<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Changelog · Cloudflare One</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/</link><description>Updates to Cloudflare One</description><language>en-us</language><atom:link href="https://developers.cloudflare.com/cloudflare-one/changelog/index.xml" rel="self"/><lastBuildDate>Wed, 17 Jul 2024 08:00:00 EST</lastBuildDate><item><title>Magic WAN - Updates to High Availability on the Magic WAN Connector</title><link>https://developers.cloudflare.com/magic-wan/changelog/#updates-to-high-availability-on-the-magic-wan-connector</link><description>The High Availability feature on Magic WAN Connector now supports additional failover conditions, DHCP lease syncing, and staggered upgrades.</description><pubDate>Wed, 17 Jul 2024 08:00:00 EST</pubDate><product>Magic WAN</product></item><item><title>Gateway - Gateway DNS filter non-authenticated queries</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/gateway/#gateway-dns-filter-non-authenticated-queries</link><description>Gateway users can now select which endpoints to use for a given DNS location. Available endpoints include IPv4, IPv6, DNS over HTTPS (DoH), and DNS over TLS (DoT). Users can protect each configured endpoint by specifying allowed source networks. Additionally, for the DoH endpoint, users can filter traffic based on source networks and/or authenticate user identity tokens.</description><pubDate>Sun, 14 Jul 2024 08:00:00 EST</pubDate><product>Gateway</product></item><item><title>Magic Cloud Networking - Closed beta launch</title><link>https://developers.cloudflare.com/magic-cloud-networking/changelog/#closed-beta-launch</link><description>The Magic Cloud Networking closed beta release is available, with the managed cloud on-ramps feature.</description><pubDate>Mon, 01 Jul 2024 08:00:00 EST</pubDate><product>Magic Cloud Networking</product></item><item><title>Zero Trust WARP Client - WARP client for macOS (version 2024.6.416.0)</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/warp/#warp-client-for-macos-version-202464160</link><description>&lt;p>A new GA release for the macOS WARP client is now available in the &lt;a href="https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">App Center&lt;/span>&lt;span class="DocsMarkdown--link-external-icon" aria-hidden="true">
&lt;svg fill="none" stroke="currentColor" stroke-width="1.5" width="23px" height="12px" stroke-linecap="round" stroke-linejoin="round" viewBox="0 0 16 16" role="img" aria-labelledby="title-4744738674102027" xmlns="http://www.w3.org/2000/svg">
&lt;title id="title-4744738674102027">External link icon&lt;/title>
&lt;path d="M6.75,1.75h-5v12.5h12.5v-5m0,-4v-3.5h-3.5M8,8l5.5-5.5">&lt;/path>
&lt;/svg>
&lt;span is-visually-hidden>&lt;/span>
&lt;/span>&lt;/a>. This release includes some exciting new features. It also includes additional fixes and minor improvements.&lt;/p>
&lt;p>New features:&lt;/p>
&lt;ul>
&lt;li>Admins can now elect to have ZT WARP clients connect using the MASQUE protocol; this setting is in Device Profiles. Note: before MASQUE can be used, the global setting for Override local interface IP must be enabled. For more detail, refer to &lt;a href=https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#device-tunnel-protocol class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Device tunnel protocol&lt;/span>&lt;/a>. This feature will be rolled out to customers in stages over approximately the next month.&lt;/li>
&lt;li>The Device Posture &lt;a href=https://developers.cloudflare.com/cloudflare-one/identity/devices/warp-client-checks/client-certificate/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">client certificate check&lt;/span>&lt;/a> has been substantially enhanced. The primary enhancement is the ability to check for client certificates that have unique common names, made unique by the inclusion of the device serial number or host name (for example, CN = &lt;code>123456.mycompany&lt;/code>, where 123456 is the device serial number).&lt;/li>
&lt;/ul>
&lt;p>Additional changes and improvements:&lt;/p>
&lt;ul>
&lt;li>Fixed a known issue where the certificate was not always properly left behind in &lt;code>/Library/Application Support/Cloudflare/installed_cert.pem&lt;/code>.&lt;/li>
&lt;li>Fixed an issue where re-auth notifications were not cleared from the UI when the user switched configurations.&lt;/li>
&lt;li>Fixed a macOS firewall rule that allowed all UDP traffic to go outside the tunnel. Relates to TunnelVision (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3661" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">CVE-2024-3661&lt;/span>&lt;span class="DocsMarkdown--link-external-icon" aria-hidden="true">
