:41 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce new integrations with mobile device management vendors Microsoft, Ivanti, JumpCloud, Kandji, and Hexnode to make the deployment of Cloudflare WARP even easier. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6E87jqNDUV5WNhRKmreITS/3781997f0ed807c7f8cdd0a2a63b710b/image2-35.png" />
            
            </figure><p>At Cloudflare, we are continuously thinking about ways to make the Internet more secure, more reliable and more performant for consumers and businesses of all sizes. Connecting devices safely to applications is critical for the safety of enterprise applications and for the peace of mind of a CIO.</p><p>Last January, we <a href="/introducing-cloudflare-for-teams/">launched our Zero Trust platform, Cloudflare for Teams</a>, that protects users, their devices, and their data by replacing legacy security perimeters with Cloudflare’s global edge network. Cloudflare for Teams makes security solutions like Zero Trust Network Access and <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> more accessible, for all companies, regardless of size, scale, or resources. This means building products that are more user-friendly, easier to deploy, and less cumbersome to manage.</p><p>The Cloudflare WARP agent encrypts traffic from devices to Cloudflare’s network, and many customers use it as a critical component to extend default-deny controls to where their users are. Today, Cloudflare is rolling out richer documentation on how to deploy WARP with these partners, so your administrators have a streamlined, easy-to-follow process to enroll your entire device fleet.</p><p>And we’re excited to announce new integrations with mobile device management vendors Microsoft Intune, Ivanti, JumpCloud, Kandji, and Hexnode to make it even easier to deploy and install Cloudflare WARP.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6wCd32Mqqcd5yQ1lJkIXb7/b1b1b17fb154c55619b77b86c15c063f/image1-54.png" />
            
            </figure>
    <div>
      <h3>What is MDM?</h3>
      <a href="#what-is-mdm">
        
      </a>
    </div>
    <p>Mobile Device Management (MDM), sometimes also called Unified Endpoint Management (UEM) tools, offers a simple solution to an increasingly challenging problem in an era of distributed working — managing all of an organization's devices from a single platform.</p><p>Take a fictional healthcare consultancy firm. Suppose when starting her firm, the CEO hires largely in her home state of Colorado and allows employees to use their own personal phones and laptops to access emails and other data. This bring-your-own-device (BYOD) policy has been convenient to get the company off the ground.</p><p>Then, her firm starts landing higher profile clients with larger-scale projects, and to service this increased demand, our CEO begins hiring across the United States and rolling out corporate devices. Moreover, these clients have more rigorous standards around handling confidential patient data.</p><p>Our consultancy feels the pressure to level up its security. But with a mixed device fleet dispersed nationwide, how can our CEO improve visibility across managed and unmanaged devices; to check that they are properly updated, not compromised or lost? If lost or compromised, how can those devices be wiped remotely, so that client or company information does not leak?</p><p>MDM solutions can help answer these questions. They were made specifically to configure policies for what users can do on a device, roll out operating systems updates, and install new software -- all while providing a unified view of a device fleet for IT teams. While these problems used to be solved by stopping by an IT desk, they can now be addressed remotely, at scale.</p>
    <div>
      <h3>Streamlining deployment of our device client</h3>
      <a href="#streamlining-deployment-of-our-device-client">
        
      </a>
    </div>
    <p>Cloudflare recognizes that organizations like the healthcare consultancy above will be looking to enhance security and visibility across their dispersed users. Our device client, WARP, helps with this by enabling identity and device posture-aware policy enforcement at the endpoint.</p><p>We have optimized our client to enable diverse deployment approaches, so organizations have the flexibility they need to roll the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> capabilities of Cloudflare for Teams with ease. For example, WARP works across all major operating systems (e.g., Windows, MacOS, Linux, chrome OS, iOS, and Android). And regardless of the deployment mechanism, WARP uses a <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/parameters">common set of parameters</a>, so your admins have a consistent experience.</p><p>To show this streamlined deployment in action, here are some common scenarios on how to deploy our client on Windows with only some minor tweaks through the command line:</p><p>1. If you want to use HTTP filtering rules, Browser Isolation or do anything with device posture, the most important thing is to get your user authenticated to a Teams Organization and send their traffic over WARP:</p>
            <pre><code>Cloudflare_WARP_Release-x64.msi /quiet ORGANIZATION="exampleorg" SERVICE_MODE="warp"</code></pre>
            <p>2. If you don’t care about identity and just want a silent install with the same scenario above, use <a href="https://developers.cloudflare.com/cloudflare-one/identity/service-auth/service-tokens">service tokens</a> and disable the initial client UI:</p>
            <pre><code>Cloudflare_WARP_Release-x64.msi /quiet ORGANIZATION="exampleorg" SERVICE_MODE="warp” AUTH_CLIENT_ID=”” AUTH_CLIENT_SECRET=”” ONBOARDING=”false” </code></pre>
            <p>3. Do your employees sometimes travel to countries or locations where encrypting traffic in a tunnel isn’t allowed? You can let them turn off WARP while still being subject to your company’s DNS rules:</p>
            <pre><code>Cloudflare_WARP_Release-x64.msi /quiet ORGANIZATION="exampleorg" SERVICE_MODE="warp” MODE_SWITCH=”true”</code></pre>
            
    <div>
      <h3>Our Partnerships</h3>
      <a href="#our-partnerships">
        
      </a>
    </div>
    <p>Cloudflare recognizes that many organizations rely on MDM solutions to deploy software like our client, and when they do deploy, they deserve a process that makes life simpler. To that end, we are partnering with leading MDM organizations that you already rely on to ensure our software is compatible and has purpose-built documentation to protect your users.</p><blockquote><p>“The close collaboration and deep integration between Cloudflare and Microsoft helps strengthen the security posture of our joint customers and ensure people stay productive as Zero Trust remains top of mind for every organizational leader. ”<b><i>–</i></b> <b>Ann Johnson, Corporate Vice President of Security, Compliance, Identity, and Management, Business Development at Microsoft.</b></p></blockquote><blockquote><p><i>“ZTNA is no longer a choice for enterprises to loom over, it has become a necessity. As a global solution for enterprise endpoint management, Hexnode sees this partnership with Cloudflare as a great step towards the future. “</i><b><i>– Sahad M, CTO, Hexnode</i></b></p></blockquote><blockquote><p><i>“Zero Trust is a mindset and culture that every organization needs to not only adopt, but accelerate with the various devices employees use to access corporate data and systems. Our partnership with Cloudflare will not only improve the experience of IT teams, but the employee experience in the Everywhere Workplace as well. This partnership is another proof point of Ivanti’s commitment to secure users and manage devices.”</i><b><i>– Nayaki Nayyar, President and Chief Product Officer, Ivanti</i></b></p></blockquote><blockquote><p><i>"The bedrock of a zero trust approach is a combination of securing the identity, the device, and the network. By partnering with Cloudflare, we are creating a best-in-class approach for securing today's modern organization."</i><b><i>– Chase Doelling, Principal Strategist at JumpCloud</i></b></p></blockquote><blockquote><p><i>“Kandji and Cloudflare’s partnership will help IT teams to quickly deploy Cloudflare’s network security solutions across their Apple fleet. Using device management software like Kandji to install, enable, and enforce Cloudflare for Teams will allow IT teams to manage their security posture at any scale.”</i><b><i>– Weldon Dodd, SVP, Product Strategy, Kandji</i></b></p></blockquote>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Click below to get started with deploying Cloudflare for Teams:</p><ul><li><p><a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/intune">Deploy with Microsoft Intune</a></p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/kandji">Deploy with Kandji</a></p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/jumpcloud">Deploy with JumpCloud</a></p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/hexnode">Deploy with Hexnode</a></p></li><li><p>Deploy with Ivanti — Coming soon!</p></li></ul><p>Don’t see the MDM tool you use today or interested in partnering with us to ensure our mutual customers can hit the ground running? Fill out the contact form on our <a href="https://www.cloudflare.com/partners/mdm/">MDM Partnerships page</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1LUTnHqgKhz07bHKfMxHwN</guid>
            <dc:creator>Ravina Singh</dc:creator>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Agent — Seamless Deployment at Scale]]></title>
            <link>https://blog.cloudflare.com/cloudflare-agent-seamless-deployment-at-scale/</link>
            <pubDate>Fri, 10 Dec 2021 13:58:38 GMT</pubDate>
            <description><![CDATA[ Today we are excited to announce our zero trust agent now has feature parity across all major platforms.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ENA8ESd7nbWapQok39RhX/c350a6ac994e8bd99ffed18bf18f35af/image1-51.png" />
            
