---
title: Changelogs
image: https://developers.cloudflare.com/cf-twitter-card.png
---

[Skip to content](#%5Ftop) 

# Changelog

New updates and improvements at Cloudflare.

[ Subscribe to RSS ](https://developers.cloudflare.com/changelog/rss/index.xml) [ View RSS feeds ](https://developers.cloudflare.com/fundamentals/new-features/available-rss-feeds/) 

All products

![hero image](https://developers.cloudflare.com/_astro/hero.CVYJHPAd_26AMqX.svg) 

Oct 08, 2024
1. ### [New fields added to Gateway-related datasets in Cloudflare Logs](https://developers.cloudflare.com/changelog/post/2024-10-08-new-gateway-fields/)  
[ Logs ](https://developers.cloudflare.com/logs/)  
Cloudflare has introduced new fields to two Gateway-related datasets in Cloudflare Logs:  
   * **Gateway HTTP**: `ApplicationIDs`, `ApplicationNames`, `CategoryIDs`, `CategoryNames`, `DestinationIPContinentCode`, `DestinationIPCountryCode`, `ProxyEndpoint`, `SourceIPContinentCode`, `SourceIPCountryCode`, `VirtualNetworkID`, and `VirtualNetworkName`.  
   * **Gateway Network**: `ApplicationIDs`, `ApplicationNames`, `DestinationIPContinentCode`, `DestinationIPCountryCode`, `ProxyEndpoint`, `SourceIPContinentCode`, `SourceIPCountryCode`, `TransportProtocol`, `VirtualNetworkID`, and `VirtualNetworkName`.

Oct 02, 2024
1. ### [Search for custom rules using rule name and/or ID](https://developers.cloudflare.com/changelog/post/2024-10-02-custom-rule-search/)  
[ Cloudflare Network Firewall ](https://developers.cloudflare.com/cloudflare-network-firewall/)  
The Magic Firewall dashboard now allows you to search custom rules using the rule name and/or ID.  
   1. Log into the [Cloudflare dashboard ↗](https://dash.cloudflare.com) and select your account.  
   2. Go to **Analytics & Logs** \> **Network Analytics**.  
   3. Select **Magic Firewall**.  
   4. Add a filter for **Rule ID**.  
![Search for firewall rules with rule IDs](https://developers.cloudflare.com/_astro/search-with-rule-id.DJgzqgKk_2jJ9x8.webp)  
Additionally, the rule ID URL link has been added to Network Analytics.

Oct 01, 2024
1. ### [Eliminate long-lived credentials and enhance SSH security with Cloudflare Access for Infrastructure](https://developers.cloudflare.com/changelog/post/2024-10-01-ssh-with-access-for-infrastructure/)  
[ Access ](https://developers.cloudflare.com/cloudflare-one/access-controls/policies/)  
Organizations can now eliminate long-lived credentials from their SSH setup and enable strong multi-factor authentication for SSH access, similar to other Access applications, all while generating access and command logs.  
SSH with [Access for Infrastructure](https://developers.cloudflare.com/cloudflare-one/access-controls/applications/non-http/infrastructure-apps/) uses short-lived SSH certificates from Cloudflare, eliminating SSH key management and reducing the security risks associated with lost or stolen keys. It also leverages a common deployment model for Cloudflare One customers: [WARP-to-Tunnel](https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/ssh-device-client/).  
SSH with Access for Infrastructure enables you to:  
   * **Author fine-grained policy** to control who may access your SSH servers, including specific ports, protocols, and SSH users.  
   * **Monitor infrastructure access** with Access and SSH command logs, supporting regulatory compliance and providing visibility in case of security breach.  
   * **Preserve your end users' workflows.** SSH with Access for Infrastructure supports native SSH clients and does not require any modifications to users’ SSH configs.  
![Example of an infrastructure Access application](https://developers.cloudflare.com/_astro/infrastructure-app.BhpJOgxs_Z1M0wLH.webp)  
To get started, refer to [SSH with Access for Infrastructure](https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/ssh/ssh-infrastructure-access/).