&lt;svg fill="none" stroke="currentColor" stroke-width="1.5" width="23px" height="12px" stroke-linecap="round" stroke-linejoin="round" viewBox="0 0 16 16" role="img" aria-labelledby="title-4744738674102027" xmlns="http://www.w3.org/2000/svg">
&lt;title id="title-4744738674102027">External link icon&lt;/title>
&lt;path d="M6.75,1.75h-5v12.5h12.5v-5m0,-4v-3.5h-3.5M8,8l5.5-5.5">&lt;/path>
&lt;/svg>
&lt;span is-visually-hidden>&lt;/span>
&lt;/span>&lt;/a>).&lt;/li>
&lt;li>Fixed an issue that could cause the Cloudflare WARP menu bar application to disappear when switching configurations.&lt;/li>
&lt;/ul>
&lt;p>Warning:&lt;/p>
&lt;ul>
&lt;li>This is the last GA release that will be supporting older, deprecated &lt;code>warp-cli&lt;/code> commands. There are two methods to identify these commands. One, when used in this release, the command will work but will also return a deprecation warning. And two, the deprecated commands do not appear in the output of &lt;code>warp-cli -h&lt;/code>.&lt;/li>
&lt;/ul>
&lt;p>Known issues:&lt;/p>
&lt;ul>
&lt;li>If a user has an MDM file configured to support multiple profiles (for the &lt;a href=https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">switch configurations&lt;/span>&lt;/a> feature), and then changes to an MDM file configured for a single profile, the WARP client may not connect. The workaround is to use the &lt;code>warp-cli registration delete&lt;/code> command to clear the registration, and then re-register the client.&lt;/li>
&lt;li>There are certain known limitations preventing the use of the MASQUE tunnel protocol in certain scenarios. Do not use the MASQUE tunnel protocol if:
&lt;ul>
&lt;li>A Magic WAN integration is on the account and does not have the latest packet flow path for WARP traffic. Please check migration status with your account team.&lt;/li>
&lt;li>Your account has Regional Services enabled.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description><pubDate>Fri, 28 Jun 2024 08:00:00 EST</pubDate><product>Zero Trust WARP Client</product></item><item><title>Zero Trust WARP Client - WARP client for Windows (version 2024.6.415.0)</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/warp/#warp-client-for-windows-version-202464150</link><description>&lt;p>A new GA release for the macOS WARP client is now available in the &lt;a href="https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-macos-1/distribution_groups/release" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">App Center&lt;/span>&lt;span class="DocsMarkdown--link-external-icon" aria-hidden="true">
&lt;svg fill="none" stroke="currentColor" stroke-width="1.5" width="23px" height="12px" stroke-linecap="round" stroke-linejoin="round" viewBox="0 0 16 16" role="img" aria-labelledby="title-4744738674102027" xmlns="http://www.w3.org/2000/svg">
&lt;title id="title-4744738674102027">External link icon&lt;/title>
&lt;path d="M6.75,1.75h-5v12.5h12.5v-5m0,-4v-3.5h-3.5M8,8l5.5-5.5">&lt;/path>
&lt;/svg>
&lt;span is-visually-hidden>&lt;/span>
&lt;/span>&lt;/a>. This release includes some exciting new features. It also includes additional fixes and minor improvements.&lt;/p>
&lt;p>New features:&lt;/p>
&lt;ul>
&lt;li>Admins can now elect to have ZT WARP clients connect using the MASQUE protocol; this setting is in Device Profiles. Note: before MASQUE can be used, the global setting for Override local interface IP must be enabled. For more detail, refer to &lt;a href=https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-settings/#device-tunnel-protocol class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Device tunnel protocol&lt;/span>&lt;/a>. This feature will be rolled out to customers in stages over approximately the next month.&lt;/li>
&lt;li>The ZT WARP client on Windows devices can now connect before the user completes their Windows login. This &lt;a href=https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/windows-prelogin/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Windows pre-login capability&lt;/span>&lt;/a> allows for connecting to on-premise Active Directory and/or similar resources necessary to complete the Windows login.&lt;/li>
&lt;li>The Device Posture &lt;a href=https://developers.cloudflare.com/cloudflare-one/identity/devices/warp-client-checks/client-certificate/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">client certificate check&lt;/span>&lt;/a> has been substantially enhanced. The primary enhancement is the ability to check for client certificates that have unique common names, made unique by the inclusion of the device serial number or host name (for example, CN = &lt;code>123456.mycompany&lt;/code>, where 123456 is the device serial number).&lt;/li>
&lt;/ul>
&lt;p>Additional changes and improvements:&lt;/p>
&lt;ul>