            </figure><p>A year ago we launched <a href="/warp-for-desktop/">WARP for Desktop</a> to give anyone a fast, private on-ramp to the Internet. For our business customers, IT and security administrators can also use that same agent and enroll the devices in their organization into Cloudflare for Teams. Once enrolled, their team members have an accelerated on-ramp to the Internet where Cloudflare can also provide comprehensive security filtering from network firewall functions all the way to remote browser isolation.</p><p>When we launched last year, we supported the broadest possible deployment mechanisms with a simple set of configuration options to get your organization protected quickly. We focused on helping organizations keep users and data safe with HTTP and DNS filtering from any location. We started with support for Mac, Windows, iOS, and Android.</p><p>Since that launch, thousands of organizations have deployed the agent to secure their team members and endpoints. We’ve heard from customers who are excited to expand their rollout, but need more OS support and great control over the configuration.</p><p>Today we are excited to announce our zero trust agent now has feature parity across all major platforms. Beyond that, you can control new options to determine how traffic is routed and your administrators can orchestrate deployment at scale. With today’s releases, we’re ready to help you fully ditch the legacy VPN and network security tools your IT teams hate.</p>
    <div>
      <h3>Built to scale</h3>
      <a href="#built-to-scale">
        
      </a>
    </div>
    <p>Two of the most important factors in our zero trust agent are reliability across platforms and reliability of the connection. If you have ever shipped software at this scale, you'll know that maintaining a client across all major operating systems is a daunting (and error-prone) task.</p><p>To avoid platform pitfalls, we wrote the core of the agent in Rust, which allows for 95% of the code to be shared across all devices. Internally we refer to this common code as the shared daemon (or service, for Windows folks). A common, Rust-based implementation allows our engineers to spend less time duplicating code across multiple platforms while ensuring most quality improvements hit everyone at the same time.</p><p>On the reliability of connection front, if you’ve had any experience at all with traditional VPNs, you’ll know that they are error prone and slow. Our network foundation is built on our own WireGuard implementation called <a href="/boringtun-userspace-wireguard-rust/">BoringTun</a>. Unlike traditional and slow VPNs, we run over UDP and are optimized for the wide variation of Internet infrastructure users connect over today (ex. on a plane, at the coffee shop, a congested network in the city, etc.). Proved year over year at scale with millions of our consumer devices, BoringTun ensures your traffic is encrypted and ready for whatever policies you decide for it.</p><p>With the power to reliability scale, we now fully support the following operating systems with our agent</p><ul><li><p>Windows 8.1, Windows 10 and Windows 11</p></li><li><p>macOS Mojave, Catalina, Big Sur, Monterey</p></li><li><p>Including M1 support</p></li><li><p>ChromeBooks (Manufactured after 2019) <b>(New)</b></p></li><li><p>Linux CentOS 8, RHEL, Ubuntu, Debian <b>(New)</b></p></li><li><p>iOS</p></li><li><p>Android</p></li></ul>
    <div>
      <h3>Built to meet your deployment model</h3>
      <a href="#built-to-meet-your-deployment-model">
        
      </a>
    </div>
    <p>When our agent was first introduced, the focus was on encrypting all device traffic to the Cloudflare network and allowing an admin to build HTTP and DNS <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering">policies</a> around that traffic. We also know that customers are on a journey to migrate to a Zero Trust model. Sometimes that transformation needs to happen one step at a time.</p><p>We’ve spent that time building features that allow you to not just fully replace your legacy solution, but also run our software alongside those legacy solutions to ensure a smoother migration.</p><ul><li><p><b>Domain-Based Split Tunneling</b> - Sometimes, you don’t need to send all traffic through your security layer. We already support IP-based exclusions, but we now make it easy to create <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/exclude-traffic/split-tunnels#add-a-domain">Split Tunnel rules with domain names</a> (e.g., *.example.com or example.com)  instead of forcing you to look up the IP address CIDR for a particular domain.</p></li><li><p><b>Include-Only Split Tunnels</b> - Our agent was initially built on the premise that all device traffic should be encrypted and sent to our network. This ensured traffic wasn’t being snooped on and allowed admins to maintain visibility. Sometimes, though, you only want to send some traffic to Cloudflare and exclude the rest by default. <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/exclude-traffic"><i>Include-only</i> split tunneling</a> does just that, allowing you to select individual routes you want going to our network. If you need a quick legacy VPN replacement to connect to a <a href="/build-your-own-private-network-on-cloudflare/">Cloudflare Tunnel resource</a> or only want to ensure traffic to your most sensitive infrastructure is subject to HTTP inspection, use <i>include-only</i> split tunnel rules.</p></li><li><p><b>Improved Private Domains</b> - Some organizations start their migration by running Cloudflare’s Zero Trust products alongside an existing third party VPN. In the past, our agent supported this configuration by letting administrators set fall back domain name resolution to send DNS queries for certain use cases through the VPN. However, it was global and lacked control over where the queries were sent. We have now added the ability to <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/exclude-traffic/local-domains">specify which DNS server</a> should respond to private domains, and as discussed <a href="/zero-trust-private-networking-rules/">earlier in the week</a>, can be used with our new Zero Trust networking capabilities.</p></li><li><p><b>Posture-only mode (coming soon)</b> — We’ve <a href="/6-new-ways-to-validate-device-posture/">talked previously</a> about the importance of device posture and our capabilities. In the first quarter of 2022, we’ll ship the ability for our agent to run in posture-only mode. That is our client will not process any DNS requests or send any other traffic to us. This allows you to onboard Cloudflare Access posture policies without turning on HTTP inspection for your users.</p></li></ul>
    <div>
      <h3>Built for seamless configuration</h3>
      <a href="#built-for-seamless-configuration">
        