Sep 24, 2024
1. ### [Try out Magic Network Monitoring](https://developers.cloudflare.com/changelog/post/2024-09-24-magic-network-monitoring/)  
[ Network Flow ](https://developers.cloudflare.com/network-flow/)  
The free version of Magic Network Monitoring (MNM) is now available to everyone with a Cloudflare account by default.  
   1. Log in to your [Cloudflare dashboard ↗](https://dash.cloudflare.com), and select your account.  
   2. Go to **Analytics & Logs** \> **Magic Monitoring**.  
![Try out the free version of Magic Network Monitoring](https://developers.cloudflare.com/_astro/get-started.D7KXWcs4_Z1KOQrC.webp)  
For more details, refer to the [Get started guide](https://developers.cloudflare.com/network-flow/get-started/).

Sep 23, 2024
1. ### [AI Crawl Control](https://developers.cloudflare.com/changelog/post/2024-09-23-ai-audit-launch/)  
[ AI Crawl Control ](https://developers.cloudflare.com/ai-crawl-control/)  
Every site on Cloudflare now has access to [**AI Audit**](https://developers.cloudflare.com/ai-crawl-control/), which summarizes the crawling behavior of popular and known AI services.  
You can use this data to:  
   * Understand how and how often crawlers access your site (and which content is the most popular).  
   * Block specific AI bots accessing your site.  
   * Use Cloudflare to enforce your `robots.txt` policy via an automatic WAF rule.  
![View AI bot activity with AI Audit](https://developers.cloudflare.com/_astro/ai-crawl-control-overview.Dr_yGKOC_ZRyCQG.webp)  
To get started, explore [AI audit](https://developers.cloudflare.com/ai-crawl-control/).

Sep 05, 2024
1. ### [One-click Cache Rules templates now available](https://developers.cloudflare.com/changelog/post/2024-09-05-cache-rules-templates/)  
[ Cache / CDN ](https://developers.cloudflare.com/cache/)  
You can now create optimized cache rules instantly with **one-click templates**, eliminating the complexity of manual rule configuration.  
#### How it works  
   1. Navigate to **Rules** \> **Templates** in your Cloudflare dashboard.  
   2. Select a template for your use case.  
   3. Click to apply the template with sensible defaults.  
   4. Customize as needed for your specific requirements.  
#### Available cache templates  
   * **Cache everything**: Adjust the cache level for all requests.  
   * **Bypass cache for everything**: Bypass cache for all requests.  
   * **Cache default file extensions**: Replicate Page Rules caching behavior by making only default extensions eligible for cache.  
   * **Bypass cache on cookie**: Bypass cache for requests containing specific cookies.  
   * **Set edge cache time**: Cache responses with status code between 200 and 599 on the Cloudflare edge.  
   * **Set browser cache time**: Adjust how long a browser should cache a resource.  
#### Get started  
To get started, go to [**Rules > Templates** ↗](https://dash.cloudflare.com/?to=/:account/:zone/caching/cache-rules) in the dashboard. For more information, refer to the [Cache Rules documentation](https://developers.cloudflare.com/cache/how-to/cache-rules/).

Sep 05, 2024
1. ### [New Rules Templates for One-Click Rule Creation](https://developers.cloudflare.com/changelog/post/2024-09-05-rules-templates/)  
[ Rules ](https://developers.cloudflare.com/rules/)  
Now, you can create **common rule configurations** in just **one click** using Rules Templates.  
![Rules Templates](https://developers.cloudflare.com/_astro/rules-templates.DAV0GOXF_Z2wOoyL.webp)  
What you can do:  
   * **Pick a pre-built rule** – Choose from a library of templates.  
   * **One-click setup** – Deploy best practices instantly.  
   * **Customize as needed** – Adjust templates to fit your setup.  
Template cards are now also available directly in the rule builder for each product.  
Need more ideas? Check out the [Examples gallery](https://developers.cloudflare.com/rules/examples/) in our documentation.