&lt;li>Added a new &lt;a href=https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/#cf_failed_read_system_dns_config class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Unable to Connect message&lt;/span>&lt;/a> to the UI to help in troubleshooting.&lt;/li>
&lt;li>The upgrade window now uses international date formats.&lt;/li>
&lt;li>Made a change to ensure DEX tests are not running when the tunnel is not up due to the device going to or waking from sleep. This is specific to devices using the S3 power model.&lt;/li>
&lt;li>Fixed a known issue where the certificate was not always properly left behind in &lt;code>%ProgramData%\Cloudflare\installed_cert.pem&lt;/code>.&lt;/li>
&lt;li>Fixed an issue where ICMPv6 Neighbor Solicitation messages were being incorrectly sent on the WARP tunnel.&lt;/li>
&lt;li>Fixed an issue where a silent upgrade was causing certain files to be deleted if the target upgrade version is the same as the current version.&lt;/li>
&lt;/ul>
&lt;p>Warning:&lt;/p>
&lt;ul>
&lt;li>This is the last GA release that will be supporting older, deprecated &lt;code>warp-cli&lt;/code> commands. There are two methods to identify these commands. One, when used in this release, the command will work but will also return a deprecation warning. And two, the deprecated commands do not appear in the output of &lt;code>warp-cli -h&lt;/code>.&lt;/li>
&lt;/ul>
&lt;p>Known issues:&lt;/p>
&lt;ul>
&lt;li>If a user has an MDM file configured to support multiple profiles (for the &lt;a href=https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/switch-organizations/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">switch configurations&lt;/span>&lt;/a> feature), and then changes to an MDM file configured for a single profile, the WARP client may not connect. The workaround is to use the &lt;code>warp-cli registration delete&lt;/code> command to clear the registration, and then re-register the client.&lt;/li>
&lt;li>There are certain known limitations preventing the use of the MASQUE tunnel protocol in certain scenarios. Do not use the MASQUE tunnel protocol if:
&lt;ul>
&lt;li>A Magic WAN integration is on the account and does not have the latest packet flow path for WARP traffic. Please check migration status with your account team.&lt;/li>
&lt;li>Your account has Regional Services enabled.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul></description><pubDate>Fri, 28 Jun 2024 08:00:00 EST</pubDate><product>Zero Trust WARP Client</product></item><item><title>Zero Trust WARP Client - Cloudflare One Agent for iOS (version 1.4)</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/warp/#cloudflare-one-agent-for-ios-version-14</link><description>&lt;p>A new GA release for the iOS Cloudflare One Agent is now available in the &lt;a href="https://apps.apple.com/us/app/cloudflare-one-agent/id6443476492" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">iOS App Store&lt;/span>&lt;span class="DocsMarkdown--link-external-icon" aria-hidden="true">
&lt;svg fill="none" stroke="currentColor" stroke-width="1.5" width="23px" height="12px" stroke-linecap="round" stroke-linejoin="round" viewBox="0 0 16 16" role="img" aria-labelledby="title-4744738674102027" xmlns="http://www.w3.org/2000/svg">
&lt;title id="title-4744738674102027">External link icon&lt;/title>
&lt;path d="M6.75,1.75h-5v12.5h12.5v-5m0,-4v-3.5h-3.5M8,8l5.5-5.5">&lt;/path>
&lt;/svg>
&lt;span is-visually-hidden>&lt;/span>
&lt;/span>&lt;/a>.&lt;/p>
&lt;p>Notable updates:&lt;/p>
&lt;ul>
&lt;li>Fixed an issue with endpoint IP settings in MDM files&lt;/li>
&lt;li>Cleaned up some erroneous links&lt;/li>
&lt;li>Updated the Terms of Service&lt;/li>
&lt;/ul></description><pubDate>Thu, 27 Jun 2024 08:00:00 EST</pubDate><product>Zero Trust WARP Client</product></item><item><title>Gateway - Gateway DNS policy setting to ignore CNAME category matches</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/gateway/#gateway-dns-policy-setting-to-ignore-cname-category-matches</link><description>Gateway now offers the ability to selectively ignore CNAME domain categories in DNS policies via the &lt;a href=https://developers.cloudflare.com/cloudflare-one/policies/gateway/domain-categories/#ignore-cname-domain-categories class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">&lt;strong>Ignore CNAME domain categories&lt;/strong> setting&lt;/span>&lt;/a> in the policy builder and the &lt;a href="https://developers.cloudflare.com/api/operations/zero-trust-gateway-rules-create-zero-trust-gateway-rule" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">&lt;code>ignore_cname_category_matches&lt;/code> setting&lt;/span>&lt;span class="DocsMarkdown--link-api-icon" aria-hidden="true">
&lt;svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="23px" height="12px" viewBox="0 0 23 12" version="1.1">