      </a>
    </div>
    <p>Deploying any agent to tens of thousands of users can become a logistical hurdle. We built the Cloudflare for Teams agent to be seamless to deploy at scale in your team. Today’s announcement gives you more options to rolling out the agent to your entire organization with API and Terraform based controls.</p><p>Automating administrative tasks is the best way to keep them consistent. At Cloudflare, we build our UI on top of a set of RESTful APIs based on HTTPS requests and JSON responses. These same APIs in the case of our device management are then exposed to users via our <a href="https://api.cloudflare.com/">API Documentation</a> and additionally via our <a href="https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs">Terraform provider</a>. Everything exposed in the web version of <a href="https://dash.teams.cloudflare.com/">https://dash.teams.cloudflare.com/</a> is available via one of these interfaces.</p><p>As an example of how you can accomplish automation, we’ll take a look at our domain-based split tunneling. For reference, here’s the <a href="https://api.cloudflare.com/#devices-set-split-tunnel-include-list">API documentation</a> and the <a href="https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/split_tunnel">Terraform equivalent</a>.</p><p>To create a domain-based include rule for example.com:</p>
            <pre><code>curl -X PUT "https://api.cloudflare.com/client/v4/accounts/699d98642c564d2e855e9661899b7252/devices/policy/include" \
     -H "X-Auth-Email: user@example.com" \
     -H "X-Auth-Key: c2547eb745079dac9320b638f5e225cf483cc5cfdda41" \
     -H "Content-Type: application/json" \
     --data '[{"host":"*.example","description":"Include all traffic to example.com in the tunnel"}]'</code></pre>
            <p>That same rule could be created in Terraform with this:</p>
            <pre><code># Including *.example.com in WARP routes
resource "cloudflare_split_tunnel" "example_split_tunnel_include" {
  account_id = "699d98642c564d2e855e9661899b7252"
  mode       = "include"
  tunnels {
    host        = "*.example.com",
    description = "Include all traffic to example.com in the tunnel"
  }
}</code></pre>
            <p>Another common task is to generate a report of enrolled devices. Using the <a href="https://api.cloudflare.com/#devices-list-devices">Device List API</a>, the following example shows how to list all Windows devices registered with your organization:</p>
            <pre><code>curl -X GET "https://api.cloudflare.com/client/v4/accounts/699d98642c564d2e855e9661899b7252/devices?type=windows" \
     --header 'Authorization: Bearer 8M7wS6hCpXVc-DoRnPPY_UCWPgy8aea4Wy6kCe5T' \
     -H "Content-Type: application/json"</code></pre>
            <p>Running that command would return JSON that looks something like this:</p>
            <pre><code>        {
            "created": "2021-12-01T17:14:23.847538Z",
            "device_type": "windows",
            "gateway_device_id": "215f9adc-52ca-11ec-9ece-f240956bdf5f",
            "id": "215f9adc-52ca-11ec-9ece-f240956bdf5f",
            "ip": "150.111.29.1",
            "key": "0mS9vj2gk0KNcXoi50pwfuL49WT0rLGAcX2gVze3ixA=",
            "last_seen": "2021-12-01T17:14:30.110663Z",
            "mac_address": "00:0c:29:6f:11:93",
            "model": "VMware7,1",
            "name": "MYVMWin10",
            "os_version": "10.0.19042",
            "serial_number": "VMware-56",
            "updated": "2021-12-01T17:14:30.110663Z",
            "user": {
                "email": "user@example.com",
                "id": "6a8e079d-8a33-4677-b610-a5e361c0c959"
            },
            "version": "2021.11.278"
        },
        {
            "created": "2021-11-08T23:59:37.621164Z",
            "device_type": "windows",
            "gateway_device_id": "ee02da10-40ef-11ec-bb68-6a56f426bb46",
            "id": "ee02da10-40ef-11ec-bb68-6a56f426bb46",
            "ip": "98.247.211.1",
            "key": "DhUI8nqeVrXL1JFhYbeCFmkeu/XEkkEjVmcZ8UraTDI=",
            "last_seen": "2021-11-08T23:59:37.621164Z",
            "model": "Latitude 7400",
            "name": "CloudBox",
            "os_version": "10.0.19043",
            "serial_number": "7CHR3Z2",
            "updated": "2021-11-23T20:03:12.046067Z",
            "user": {
                "email": "user2@example.com",
                "id": "39663a0d-9f7c-4a24-ae7f-f869a8cf07f1"
            },
            "version": "2021.11.34"
        },</code></pre>
            
    <div>
      <h3>Built for anyone to administer</h3>
      <a href="#built-for-anyone-to-administer">
        
      </a>
    </div>
    <p>As part of today’s releases, we also announced <a href="/mdm-partnerships/">partnerships with MDM providers</a> as a mechanism you can use to deploy software with your users. We also know that some organizations do not yet have an MDM or have administrators managing the deployment who prefer a visual user interface.</p><p>In the next few weeks we’ll be turning on, in beta, the ability to manage aspects of client behavior directly from the dashboard. This will allow you to immediately make changes to the client configuration without having to push a new version of the client.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6x9bhs9l9DzZL405QXNBTk/9b73e47d1c4dd535f929bb0f57982fe3/image3-24.png" />
            
            </figure>
    <div>
      <h3>What's coming next</h3>
      <a href="#whats-coming-next">
        
      </a>
    </div>
    <p>Next year is an exciting time for the client when we are really going to double down on the supportability and flexibility of clients once deployed. Some of the features that we are most excited to deliver are:</p><ul><li><p><b>Device settings by User/Group</b> where you will be able to specify client settings (e.g. who is allowed to update, split tunnel rules, etc.) to different users</p></li><li><p><b>Posture-only mode</b> allowing you to onboard additional Cloudflare Access posture controls if you aren’t yet ready for Cloudflare Gateway</p></li><li><p><b>Additional Linux distro support</b> so everyone in your organization can be protected</p></li><li><p><b>Telemetry and Analytics</b> about how devices in your organization are performing as it relates to our client and traffic flowing to Cloudflare’s network</p></li></ul>
    <div>
      <h3>Get Connected Now</h3>
      <a href="#get-connected-now">
        
      </a>
    </div>
    <p>You can find downloads for all our clients listed below:</p>
<table>
<thead>
  <tr>
    <th>Windows</th>
    <th><a href="https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows/distribution_groups/beta">Download Beta</a></th>
    <th><a href="https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release">Download Release</a></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>macOS</td>
    <td><a href="https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-macos/distribution_groups/beta">Download Beta</a></td>
    <td><a href="https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-macos-1/distribution_groups/release">Download Release</a></td>
  </tr>
  <tr>
    <td>Linux</td>
    <td><a href="https://pkg.cloudflareclient.com/install">Setup Repository</a></td>
    <td><a href="https://pkg.cloudflareclient.com/packages/cloudflare-warp">Download Packages</a></td>
  </tr>
  <tr>
    <td>iOS</td>
    <td></td>
    <td><a href="https://apps.apple.com/us/app/1-1-1-1-faster-internet/id1423538627">Download Release</a></td>
  </tr>
  <tr>
    <td>Android/Chrome</td>
    <td></td>
    <td><a href="https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone">Download Release</a></td>
  </tr>
</tbody>
</table> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <guid isPermaLink="false">4frdr349rw7MOLH1oD8KNr</guid>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
        <item>
            <title><![CDATA[6 New Ways to Validate Device Posture]]></title>
            <link>https://blog.cloudflare.com/6-new-ways-to-validate-device-posture/</link>
            <pubDate>Tue, 17 Aug 2021 12:59:34 GMT</pubDate>
            <description><![CDATA[ Cloudflare for Teams adds additional posture capabilities to better protect Access backed applications ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ZA158O8L7tj3GYRMM1II8/6285bf55eff2eb067d3c07a332bf8d7b/image1-25.png" />
            
            </figure><p>Cloudflare for Teams gives your organization the ability to build rules that determine who can reach specified resources. When we first <a href="/cloudflare-access-now-teams-of-any-size-can-turn-off-their-vpn/">launched</a>, those rules primarily relied on identity. This helped our customers replace their private networks with a model that evaluated every request for <i>who</i> was connecting, but this lacked consideration for <i>how</i> they were connecting.</p><p>In March, we began to change that. We <a href="/endpoint-partnerships/">announced new integrations</a> that give you the ability to create rules that consider the device as well. Starting today, we’re excited to share that you can now build additional rules that consider <i>several different factors about the device,</i> like its OS, patch status, and domain join or disk encryption status. This has become increasingly important over the last year as more and more people began connecting from home. Powered by the Cloudflare WARP agent, your team now has control over more health factors about the devices that connect to your applications.</p>
    <div>
      <h3>Zero Trust is more than just identity</h3>
      <a href="#zero-trust-is-more-than-just-identity">
        
      </a>
    </div>
    <p>With Cloudflare for Teams, administrators can replace their Virtual Private Networks (VPNs), where users on the network were trusted, with an alternative that does not trust any connection by default—also known as a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> model.</p><p>Customers start by connecting the resources they previously hosted on a private network to Cloudflare’s network using <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/create-tunnel">Cloudflare Tunnel</a>. Cloudflare Tunnel uses a lightweight connector that creates an outbound-only connection to Cloudflare’s edge, removing the need to poke holes in your existing firewall.</p><p>Once connected, administrators can build rules that apply to each and every resource and application, or even a part of an application. Cloudflare’s Zero Trust network evaluates every request and connection against the rules that an administrator created before the user is ever allowed to reach that resource.</p><p>For example, an administrator can create a rule that limits who can reach an internal reporting tool to users in a specific Okta group, connecting from an approved country, and only when they log in with a hardkey as their second factor. Cloudflare’s global network enforces those rules close to the user, in over 200 cities around the world, to make a comprehensive rule like the outlined above feel seamless to the end-user.</p><p>Today’s launch adds new types of signals your team can use to define these rules. By definition, a Zero Trust model considers every request or connection to be “untrusted.” Only the rules that you create determine what is considered trusted and allowed. Now, we’re excited to let users take this a step further and create rules that not only focus on trusting the user, but also the security posture of the device they are connecting from.</p>
    <div>
      <h3>More (and different) factors are better</h3>
      <a href="#more-and-different-factors-are-better">
        