Jul 19, 2024
1. ### [Regionalized Generic Tiered Cache for higher hit ratios](https://developers.cloudflare.com/changelog/post/2024-07-19-regionalized-generic-tiered-cache/)  
[ Cache / CDN ](https://developers.cloudflare.com/cache/)  
You can now achieve higher cache hit ratios with [Generic Global Tiered Cache](https://developers.cloudflare.com/cache/how-to/tiered-cache/#generic-global-tiered-cache). Regional content hashing routes content consistently to the same upper-tier data centers, eliminating redundant caching and reducing origin load.  
#### How it works  
Regional content hashing groups data centers by region and uses consistent hashing to route content to designated upper-tier caches:  
   * Same content always routes to the same upper-tier data center within a region.  
   * Eliminates redundant copies across multiple upper-tier caches.  
   * Increases the likelihood of cache HITs for the same content.  
#### Example  
A popular image requested from multiple edge locations in a region:  
   * **Before**: Cached at 3-4 different upper-tier data centers  
   * **After**: Cached at 1 designated upper-tier data center  
   * **Result**: 3-4x fewer cache MISSes, reducing origin load and improving performance  
#### Get started  
To get started, enable [Generic Global Tiered Cache](https://developers.cloudflare.com/cache/how-to/tiered-cache/#generic-global-tiered-cache) on your zone.

Jun 17, 2024
1. ### [Exchange user risk scores with Okta](https://developers.cloudflare.com/changelog/post/2024-06-17-okta-risk-exchange/)  
[ Risk Score ](https://developers.cloudflare.com/cloudflare-one/insights/risk-score/)  
Beyond the controls in [Zero Trust](https://developers.cloudflare.com/cloudflare-one/), you can now [exchange user risk scores](https://developers.cloudflare.com/cloudflare-one/team-and-resources/users/risk-score/#send-risk-score-to-okta) with Okta to inform SSO-level policies.  
First, configure Cloudflare One to send user risk scores to Okta.  
   1. Set up the [Okta SSO integration](https://developers.cloudflare.com/cloudflare-one/integrations/identity-providers/okta/).  
   2. In [Cloudflare One ↗](https://one.dash.cloudflare.com/), go to **Integrations** \> **Identity providers**.  
   3. In **Your identity providers**, locate your Okta integration and select **Edit**.  
   4. Turn on **Send risk score to Okta**.  
   5. Select **Save**.  
   6. Upon saving, Cloudflare One will display the well-known URL for your organization. Copy the value.  
Next, configure Okta to receive your risk scores.  
   1. On your Okta admin dashboard, go to **Security** \> **Device Integrations**.  
   2. Go to **Receive shared signals**, then select **Create stream**.  
   3. Name your integration. In **Set up integration with**, choose _Well-known URL_.  
   4. In **Well-known URL**, enter the well-known URL value provided by Cloudflare One.  
   5. Select **Create**.