&lt;title>API link label&lt;/title>
&lt;g id="Page-1" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd">
&lt;g id="Group">
&lt;rect id="Rectangle" fill="#e06d10" x="0" y="0" width="23" height="12" rx="2"/>
&lt;path d="M8.12890625,10 L9.58984375,10 L6.83984375,2.24951172 L5.27685547,2.24951172 L2.52685547,10 L3.95556641,10 L4.61621094,7.99658203 L7.46826172,7.99658203 L8.12890625,10 Z M6.0234375,3.61914062 L6.06103516,3.61914062 L7.140625,6.92773438 L4.93847656,6.92773438 L6.0234375,3.61914062 Z M10.9169922,2.24951172 L10.9169922,10 L12.3027344,10 L12.3027344,7.43798828 L13.8710938,7.43798828 C15.4394531,7.43798828 16.5405273,6.390625 16.5405273,4.84375 C16.5405273,3.296875 15.4716797,2.24951172 13.9301758,2.24951172 L10.9169922,2.24951172 Z M12.3027344,3.3828125 L13.5649414,3.3828125 C14.5585938,3.3828125 15.1333008,3.91455078 15.1333008,4.84375 C15.1333008,5.78369141 14.5532227,6.32080078 13.5595703,6.32080078 L12.3027344,6.32080078 L12.3027344,3.3828125 Z M19.4360352,10 L18.050293,10 L18.050293,2.24951172 L19.4360352,2.24951172 L19.4360352,10 Z" id="API" fill="#FFFFFF" fill-rule="nonzero"/>
&lt;/g>
&lt;/g>
&lt;/svg>
&lt;span is-visually-hidden>Open API docs link&lt;/span>
&lt;/span>&lt;/a> in the API.</description><pubDate>Tue, 25 Jun 2024 08:00:00 EST</pubDate><product>Gateway</product></item><item><title>Magic WAN - ICMP support for traffic sourced from private IPs</title><link>https://developers.cloudflare.com/magic-wan/changelog/#icmp-support-for-traffic-sourced-from-private-ips</link><description>Magic WAN will now support ICMP traffic sourced from private IPs going to the Internet via Gateway.</description><pubDate>Sun, 23 Jun 2024 08:00:00 EST</pubDate><product>Magic WAN</product></item><item><title>Risk score - Okta risk exchange</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/risk-score/#okta-risk-exchange</link><description>You can now &lt;a href=https://developers.cloudflare.com/cloudflare-one/insights/risk-score/#send-risk-score-to-okta class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">exchange user risk scores&lt;/span>&lt;/a> with Okta to inform SSO-level policies.</description><pubDate>Mon, 17 Jun 2024 08:00:00 EST</pubDate><product>Risk score</product></item><item><title>Risk score - SentinelOne signal ingestion</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/risk-score/#sentinelone-signal-ingestion</link><description>You can now configure a &lt;a href=https://developers.cloudflare.com/cloudflare-one/insights/risk-score/#predefined-risk-behaviors class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">predefined risk behavior&lt;/span>&lt;/a> to evaluate user risk score using device posture attributes from the &lt;a href=https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/sentinelone/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">SentinelOne integration&lt;/span>&lt;/a>.</description><pubDate>Fri, 14 Jun 2024 08:00:00 EST</pubDate><product>Risk score</product></item><item><title>Access - Scalability improvements to the App Launcher</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#scalability-improvements-to-the-app-launcher</link><description>Applications now load more quickly for customers with a large number of applications or complex policies.</description><pubDate>Thu, 06 Jun 2024 08:00:00 EST</pubDate><product>Access</product></item><item><title>Magic WAN - Application based prioritization</title><link>https://developers.cloudflare.com/magic-wan/changelog/#application-based-prioritization</link><description>The Magic WAN Connector can now prioritize traffic on a per-application basis.</description><pubDate>Wed, 05 Jun 2024 08:00:00 EST</pubDate><product>Magic WAN</product></item><item><title>CASB - Atlassian Bitbucket integration</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/casb/#atlassian-bitbucket-integration</link><description>Customers can now scan their Bitbucket Cloud workspaces for a variety of contextualized security issues such as source code exposure, admin misconfigurations, and more.</description><pubDate>Mon, 03 Jun 2024 08:00:00 EST</pubDate><product>CASB</product></item><item><title>Magic WAN - WARP virtual IP addresses</title><link>https://developers.cloudflare.com/magic-wan/changelog/#warp-virtual-ip-addresses</link><description>Customers using Gateway to filter traffic to Magic WAN destinations will now see traffic from Cloudflare egressing with WARP virtual IP addresses (CGNAT range), rather than public Cloudflare IP addresses. This simplifies configuration and improves visibility for customers.