      </a>
    </div>
    <p>Building rules based on device posture covers a blind spot for your applications and data. If I’m allowed to reach a particular resource, without any consideration for the device I’m using, then I could log in with my corporate credentials from a personal device running an unpatched or vulnerable version of an operating system. I might do that because it is convenient, but I am creating a much bigger problem for my team if I then download data that could be compromised because of that device.</p><p>That posture can also change based on the destination. For example, maybe you are comfortable if a team member uses any device to review a new splash page for your marketing campaign. However, if a user is connecting to an administrative tool that manages customer accounts, you want to make sure that device complies with your security policies for customer data that include factors like disk encryption status. With Cloudflare for Teams, you can apply rules that contain multiple and different factors with that level of per-resource granularity.</p><p>Today, we are thrilled to announce six additional posture types on top of the ones you can already set:</p><ol><li><p><a href="/endpoint-partnerships/">Endpoint Protection Partners</a> — Verify that your users are running one of our Endpoint Protection Platform providers (Carbon Black, CrowdStrike, SentinelOne, Tanium)</p></li><li><p><a href="/zero-trust-with-managed-devices/">Serial Number</a> — Allow devices only from your known inventory pool</p></li><li><p><a href="/integrating-cloudflare-gateway-and-access/">Cloudflare WARP’s proxy</a> — Determine if your users are connected via our encrypted WARP tunnel (Free, Paid or any Teams account)</p></li><li><p><a href="/integrating-cloudflare-gateway-and-access/">Cloudflare’s secure web gateway</a> — Determine if your users are connecting from a device managed by your HTTP FIltering policies</p></li><li><p><b>(NEW) Application Check</b> — Verify any program of your choice is running on the device</p></li><li><p><b>(NEW) File Check</b> — Ensure a particular file is present on the device (such as an updated signature, OS patch, etc.)</p></li><li><p><b>(NEW) Disk Encryption</b> — Ensure all physical disks on the device are encrypted</p></li><li><p><b>(NEW) OS Version</b> — Confirm users have upgraded to a specific operating system version</p></li><li><p><b>(NEW) Firewall</b> — Check that a firewall is configured on the device</p></li><li><p><b>(NEW) Domain Joined</b> — Verify that your Windows devices must be joined to the corporate directory</p></li></ol>
    <div>
      <h3>Device rules should be as simple as identity rules</h3>
      <a href="#device-rules-should-be-as-simple-as-identity-rules">
        
      </a>
    </div>
    <p>Cloudflare for Teams device rules can be configured in the same place that you control identity-based rules. Let’s use the Disk Encryption posture check as an example. You may want to create a rule that enforces the Disk Encryption check when your users need to download and store files on their devices locally.</p><p>To build that rule, first visit the <a href="https://dash.teams.cloudflare.com/team/devices">Cloudflare for Teams dashboard</a> and navigate to the Devices section of the “My Team” page. Then, choose “Disk Encryption” as a new attribute to add.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ghCYtgEEGFtfErqQjJddQ/fd7811c310564fda87a64a572c51b386/image5-14.png" />
            
            </figure><p>You can enter a descriptive name for this attribute. For example, this rule should require Windows disk encryption, while others might require encryption on other platforms.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7njkspD0ailjBgC2tAcowC/f91ecfc3d22be90ee4046833df16da7c/image2-17.png" />
            
            </figure><p>To save time, you can also create reusable rules, called <a href="https://developers.cloudflare.com/cloudflare-one/identity/users/groups#create-a-group">Groups</a>, to include multiple types of device posture check for reference in new policies later on.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4A0ZbehejwlwjgZg0nOz4W/74b65a04a30e3b78a32f7aa3ab791c5b/image3-16.png" />
            
            </figure><p>Now that you’ve created your group, you can create a Zero Trust Require rule to apply your Disk Encryption checks. To do that, navigate to Access &gt; Applications and create a new application. If you already have your application in place, simply edit your application to add a new rule. In the Assign a group section you will see the group you just created—select it and choose a Require rule type. And finally, save the rule to begin enforcing granular, zero trust device posture checks on every request in your environment.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Wa9IEM5FiiM6iikUs4TPo/3df247639c5172c622a84528daa60386/image4-11.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Get started with exploring all <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices">device posture attributes</a> in our developer docs. Note that not all posture types are currently available on operating systems and some operating systems don’t support them.</p><p>Is there a posture type we’re missing that you’d love to have? We’d love to hear from you in the <a href="https://community.cloudflare.com/">Community</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[WARP]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4oNJWVakW42XRVAs4sMpl9</guid>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing WARP for Linux and Proxy Mode]]></title>
            <link>https://blog.cloudflare.com/announcing-warp-for-linux-and-proxy-mode/</link>
            <pubDate>Thu, 17 Jun 2021 13:00:02 GMT</pubDate>
            <description><![CDATA[ Starting today Cloudflare WARP is available for Linux and comes with the ability to run as a local proxy. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Last October we released <a href="/warp-for-desktop/">WARP for Desktop</a>, bringing a safer and faster way to use the Internet to billions of devices for free. At the same time, we gave our enterprise customers the ability to use WARP with Cloudflare for Teams. By routing all an enterprise's traffic from devices anywhere on the planet through WARP, we’ve been able to seamlessly power advanced capabilities such as <a href="https://www.cloudflare.com/teams/gateway/">Secure Web Gateway</a> and <a href="/browser-isolation-for-teams-of-all-sizes/">Browser Isolation</a> and, in the future, our <a href="/data-loss-prevention/">Data Loss Prevention</a> platforms.</p><p>Today, we are excited to announce Cloudflare WARP for Linux and, across all desktop platforms, the ability to use WARP with single applications instead of your entire device.</p>
    <div>
      <h2>What is WARP?</h2>
      <a href="#what-is-warp">
        
      </a>
    </div>
    <p>WARP was built on the philosophy that even people who don’t know what <a href="https://www.cloudflare.com/learning/access-management/what-is-a-vpn/">“VPN” stands for</a> should be able to still easily get the protection a VPN offers. It was also built for those of us who are unfortunately all too familiar with traditional corporate VPNs, and need an innovative, seamless solution to meet the challenges of an always-connected world.</p><p>Enter our own WireGuard implementation called <a href="/boringtun-userspace-wireguard-rust/">BoringTun</a>.</p><p>The WARP application uses BoringTun to encrypt traffic from your device and send it directly to Cloudflare’s edge, ensuring that no one in between is snooping on what you're doing. If the site you are visiting is already a Cloudflare customer, the content is immediately sent down to your device. With WARP+, we use Argo Smart Routing to use the shortest path through our global network of data centers to reach whomever you are connecting to.</p><p>Combined with the power of <a href="https://one.one.one.one/">1.1.1.1</a> (the <a href="https://www.dnsperf.com/#!dns-resolvers">world's fastest</a> public DNS resolver), WARP keeps your traffic secure, private and fast. Since nearly everything you do on the Internet starts with a DNS request, choosing the fastest DNS server across all your devices will accelerate almost everything you do online.</p>
    <div>
      <h2>Bringing WARP to Linux</h2>
      <a href="#bringing-warp-to-linux">
        