Jun 16, 2024
1. ### [Explore product updates for Cloudflare One](https://developers.cloudflare.com/changelog/post/2024-06-16-cloudflare-one/)  
[ Access ](https://developers.cloudflare.com/cloudflare-one/access-controls/policies/)[ Browser Isolation ](https://developers.cloudflare.com/cloudflare-one/remote-browser-isolation/)[ CASB ](https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/)[ Cloudflare Tunnel for SASE ](https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/)[ Digital Experience Monitoring ](https://developers.cloudflare.com/cloudflare-one/insights/dex/)[ Data Loss Prevention ](https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/)[ Email security ](https://developers.cloudflare.com/cloudflare-one/email-security/)[ Gateway ](https://developers.cloudflare.com/cloudflare-one/traffic-policies/)[ Multi-Cloud Networking ](https://developers.cloudflare.com/multi-cloud-networking/)[ Cloudflare Network Firewall ](https://developers.cloudflare.com/cloudflare-network-firewall/)[ Network Flow ](https://developers.cloudflare.com/network-flow/)[ Magic Transit ](https://developers.cloudflare.com/magic-transit/)[ Cloudflare WAN ](https://developers.cloudflare.com/cloudflare-wan/)[ Network Interconnect ](https://developers.cloudflare.com/network-interconnect/)[ Risk Score ](https://developers.cloudflare.com/cloudflare-one/insights/risk-score/)[ Cloudflare One Client ](https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/cloudflare-one-client/)  
Welcome to your new home for product updates on [Cloudflare One](https://developers.cloudflare.com/cloudflare-one/).  
Our [new changelog](https://developers.cloudflare.com/changelog/) lets you read about changes in much more depth, offering in-depth examples, images, code samples, and even gifs.  
If you are looking for older product updates, refer to the following locations.  
Older product updates  
   * [Access](https://developers.cloudflare.com/cloudflare-one/changelog/access/)  
   * [Browser Isolation](https://developers.cloudflare.com/cloudflare-one/changelog/browser-isolation/)  
   * [CASB](https://developers.cloudflare.com/cloudflare-one/changelog/casb/)  
   * [Cloudflare Tunnel](https://developers.cloudflare.com/cloudflare-one/changelog/tunnel/)  
   * [Data Loss Prevention](https://developers.cloudflare.com/cloudflare-one/changelog/dlp/)  
   * [Digital Experience Monitoring](https://developers.cloudflare.com/cloudflare-one/changelog/dex/)  
   * [Email security](https://developers.cloudflare.com/cloudflare-one/changelog/email-security/)  
   * [Gateway](https://developers.cloudflare.com/cloudflare-one/changelog/gateway/)  
   * [Multi-Cloud Networking](https://developers.cloudflare.com/multi-cloud-networking/changelog/)  
   * [Cloudflare Network Firewall](https://developers.cloudflare.com/cloudflare-network-firewall/changelog/)  
   * [Magic Network Monitoring](https://developers.cloudflare.com/network-flow/changelog/)  
   * [Magic Transit](https://developers.cloudflare.com/magic-transit/changelog/)  
   * [Magic WAN](https://developers.cloudflare.com/cloudflare-wan/changelog/)  
   * [Network Interconnect](https://developers.cloudflare.com/network-interconnect/changelog/)  
   * [Risk score](https://developers.cloudflare.com/cloudflare-one/changelog/risk-score/)  
   * [Cloudflare One Client](https://developers.cloudflare.com/changelog/cloudflare-one-client/)

Feb 26, 2024
1. ### [Easily Exclude EU Visitors from RUM](https://developers.cloudflare.com/changelog/post/2025-02-25-rum-exclude-eu/)  
[ Cloudflare Web Analytics ](https://developers.cloudflare.com/web-analytics/)  
You can now easily enable Real User Monitoring (RUM) monitoring for your hostnames, while safely dropping requests from visitors in the European Union to comply with GDPR and CCPA.  
![RUM Enablement UI](https://developers.cloudflare.com/_astro/2025-02-26-rum-eu.X0ZtbXWA_eanJk.webp)  
Our Web Analytics product has always been centered on giving you insights into your users' experience that you need to provide the best quality experience, without sacrificing user privacy in the process.  
To help with that aim, you can now selectively enable RUM monitoring for your hostname and exclude EU visitor data in a single click. If you opt for this option, we will drop all metrics collected by our EU data centeres automatically.  
You can learn more about what metrics are reported by Web Analytics and how it is collected [in the Web Analytics documentation](https://developers.cloudflare.com/web-analytics/data-metrics/). You can enable Web Analytics on any hostname by going to the [Web Analytics ↗](https://dash.cloudflare.com/?to=/:account/web-analytics/sites) section of the dashboard, selecting "Manage Site" for the hostname you want to monitor, and choosing the appropriate enablement option.

[Search all changelog entries](https://developers.cloudflare.com/search/?contentType=Changelog+entry) 