</description><pubDate>Fri, 31 May 2024 08:00:00 EST</pubDate><product>Magic WAN</product></item><item><title>CASB - Data-at-rest DLP for Box and Dropbox</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/casb/#data-at-rest-dlp-for-box-and-dropbox</link><description>You can now scan your &lt;a href=https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/box/#data-loss-prevention-optional class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Box&lt;/span>&lt;/a> and &lt;a href=https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/dropbox/#data-loss-prevention-optional class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Dropbox&lt;/span>&lt;/a> files for DLP matches.</description><pubDate>Thu, 23 May 2024 08:00:00 EST</pubDate><product>CASB</product></item><item><title>DLP - Data-at-rest DLP for Box and Dropbox</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/dlp/#data-at-rest-dlp-for-box-and-dropbox</link><description>You can now scan your &lt;a href=https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/box/#data-loss-prevention-optional class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Box&lt;/span>&lt;/a> and &lt;a href=https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/dropbox/#data-loss-prevention-optional class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Dropbox&lt;/span>&lt;/a> files for DLP matches.</description><pubDate>Thu, 23 May 2024 08:00:00 EST</pubDate><product>DLP</product></item><item><title>Zero Trust WARP Client - WARP client for Windows (version 2024.5.310.1)</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/warp/#warp-client-for-windows-version-202453101</link><description>&lt;p>A new beta release for the Windows WARP client is now available in the &lt;a href="https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows/distribution_groups/beta" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">App Center&lt;/span>&lt;span class="DocsMarkdown--link-external-icon" aria-hidden="true">
&lt;svg fill="none" stroke="currentColor" stroke-width="1.5" width="23px" height="12px" stroke-linecap="round" stroke-linejoin="round" viewBox="0 0 16 16" role="img" aria-labelledby="title-4744738674102027" xmlns="http://www.w3.org/2000/svg">
&lt;title id="title-4744738674102027">External link icon&lt;/title>
&lt;path d="M6.75,1.75h-5v12.5h12.5v-5m0,-4v-3.5h-3.5M8,8l5.5-5.5">&lt;/path>
&lt;/svg>
&lt;span is-visually-hidden>&lt;/span>
&lt;/span>&lt;/a>.&lt;/p>
&lt;p>Notable updates:&lt;/p>
&lt;ul>
&lt;li>Added a new &lt;a href=https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/troubleshooting/client-errors/#cf_failed_read_system_dns_config class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Unable to Connect message&lt;/span>&lt;/a> to the UI to help in troubleshooting.&lt;/li>
&lt;li>In the upgrade window, a change was made to use international date formats to resolve an issue with localization.&lt;/li>
&lt;li>Made a change to ensure DEX tests are not running when the tunnel is not up due to the device going to or waking from sleep. This is specific to devices using the S3 power model.&lt;/li>
&lt;li>Fixed a known issue where the certificate was not always properly left behind in &lt;code>%ProgramData%\Cloudflare\installed_cert.pem&lt;/code>.&lt;/li>
&lt;li>Fixed an issue where ICMPv6 Neighbor Solicitation messages were being incorrectly sent on the WARP tunnel.&lt;/li>
&lt;/ul>
&lt;p>Known issues:&lt;/p>
&lt;ul>
&lt;li>If a user has an MDM file configured to support multiple profiles (for the switch configurations feature), and then changes to an MDM file configured for a single profile, the WARP client may not connect. The workaround is to use the &lt;code>warp-cli registration delete&lt;/code> command to clear the registration, and then re-register the client.&lt;/li>
&lt;/ul></description><pubDate>Wed, 22 May 2024 08:00:00 EST</pubDate><product>Zero Trust WARP Client</product></item><item><title>Zero Trust WARP Client - WARP client for macOS (version 2024.5.287.1)</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/warp/#warp-client-for-macos-version-202452871</link><description>&lt;p>A new beta release for the macOS WARP client is now available in the &lt;a href="https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-macos/distribution_groups/beta" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">App Center&lt;/span>&lt;span class="DocsMarkdown--link-external-icon" aria-hidden="true">
&lt;svg fill="none" stroke="currentColor" stroke-width="1.5" width="23px" height="12px" stroke-linecap="round" stroke-linejoin="round" viewBox="0 0 16 16" role="img" aria-labelledby="title-4744738674102027" xmlns="http://www.w3.org/2000/svg">
&lt;title id="title-4744738674102027">External link icon&lt;/title>
&lt;path d="M6.75,1.75h-5v12.5h12.5v-5m0,-4v-3.5h-3.5M8,8l5.5-5.5">&lt;/path>
&lt;/svg>
&lt;span is-visually-hidden>&lt;/span>
&lt;/span>&lt;/a>&lt;/p>
&lt;p>Notable updates:&lt;/p>
&lt;ul>