      </a>
    </div>
    <p>When we built out the foundations of our desktop client last year, we knew a Linux client was something we would deliver. If you have ever shipped software at this scale, you'll know that maintaining a client across all major operating systems is a daunting (and error-prone) task. To avoid these pitfalls, we wrote the core of the product in Rust, which allows for 95% of the code to be shared across platforms.</p><p>Internally we refer to this common code as the shared Daemon (or Service, for Windows folks), and it allows our engineers to spend less time duplicating code across multiple platforms while ensuring most quality improvements hit everyone at the same time. The really cool thing about this is that millions of existing WARP users have already helped us solidify the code base for Linux!</p><p>The other 5% of code is split into two main buckets: UI and quirks of the operating system. For now, we are forgoing a UI on Linux and instead working to support three distributions:</p><ul><li><p>Ubuntu</p></li><li><p>Red Hat Enterprise Linux</p></li><li><p>CentOS</p></li></ul><p>We want to add more distribution support in the future, so if your favorite distro isn't there, don’t despair — the client may in fact already work with other Debian and Redhat based distributions, so please give it a try. If we missed your favorite distribution, we’d love to hear from you in our <a href="https://community.cloudflare.com/">Community Forums</a>.</p><p>So without a UI — what's the mechanism for controlling WARP? The command line, of course! Keen observers may have noticed an executable that already ships with each client called the warp-cli. This platform-agnostic interface is already the preferred mechanism of interacting with the daemon by some of our engineers and is the main way you’ll interact with WARP on Linux.</p>
    <div>
      <h2>Installing Cloudflare WARP for Linux</h2>
      <a href="#installing-cloudflare-warp-for-linux">
        
      </a>
    </div>
    <p>Seasoned Linux developers can jump straight to <a href="https://pkg.cloudflareclient.com/install">https://pkg.cloudflareclient.com/install</a>. After linking our repository, get started with either <code>sudo apt install cloudflare-warp</code> or <code>sudo yum install cloudflare-warp</code>, depending on your distribution.</p><p>For more detailed installation instructions head over to our <a href="https://developers.cloudflare.com/warp-client/setting-up/linux/">WARP Client documentation</a>.</p>
    <div>
      <h2>Using the CLI</h2>
      <a href="#using-the-cli">
        
      </a>
    </div>
    <p>Once you’ve installed WARP, you can begin using the CLI with a single command:</p>
            <pre><code>warp-cli --help</code></pre>
            <p>The CLI will display the output below.</p>
            <pre><code>~$ warp-cli --help
WARP 0.2.0
Cloudflare
CLI to the WARP service daemon
 
USAGE:
    warp-cli [FLAGS] [SUBCOMMAND]
 
FLAGS:
        --accept-tos    Accept the Terms of Service agreement
    -h, --help          Prints help information
    -l                  Stay connected to the daemon and listen for status changes and DNS logs (if enabled)
    -V, --version       Prints version information
 
SUBCOMMANDS:
    register                    Registers with the WARP API, will replace any existing registration (must be run
                                before first connection)
    teams-enroll                Enroll with Cloudflare for Teams
    delete                      Deletes current registration
    rotate-keys                 Generates a new key-pair, keeping the current registration
    status                      Asks the daemon to send the current status
    warp-stats                  Retrieves the stats for the current WARP connection
    settings                    Retrieves the current application settings
    connect                     Asks the daemon to start a connection, connection progress should be monitored with
                                -l
    disconnect                  Asks the daemon to stop a connection
    enable-always-on            Enables always on mode for the daemon (i.e. reconnect automatically whenever
                                possible)
    disable-always-on           Disables always on mode
    disable-wifi                Pauses service on WiFi networks
    enable-wifi                 Re-enables service on WiFi networks
    disable-ethernet            Pauses service on ethernet networks
    enable-ethernet             Re-enables service on ethernet networks
    add-trusted-ssid            Adds a trusted WiFi network, for which the daemon will be disabled
    del-trusted-ssid            Removes a trusted WiFi network
    allow-private-ips           Exclude private IP ranges from tunnel
    enable-dns-log              Enables DNS logging, use with the -l option
    disable-dns-log             Disables DNS logging
    account                     Retrieves the account associated with the current registration
    devices                     Retrieves the list of devices associated with the current registration
    network                     Retrieves the current network information as collected by the daemon
    set-mode                    
    set-families-mode           
    set-license                 Attaches the current registration to a different account using a license key
    set-gateway                 Forces the app to use the specified Gateway ID for DNS queries
    clear-gateway               Clear the Gateway ID
    set-custom-endpoint         Forces the client to connect to the specified IP:PORT endpoint
    clear-custom-endpoint       Remove the custom endpoint setting
    add-excluded-route          Adds an excluded IP
    remove-excluded-route       Removes an excluded IP
    get-excluded-routes         Get the list of excluded routes
    add-fallback-domain         Adds a fallback domain
    remove-fallback-domain      Removes a fallback domain
    get-fallback-domains        Get the list of fallback domains
    restore-fallback-domains    Restore the fallback domains
    get-device-posture          Get the current device posture
    override                    Temporarily override MDM policies that require the client to stay enabled
    set-proxy-port              Set the listening port for WARP proxy (127.0.0.1:{port})
    help                        Prints this message or the help of the given subcommand(s)</code></pre>
            <p>You can begin connecting to Cloudflare’s network with just two commands. The first command, <code>register</code>, will prompt you to authenticate. The second command, <code>connect</code>, will enable the client, creating a WireGuard tunnel from your device to Cloudflare’s network.</p>
            <pre><code>~$ warp-cli register
Success
~$ warp-cli connect
Success</code></pre>
            <p>Once you’ve connected the client, the best way to verify it is working is to run our trace command:</p>
            <pre><code>~$ curl https://www.cloudflare.com/cdn-cgi/trace/</code></pre>
            <p>And look for the following output:</p>
            <pre><code>warp=on</code></pre>
            <p>Want to switch from encrypting all traffic in WARP to just using our <a href="https://developers.cloudflare.com/1.1.1.1/">1.1.1.1 DNS resolver</a>? Use the <code>warp-cli set-mode</code> command:</p>
            <pre><code>~$ warp-cli help set-mode
warp-cli-set-mode 
 
USAGE:
    warp-cli set-mode [mode]
 
FLAGS:
    -h, --help       Prints help information
    -V, --version    Prints version information
 
ARGS:
    &lt;mode&gt;     [possible values: warp, doh, warp+doh, dot, warp+dot, proxy]
~$ warp-cli set-mode doh
Success</code></pre>
            <p>Protecting yourself against <a href="/introducing-1-1-1-1-for-families/">malware with 1.1.1.1 for Families</a> is just as easy, and it can be used with either WARP enabled or in straight DNS mode:</p>
            <pre><code>~$ warp-cli set-families-mode --help
warp-cli-set-families-mode 
 
USAGE:
    warp-cli set-families-mode [mode]
 
FLAGS:
    -h, --help       Prints help information
    -V, --version    Prints version information
 
ARGS:
    &lt;mode&gt;     [possible values: off, malware, full]
~$ warp-cli set-families-mode malware
Success</code></pre>
            
    <div>
      <h2>A note on Cloudflare for Teams support</h2>
      <a href="#a-note-on-cloudflare-for-teams-support">
        
      </a>
    </div>
    <p>Cloudflare for Teams support is on the way, and just like our other clients, it will ship in the same package. Stay tuned for an in-app update or reach out to your Account Executive to be notified when a beta is available.</p>
    <div>
      <h2>We need feedback</h2>
      <a href="#we-need-feedback">
        
      </a>
    </div>
    <p>If you encounter an error, send us feedback with the <code>sudo warp-diag feedback</code> command:</p>
            <pre><code>~$ sudo warp-diag feedback</code></pre>
            <p>For all other functionality check out <code>warp-cli --help</code> or see <a href="https://developers.cloudflare.com/warp-client/">our documentation here</a>.</p>
    <div>
      <h2>WARP as a Local Proxy</h2>
      <a href="#warp-as-a-local-proxy">
        
      </a>
    </div>
    <p>When WARP launched in 2019, one of our primary goals was ease of use. You turn WARP on and all traffic from your device is encrypted to our edge. Through all releases of the client, we’ve kept that as a focus. One big switch to turn on and you are protected.</p><p>However, as we’ve grown, so have the requirements for our client. Earlier this year we released <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/split-tunnel">split tunnel and local domain fallback</a> as a way for our Cloudflare for Teams customers to exclude certain routes from WARP. Our consumer customers may have noticed this stealthily added in the last release as well. We’ve heard from customers who want to deploy WARP in one additional mode: Single Applications. Today we are also announcing the ability for our customers to run WARP in a local proxy mode in all desktop clients.</p><p>When WARP is configured as a local proxy, only the applications that you configure to use the proxy (HTTPS or SOCKS5) will have their traffic sent through WARP. This allows you to pick and choose which traffic is encrypted (for instance, your web browser or a specific app), and everything else will be left open over the Internet.</p><p>Because this feature restricts WARP to just applications configured to use the local proxy, leaving all other traffic unencrypted over the Internet by default, we’ve hidden it in the advanced menu. To turn it on:</p><p>1. Navigate to Preferences -&gt; Advanced and click the Configure Proxy button.</p><p>2. On the dialog that opens, check the box and configure the port you want to listen on.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Tg23RkaEOvIXBW6vKnDOM/e6f9188adbe257c3336b0227a75a5bb2/image3-4.png" />
            
            </figure><p>3. This will enable a new mode you can select from:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Q2xWhwHnHQfsRcMn87FTq/2cfd8c4979a1fa06a8e9794db61ba272/image1-5.png" />
            
            </figure><p>To configure your application to use the proxy, you want to specify 127.0.0.1 for the address and the value you specified for a port (40000 by default). For example, if you are using Firefox, the configuration would look like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3xw3CtEQ9X1yuTPZdIm3zV/8501d1c87242ba52d99dc00411708309/image2-3.png" />
            
            </figure>
    <div>
      <h2>Download today</h2>
      <a href="#download-today">
        
      </a>
    </div>
    <p>You can start using these capabilities right now by visiting <a href="https://one.one.one.one">https://one.one.one.one</a>. We’re super excited to hear your feedback.</p> ]]></content:encoded>
            <category><![CDATA[WARP]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[1.1.1.1]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">5NhyXzaQGmttEzitXtVo4E</guid>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
        <item>
            <title><![CDATA[New device security partnerships for Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/endpoint-partnerships/</link>
            <pubDate>Tue, 23 Mar 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare launches new integrations with CrowdStrike, SentinelOne, and VMware Carbon Black. Cloudflare for Teams customers can now restrict access to their applications based on security signals from their devices. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Last October, we announced <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our comprehensive, cloud-based <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service solution</a> that is secure, fast, reliable, and defines the future of the corporate network. Cloudflare One consists of two components: network services like Magic WAN and Magic Transit that protect data centers and branch offices and connect them to the Internet, and Cloudflare for Teams, which <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">secures corporate applications, devices, and employees</a> working on the Internet. Today, we are excited to announce new integrations with VMware Carbon Black, CrowdStrike, and SentinelOne to pair with our existing Tanium integration. Cloudflare for Teams customers can now use these integrations to restrict access to their applications based on security signals from their devices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4SlTwAg69QKGY84cBzR9OT/a7814b2aff9f7364504b923ebe77ed46/image5-26.png" />
            
            </figure>
    <div>
      <h2>Protecting applications with Cloudflare for Teams</h2>
      <a href="#protecting-applications-with-cloudflare-for-teams">
        
      </a>
    </div>
    <p>When the COVID-19 pandemic unfolded, many of us started to work remotely. Employees left the office, but the network and applications they worked with didn’t. VPNs quickly began folding under heavy load from backhauling traffic and reconfiguring firewalls became an overnight IT nightmare.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4TJd2oB51Lvg00EIYK0X5E/3bc4aed2f4c1f913bb8498a4af847a53/image3-24.png" />
            
            </figure><p>This has accelerated many organizations' timelines for adopting a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> based network architecture. Zero Trust means to mistrust every connection request to a corporate resource, and instead intercept and only grant access if criteria defined by an administrator are met. <a href="https://teams.cloudflare.com/">Cloudflare for Teams</a> does exactly that. It replaces legacy VPNs with our global network running in 200+ locations, and validates a user's identity via their identity provider and cross-checks for permissions to the requested application. Only if the user successfully verifies their identity and has sufficient access privileges are they granted access. The result: better performance due to our global network, and a security model that relies on verification rather than trust.</p>
    <div>
      <h2>BYOD—Bring Your Own Destruction</h2>
      <a href="#byod-bring-your-own-destruction">
        
      </a>
    </div>
    <p>Remote work threw companies another curveball. As the lines between work and leisure time blurred, users started to work from a variety of devices, including their personal ones. Personal or unsecured devices are often more exposed to threats like malware, simply because they’re not protected by anti-malware or more sophisticated endpoint security providers. Using an unsecured device to access company email, deploy code to a production system, or access applications containing sensitive information is risky and could result in violation of a company’s compliance rules, or worse, compromise a system if an infected device spreads malware.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rMLLC09QMolFvJou96Y8F/d4582fbc41efcdcb859fb5b5cdd8258e/image4-25.png" />
            
            </figure>
    <div>
      <h2>New policies based on device security</h2>
      <a href="#new-policies-based-on-device-security">
        
      </a>
    </div>
    <p>Starting today, Cloudflare for Teams customers can configure new policies that rely on device security signals provided by their endpoint security vendor to allow or deny connections to their applications. The terms endpoint security, device security, device health, or device posture are often used interchangeably, but all mean the same — they are a collection of signals that help decide whether a particular device, say a laptop or a mobile phone, is secure or not. This includes signals and attributes like version of the operating system, date of the last patch, disk encryption status, inventory of installed applications, status of anti-malware or endpoint security provider, and date of the last malware scan.</p><p>Understanding these signals, especially across all company issued devices — also known as the device fleet — is important and allows security and IT teams to find devices that are outdated and require patching, or when a malware infection has occurred and needs remediation. Using Cloudflare for Teams, these signals can also be used to make network access decisions. For example, to restrict non-company issued devices from accessing sensitive applications, an access policy can be created that compares the device’s serial number with the company’s device inventory. Only if the serial number matches is the user granted access.</p><p>Our WARP client already checks for some of these attributes, like serial number and device location, and ensures traffic is encrypted with WARP. With our new integrations, customers get an additional layer of security by requiring that a device runs, for example, a CrowdStrike or VMware Carbon Black agent before granting the device access to a resource protected by Cloudflare. By combining signals from WARP and our partners’ endpoint security platforms, we can ensure that a device is both company sanctioned and free of malware, and therefore considered a secured device.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39EkDER3TfWZHOlXczGHpo/f3f03d60df2a763289c5686843919cd2/image6-13.png" />
            
            </figure><blockquote><p>In today’s work-from-anywhere business culture, the risk of compromise has substantially increased as employees and their devices are continuously surrounded by a hostile threat environment outside the office walls. Through our integration with Cloudflare, organizations can leverage the power of the CrowdStrike Falcon platform to accurately allow dynamic conditional access to applications, delivering end-to-end Zero Trust protection across endpoints, workloads and applications to stop attacks in real-time.— <b>Patrick McCormack, Senior Vice President, Cloud Engineering, CrowdStrike</b></p></blockquote><blockquote><p>The VMware Carbon Black Cloud consolidates multiple endpoint and workload security offerings into a single, cloud native platform. Leveraging VMware Carbon Black Cloud, Cloudflare can help customers secure and manage devices connecting to their cloud and Zero Trust networks.<b>— Tom Corn, Senior Vice President, Security Business Unit, VMware</b></p></blockquote><blockquote><p>Enterprises have come to terms with the notion of a disintegrating traditional perimeter. The distributed and dynamic perimeter of today requires a fundamentally new approach to security. In partnership with Cloudflare, our AI-powered cybersecurity platform offers modern enterprises a more robust zero trust security solution that spans the devices, the network, and the mission critical applications enterprises rely on.<b>— Chuck Fontana, SVP Business &amp; Corporate Development, SentinelOne</b></p></blockquote><blockquote><p>Zero Trust security architectures started at the network level with segmentation and enforcement, but as corporate resources and data increasingly live on endpoints, a zero trust architecture must take both the endpoint and the network into consideration. Knowing the identity of the endpoint, as well as knowing that it’s up-to-date, hardened against security threats and hasn’t been compromised, is paramount in ensuring secure access to an organization's resources.<b>— Pete Constantine, Chief Product Officer, Tanium</b></p></blockquote>
    <div>
      <h2>How does it work?</h2>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>Our integrations are simple. The first step is to secure your applications with <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps">Cloudflare Access</a>. The integration between Access and your endpoint security provider varies slightly depending on your vendor.</p>
    <div>
      <h3>Tanium</h3>
      <a href="#tanium">
        