&lt;li>Fixed a known issue where the certificate was not always properly left behind in &lt;code>/Library/Application Support/Cloudflare/installed_cert.pem&lt;/code>.&lt;/li>
&lt;li>Fixed an issue so that the reauth notification is cleared from the UI when the user switches configurations.&lt;/li>
&lt;li>Fixed an issue by correcting the WARP client setting of macOS firewall rules. This relates to TunnelVision (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3661" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">CVE-2024-3661&lt;/span>&lt;span class="DocsMarkdown--link-external-icon" aria-hidden="true">
&lt;svg fill="none" stroke="currentColor" stroke-width="1.5" width="23px" height="12px" stroke-linecap="round" stroke-linejoin="round" viewBox="0 0 16 16" role="img" aria-labelledby="title-4744738674102027" xmlns="http://www.w3.org/2000/svg">
&lt;title id="title-4744738674102027">External link icon&lt;/title>
&lt;path d="M6.75,1.75h-5v12.5h12.5v-5m0,-4v-3.5h-3.5M8,8l5.5-5.5">&lt;/path>
&lt;/svg>
&lt;span is-visually-hidden>&lt;/span>
&lt;/span>&lt;/a>).&lt;/li>
&lt;li>Fixed an issue that could cause the Cloudflare WARP menu bar application to disappear when switching configurations.&lt;/li>
&lt;/ul>
&lt;p>Known issues:&lt;/p>
&lt;ul>
&lt;li>If a user has an MDM file configured to support multiple profiles (for the switch configurations feature), and then changes to an MDM file configured for a single profile, the WARP client may not connect. The workaround is to use the &lt;code>warp-cli registration delete&lt;/code> command to clear the registration, and then re-register the client.&lt;/li>
&lt;/ul></description><pubDate>Tue, 21 May 2024 08:00:00 EST</pubDate><product>Zero Trust WARP Client</product></item><item><title>Digital Experience Monitoring - Last seen ISP</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/dex/#last-seen-isp</link><description>Admins can view the last ISP seen for a device by going to &lt;strong>My Team&lt;/strong> > &lt;strong>Devices&lt;/strong>. Requires setting up a &lt;a href=https://developers.cloudflare.com/cloudflare-one/insights/dex/tests/traceroute/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">traceroute test&lt;/span>&lt;/a>.</description><pubDate>Mon, 20 May 2024 08:00:00 EST</pubDate><product>Digital Experience Monitoring</product></item><item><title>Digital Experience Monitoring - DEX alerts</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/dex/#dex-alerts</link><description>&lt;p>Admins can now set &lt;a href=https://developers.cloudflare.com/cloudflare-one/insights/dex/notifications/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">DEX alerts&lt;/span>&lt;/a> using &lt;a href=https://developers.cloudflare.com/notifications/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Cloudflare Notifications&lt;/span>&lt;/a>. Three new DEX alert types:&lt;/p>
&lt;ul>
&lt;li>Device connectivity anomaly&lt;/li>
&lt;li>Test latency&lt;/li>
&lt;li>Test low availability&lt;/li>
&lt;/ul></description><pubDate>Mon, 13 May 2024 08:00:00 EST</pubDate><product>Digital Experience Monitoring</product></item><item><title>Zero Trust WARP Client - Cloudflare One Agent for Android (version 1.7)</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/warp/#cloudflare-one-agent-for-android-version-17</link><description>A new GA release for the Android Cloudflare One Agent is now available in the &lt;a href="https://play.google.com/store/apps/details?id=com.cloudflare.cloudflareoneagent" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">Google Play Store&lt;/span>&lt;span class="DocsMarkdown--link-external-icon" aria-hidden="true">
&lt;svg fill="none" stroke="currentColor" stroke-width="1.5" width="23px" height="12px" stroke-linecap="round" stroke-linejoin="round" viewBox="0 0 16 16" role="img" aria-labelledby="title-4744738674102027" xmlns="http://www.w3.org/2000/svg">
&lt;title id="title-4744738674102027">External link icon&lt;/title>
&lt;path d="M6.75,1.75h-5v12.5h12.5v-5m0,-4v-3.5h-3.5M8,8l5.5-5.5">&lt;/path>
&lt;/svg>
&lt;span is-visually-hidden>&lt;/span>