      </a>
    </div>
    <p>Tanium does not require any additional software installed on a user’s machine. Simply input your Tanium certificate in the Cloudflare for Teams Dashboard and enable <a href="https://docs.tanium.com/pdf/endpoint_identity/Tanium_Endpoint_Identity_1.0.0_ug.pdf">Endpoint Identity</a> in your Tanium instance. Then, you can add Tanium as a policy check in the Teams Dashboard for any application to ensure that a user’s device is company-sanctioned and free of malware.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5SMSPv1lhmdUMcgPgX8BKq/323a8c50854edd5776f233d205405b84/image--2-.png" />
            
            </figure>
    <div>
      <h3>VMware Carbon Black, CrowdStrike, and SentinelOne</h3>
      <a href="#vmware-carbon-black-crowdstrike-and-sentinelone">
        
      </a>
    </div>
    <p>Unlike Tanium, these vendors require that the WARP client is deployed on a device. Before you configure these providers on the Teams Dashboard, we recommend deploying WARP via an <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment">MDM solution</a> — alternatively, users can download the <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/download-warp">WARP client directly</a>.</p><p>Once the WARP client is deployed for your team, you can configure your endpoint security provider on the Teams Dashboard. To get started, log in to your Teams Dashboard and navigate to My Team→Devices, then click on the new tab “Device posture”. For our partners, we’ve pre-configured values that should work for most installations.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qfqjK5Au2qUe0ddTiYTkc/0a8cd4ecab241d28a399bbe2407fd76b/image1-33.png" />
            
            </figure><p>Now that you have completed configuration, you can build rules based on the provider of your choice and apply them to your applications as you would any other Access policy. Once the rules are in place, WARP will check to see if the endpoint security software is running on the device and communicate the status to Access. Access will then use the status of the device’s endpoint security software to either allow or deny access to the secured application. If the device is running your organization's endpoint security software, access will be granted.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5KSL1Otc0UCyVrqmI7dP0U/1b49e07e5e56d93ca6a6cab5a441481a/image7-5.png" />
            
            </figure><p>These Zero Trust checks can be layered with features like MFA and User Identity to thwart stolen credentials or other malicious access attempts.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>In future releases, we will integrate additional security signals from our newly launched partners — such as <a href="https://www.crowdstrike.com/resources/white-papers/falcon-zero-trust-risk-score/">CrowdStrike’s</a> and <a href="https://www.carbonblack.com/resources/understanding-the-kenna-security-vulnerability-risk-score/">VMware Carbon Black’s</a> risk scores — to provide even more fine-grained control over which devices can get access to protected applications. We will also continue partnering with more vendors to provide flexibility to our customers in using their vendor of choice.</p><p>If you’re using Cloudflare for Teams today and are interested in using our integrations, visit our <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices">developer documentation</a> to learn about how you can enable them. If you want to learn more or have additional questions, please fill out the form on our <a href="https://www.cloudflare.com/endpoint-partners/">Endpoint Security Partnerships</a> page, and we'll get in touch with you shortly.</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Device Security]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">6NRGjctTUJuJU8coSSua6J</guid>
            <dc:creator>Simon Steiner</dc:creator>
            <dc:creator>Kenny Johnson</dc:creator>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing WARP for Desktop and Cloudflare for Teams]]></title>
            <link>https://blog.cloudflare.com/warp-for-desktop/</link>
            <pubDate>Wed, 14 Oct 2020 15:01:00 GMT</pubDate>
            <description><![CDATA[ Starting today Cloudflare WARP is available on Windows, macOS, iOS and Android. Warp clients can be enrolled in Cloudflare for Teams organizations to extend security protection to remote workers. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare launched ten years ago to keep web-facing properties safe from attack and fast for visitors. Cloudflare customers owned Internet properties that they placed on our network. Visitors to those sites and applications enjoyed a faster experience, but that speed was not consistent for accessing Internet properties outside the Cloudflare network.</p><p>Over the last few years, we began building products that could help deliver a faster and safer Internet to everyone, not just visitors to sites on our network. We started with the first step to visiting any website, a <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS query</a>, and released the world’s fastest public DNS resolver, 1.1.1.1. Any Internet user could improve the speed to connect to any website simply by changing their resolver.</p><p>While making the Internet faster for users, we also focused on making it more private. We built 1.1.1.1 to accelerate the last mile of connections, from user to our edge or other destinations on the Internet. Unlike other providers, we did not build it to sell ads.</p><p>Last year we went one step further to make the entire connection from a device both faster and safer when we launched Cloudflare WARP. With the push of a button, users could connect their mobile device to the entire Internet using a WireGuard tunnel through a Cloudflare data center near to them. Traffic to sites behind Cloudflare became even faster and a user’s experience with the rest of the Internet became more secure and private.</p><p>We brought that experience to desktops in beta earlier this year, and are excited to announce the general availability of Cloudflare WARP for desktop users today. The entire Internet can now be more secure and private regardless of how you connect.</p>
    <div>
      <h3>Bringing the power of WARP to security teams everywhere</h3>
      <a href="#bringing-the-power-of-warp-to-security-teams-everywhere">
        
      </a>
    </div>
    <p>WARP made the Internet faster and more private for individual users everywhere. But as businesses embraced remote work models at scale, security teams struggled to extend the security controls they had enabled in the office to their remote workers. Today, we’re bringing everything our users have come to expect from WARP to security teams. The release also enables new functionality in our <a href="/gateway-swg/">Cloudflare Gateway product</a>.</p><p>Customers can use the Cloudflare WARP application to connect corporate desktops to Cloudflare Gateway for advanced <a href="https://www.cloudflare.com/learning/access-management/what-is-url-filtering/">web filtering</a>. The Gateway features rely on the same performance and security benefits of the underlying WARP technology, now with security filtering available to the connection.</p><p>The result is a simple way for enterprises to protect their users wherever they are without requiring the backhaul of network traffic to a centralized security boundary. Instead, organizations can configure the WARP client application to securely and privately send remote users’ traffic through a Cloudflare data center near them. Gateway administrators apply policies to outbound Internet traffic proxied through the client, allowing organizations to protect users from threats on the Internet, and stop corporate data from leaving their organization.</p>
    <div>
      <h3>Privacy, Security and Speed for Everyone</h3>
      <a href="#privacy-security-and-speed-for-everyone">
        
      </a>
    </div>
    <p>WARP was built on the philosophy that even people who don’t know what “VPN” <a href="https://www.cloudflare.com/learning/access-management/what-is-a-vpn/">stands for</a> should be able to still easily get the protection a VPN offers. For those of us unfortunately very familiar with traditional corporate VPNs, something better was needed. Enter our own WireGuard implementation called <a href="/boringtun-userspace-wireguard-rust/">BoringTun</a>.</p><p>The WARP application uses BoringTun to encrypt all the traffic from your device and send it directly to Cloudflare’s edge, ensuring that no one in between is snooping on what you're doing. If the site you are visiting is already a Cloudflare customer, the content is immediately sent down to your device. With WARP+ we use Argo Smart Routing to devise the shortest path through our global network of data centers to reach whomever you are talking to.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OB8augc9tb7AuAD8XGPiH/b50c7c8145482aa46d975e708882f95e/image4-17.png" />
            