&lt;/span>&lt;/a>. This release fixes an issue where the user was not prompted to select the client certificate in the browser during Access registration.</description><pubDate>Fri, 10 May 2024 08:00:00 EST</pubDate><product>Zero Trust WARP Client</product></item><item><title>Zero Trust WARP Client - Crowdstrike posture checks for online status</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/warp/#crowdstrike-posture-checks-for-online-status</link><description>Two new Crowdstrike attributes, &lt;em>Last Seen&lt;/em> and &lt;em>State&lt;/em>, are now available to be used as selectors in the &lt;a href=https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/crowdstrike/ class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">Crowdstrike service provider integration&lt;/span>&lt;/a>.</description><pubDate>Thu, 09 May 2024 08:00:00 EST</pubDate><product>Zero Trust WARP Client</product></item><item><title>Zero Trust WARP Client - WARP client for macOS (version 2024.3.444.0)</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/warp/#warp-client-for-macos-version-202434440</link><description>A new GA release for the macOS WARP client is now available in the &lt;a href="https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-macos-1/distribution_groups/release" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">App Center&lt;/span>&lt;span class="DocsMarkdown--link-external-icon" aria-hidden="true">
&lt;svg fill="none" stroke="currentColor" stroke-width="1.5" width="23px" height="12px" stroke-linecap="round" stroke-linejoin="round" viewBox="0 0 16 16" role="img" aria-labelledby="title-4744738674102027" xmlns="http://www.w3.org/2000/svg">
&lt;title id="title-4744738674102027">External link icon&lt;/title>
&lt;path d="M6.75,1.75h-5v12.5h12.5v-5m0,-4v-3.5h-3.5M8,8l5.5-5.5">&lt;/path>
&lt;/svg>
&lt;span is-visually-hidden>&lt;/span>
&lt;/span>&lt;/a>. This releases fixes an issue with how the WARP client sets macOS firewall rules and addresses the TunnelVision (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3661" class="DocsMarkdown--link" target="_blank" rel="noopener">
&lt;span class="DocsMarkdown--link-content">CVE-2024-3661&lt;/span>&lt;span class="DocsMarkdown--link-external-icon" aria-hidden="true">
&lt;svg fill="none" stroke="currentColor" stroke-width="1.5" width="23px" height="12px" stroke-linecap="round" stroke-linejoin="round" viewBox="0 0 16 16" role="img" aria-labelledby="title-4744738674102027" xmlns="http://www.w3.org/2000/svg">
&lt;title id="title-4744738674102027">External link icon&lt;/title>
&lt;path d="M6.75,1.75h-5v12.5h12.5v-5m0,-4v-3.5h-3.5M8,8l5.5-5.5">&lt;/path>
&lt;/svg>
&lt;span is-visually-hidden>&lt;/span>
&lt;/span>&lt;/a>) vulnerability.</description><pubDate>Wed, 08 May 2024 08:00:00 EST</pubDate><product>Zero Trust WARP Client</product></item><item><title>Access - Add option to bypass CORS to origin server</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#add-option-to-bypass-cors-to-origin-server</link><description>Access admins can &lt;a href=https://developers.cloudflare.com/cloudflare-one/identity/authorization-cookie/cors/#bypass-options-requests-to-origin class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">defer all CORS enforcement to their origin server&lt;/span>&lt;/a> for specific Access applications.</description><pubDate>Sun, 28 Apr 2024 08:00:00 EST</pubDate><product>Access</product></item><item><title>CASB - Export CASB findings to CSV</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/casb/#export-casb-findings-to-csv</link><description>You can now export all top-level CASB findings or every instance of your findings to CSV.</description><pubDate>Tue, 16 Apr 2024 08:00:00 EST</pubDate><product>CASB</product></item><item><title>DLP - Optical character recognition</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/dlp/#optical-character-recognition</link><description>DLP can now &lt;a href=https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/#optical-character-recognition-ocr class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">detect sensitive data&lt;/span>&lt;/a> in jpeg, jpg, and png files. This helps companies prevent the leak of sensitive data in images, such as screenshots.</description><pubDate>Tue, 16 Apr 2024 08:00:00 EST</pubDate><product>DLP</product></item><item><title>Access - Zero Trust User identity audit logs</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#zero-trust-user-identity-audit-logs</link><description>All user identity changes via SCIM or Authentication events are logged against a user’s registry identity.</description><pubDate>Mon, 15 Apr 2024 08:00:00 EST</pubDate><product>Access</product></item><item><title>Gateway - Gateway file type control improvements</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/gateway/#gateway-file-type-control-improvements</link><description>Gateway now offers a more extensive, categorized &lt;a href=https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types class="DocsMarkdown--link">&lt;span class="DocsMarkdown--link-content">list of files&lt;/span>&lt;/a> to control uploads and downloads.</description><pubDate>Fri, 05 Apr 2024 08:00:00 EST</pubDate><product>Gateway</product></item><item><title>Browser Isolation - Removed third-party cookie dependencies</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/browser-isolation/#removed-third-party-cookie-dependencies</link><description>Removed dependency on third-party cookies in the isolated browser, fixing an issue that previously caused intermittent disruptions for users maintaining multi-site, cross-tab sessions in the isolated browser.</description><pubDate>Thu, 21 Mar 2024 08:00:00 EST</pubDate><product>Browser Isolation</product></item><item><title>Access - Access for SaaS OIDC Support</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#access-for-saas-oidc-support</link><description>Access for SaaS applications can be setup with OIDC as an authentication method. OIDC and SAML 2.0 are now both fully supported.</description><pubDate>Thu, 22 Feb 2024 08:00:00 EST</pubDate><product>Access</product></item><item><title>Access - WARP as an identity source for Access</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#warp-as-an-identity-source-for-access</link><description>Allow users to log in to Access applications with their WARP session identity. Users need to reauthenticate based on default session durations. WARP authentication identity must be turned on in your device enrollment permissions and can be enabled on a per application basis.</description><pubDate>Thu, 22 Feb 2024 08:00:00 EST</pubDate><product>Access</product></item><item><title>Magic WAN - Network segmentation</title><link>https://developers.cloudflare.com/magic-wan/changelog/#network-segmentation</link><description>You can define policies in your Connector to either allow traffic to flow between your LANs without it leaving your local premises or to forward it via the Cloudflare network where you can add additional security features.</description><pubDate>Tue, 23 Jan 2024 08:00:00 EST</pubDate><product>Magic WAN</product></item><item><title>Access - Unique Entity IDs in Access for SaaS</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#unique-entity-ids-in-access-for-saas</link><description>All new Access for SaaS applications have unique Entity IDs. This allows for multiple integrations with the same SaaS provider if required. The unique Entity ID has the application audience tag appended. Existing apps are unchanged.</description><pubDate>Wed, 20 Dec 2023 08:00:00 EST</pubDate><product>Access</product></item><item><title>Access - Default relay state support in Access for SaaS</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#default-relay-state-support-in-access-for-saas</link><description>Allows Access admins to set a default relay state on Access for SaaS apps.</description><pubDate>Fri, 15 Dec 2023 08:00:00 EST</pubDate><product>Access</product></item><item><title>Access - App launcher supports tags and filters</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#app-launcher-supports-tags-and-filters</link><description>Access admins can now tag applications and allow users to filter by those tags in the App Launcher.</description><pubDate>Fri, 15 Sep 2023 08:00:00 EST</pubDate><product>Access</product></item><item><title>Access - App launcher customization</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#app-launcher-customization</link><description>Allow Access admins to configure the App Launcher page within Zero Trust.</description><pubDate>Fri, 15 Sep 2023 08:00:00 EST</pubDate><product>Access</product></item><item><title>Access - View active Access user identities in the dashboard and API</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#view-active-access-user-identities-in-the-dashboard-and-api</link><description>Access admins can now view the full contents of a user’s identity and device information for all active application sessions.</description><pubDate>Fri, 15 Sep 2023 08:00:00 EST</pubDate><product>Access</product></item><item><title>Access - Custom OIDC claims for named IdPs</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#custom-oidc-claims-for-named-idps</link><description>Access admins can now add custom claims to the existing named IdP providers. Previously this was locked to the generic OIDC provider.</description><pubDate>Fri, 08 Sep 2023 08:00:00 EST</pubDate><product>Access</product></item><item><title>Access - Azure AD authentication contexts</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#azure-ad-authentication-contexts</link><description>Support Azure AD authentication contexts directly in Access policies.</description><pubDate>Wed, 02 Aug 2023 08:00:00 EST</pubDate><product>Access</product></item><item><title>Access - Custom block pages for Access applications</title><link>https://developers.cloudflare.com/cloudflare-one/changelog/access/#custom-block-pages-for-access-applications</link><description>Allow Access admins to customize the block pages presented by Access to end users.</description><pubDate>Fri, 23 Jun 2023 08:00:00 EST</pubDate><product>Access</product></item></channel></rss>