            </figure><p>Combined with the power of <a href="http://one.one.one.one">1.1.1.1</a> (the <a href="https://www.dnsperf.com/#!dns-resolvers">world's fastest</a> public DNS resolver), WARP keeps your traffic secure, private and fast. Since nearly everything you do on the Internet starts with a DNS request, choosing the fastest DNS server across all your devices will accelerate almost everything you do online. Speed isn’t everything though, and while the connection between your application and a website may be encrypted, DNS lookups for that website were not. This allowed anyone, even your Internet Service Provider, to potentially snoop (and sell) on where you are going on the Internet.</p><p>Cloudflare will never snoop or sell your personal data. And if you use DNS-over-HTTPS or DNS-over-TLS to our 1.1.1.1 resolver, your DNS request will be sent over a secure channel. This means that if you use the 1.1.1.1 resolver then in addition to our privacy guarantees an eavesdropper can’t see your DNS requests. Don’t take our word for it though, earlier this year we published the results of a <a href="/announcing-the-results-of-the-1-1-1-1-public-dns-resolver-privacy-examination/">third-party privacy examination</a>, something we’ll keep doing and wish others would do as well.</p><p>For Gateway customers, we are committed to privacy and trust and will never sell your personal data to third parties. While your administrator will have the ability to audit your organization's traffic, create rules around how long data is retained, or create specific policies about where they can go, Cloudflare will never sell your personal data or use your personal data to retarget you with advertisements. Privacy and control of your organization's data is in your hands.</p>
    <div>
      <h3>Now integrated with Cloudflare Gateway</h3>
      <a href="#now-integrated-with-cloudflare-gateway">
        
      </a>
    </div>
    <p>Traditionally, companies have used VPN solutions to gate access to corporate resources and keep devices secure with their filtering rules. These connections quickly became a point of failure (and intrusion vector) as organizations needed to manage and scale up VPN servers as traffic through their on premise servers grew. End users didn't like it either. VPN servers were usually overwhelmed at peak times, the client was bulky and they were rarely made with performance in mind. And once a bad actor got in, they had access to everything.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7FFPXwzDszlejtKy5SNEgd/8c39b2aa0b854ce3cae6b2946f0b4616/image3-21.png" />
            
            </figure><p>Traditional VPN architecture‌‌</p><p>In <a href="/introducing-cloudflare-for-teams/">January 2020</a>, we launched Cloudflare for Teams as a replacement to this model. Cloudflare for Teams is built around two core products. <a href="https://www.cloudflare.com/teams/access/">Cloudflare Access</a> is a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust solution</a> allowing organizations to connect internal (and now, <a href="/cloudflare-access-for-saas/">SaaS</a>) applications to Cloudflare’s edge and build security rules to enforce safe access to them. No longer were VPNs a single entry point to your organization; users could work from anywhere and still get access. <a href="https://www.cloudflare.com/teams/gateway/">Cloudflare Gateway</a>’s first features focused on protecting users from threats on the Internet with a DNS resolver and policy engine built for enterprises.</p><p>The strength and power of WARP clients, used today by millions of users around the world, will enable incredible new use cases for security teams:</p><ul><li><p><b>Encrypt all user traffic</b> - Regardless of your users’ location, all traffic from their device is encrypted with WARP and sent privately to the nearest WARP endpoint. This keeps your users and your organizations protected from whomever may be snooping. If you still used a traditional VPN on top of Access to encrypt user traffic, that is no longer needed.</p></li><li><p><b>WARP+</b> - Cloudflare offers a premium WARP+ service for customers who want additional speed benefits. That now comes packaged into Teams deployments. Any Teams customer who deploys the Teams client applications will automatically receive the premium speed benefits of WARP+.</p></li><li><p><b>Gateway for remote workers</b> - Until today, Gateway required that you keep track of all your users’ IP addresses and build policies per location. This made it difficult to enforce policy or provide malware protection when a user took their device to a new location. With the client installed, these policies can be enforced anywhere.</p></li><li><p><b>L7 Firewall and user based policies</b> - Today's announcement of <a href="/gateway-swg/">Cloudflare Gateway SWG and Secure DNS</a> allows your organization to enforce device authentication to your Teams account, enabling you to build user-specific policies and force all traffic through the firewall.</p></li><li><p><b>Device and User auditing</b> - Along with user and device policies, administrators will also be able to audit specific user and device traffic. Used in conjunction with logpush, this will allow your organization to do detailed level tracing in case of a breach or audit.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1n6ktVdf9yYbKrxQhWOIpN/063ce1bb8bd28de3518e02a3e0877ddb/image5-10.png" />
            
            </figure>
    <div>
      <h3>Enroll your organization to use the WARP client with Cloudflare for Teams</h3>
      <a href="#enroll-your-organization-to-use-the-warp-client-with-cloudflare-for-teams">
        
      </a>
    </div>
    <p>We know how hard it can be to deploy another piece of software in your organization, so we’ve worked hard to make deployment easy. To get started, just navigate to our <a href="https://dash.cloudflare.com/sign-up/teams">sign-up page</a> and create an account. If you already have an active account, you can bypass this step and head straight to the <a href="https://dash.teams.cloudflare.com/onboarding">Cloudflare for Teams dashboard</a> where you’ll be dropped directly into our onboarding flow. After you have signed up and configured your team, <a href="https://developers.cloudflare.com/gateway/getting-started-new/onboarding-gateway/">setup a Gateway policy</a> and then choose one of the three ways to install the clients to enforce that policy from below:</p>
    <div>
      <h4>Self Install‌‌</h4>
      <a href="#self-install">
        
      </a>
    </div>
    <p>If you are a small organization without an IT department, asking your users to download the client themselves and type in the required settings is the fastest way to get going.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NWq76ePHRKAyzUj9pX7uL/4a4361b19b9e013a5270df1045d61acb/image1-35.png" />
            
            </figure><p>Manually join an organization</p>
    <div>
      <h4>Scripted Install‌‌</h4>
      <a href="#scripted-install">
        
      </a>
    </div>
    <p>Our desktop installers support the ability to quickly script the installation. In the case of Windows, this is as easy as this command line:</p>
            <pre><code>Cloudflare_WARP_Release-x64.msi /quiet ORGANIZATION="&lt;insert your org&gt;" SERVICE_MODE="warp" ENABLE="true" GATEWAY_UNIQUE_ID="&lt;insert your gateway DoH domain&gt;" SUPPORT_URL=”&lt;mailto or http of your support person&gt;"</code></pre>
            
    <div>
      <h4>Managed Device‌‌</h4>
      <a href="#managed-device">
        
      </a>
    </div>
    <p>Organizations with MDM tools like Intune or JAMF can deploy WARP to their entire fleet of devices from a single operation. Just as you preconfigure all other device settings, WARP can be set so that all end users need to do is login with your team’s identity provider by clicking on the Cloudflare WARP client after it has been deployed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7004IBMmW5cUllHPDjIHDG/13e7e722b050aa8fcf90ed2bc2ecb6f9/image2-21.png" />
            
            </figure><p>Microsoft Intune Configurationa</p><p>For a complete list of the installation options, required fields and step by step instructions for all platforms see the <a href="https://developers.cloudflare.com/warpclient/">WARP Client documentation</a>.</p>
    <div>
      <h3>What's coming next</h3>
      <a href="#whats-coming-next">
        
      </a>
    </div>
    <p>There is still more we want to build for both our consumer users of WARP and our Cloudflare for Teams customers. Here’s a sneak peek at some of the ones we are most excited about (and allowed to share):</p><ul><li><p>New partner integrations with CrowdStrike and VMware Carbon Black (Tanium available today) will allow you to build even more comprehensive Cloudflare Access policies that check for device health before allowing users to connect to applications</p></li><li><p>Split Tunnel support will allow you or your organization to specify applications, sites or IP addresses that should be excluded from WARP. This will allow content like games, streaming services, or any application you choose to work outside the connection.</p></li></ul>
    <div>
      <h3>Download now</h3>
      <a href="#download-now">
        
      </a>
    </div>
    <p>We are excited to finally share these applications with our customers. We'd especially like to thank our Cloudflare MVP’s, the 100,000+ beta users on desktop, and the millions of existing users on mobile who have helped grow WARP into what it is today.</p><p>You can download the applications right now from <a href="https://one.one.one.one">https://one.one.one.one</a>‌‌.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Zero Trust Week]]></category>
            <category><![CDATA[1.1.1.1]]></category>
            <category><![CDATA[WARP]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">6YajQpDuAINHoIEnv5njG9</guid>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
    </channel>
</rss>