After USM Anywhere identifies Cloudflare events and alarms, you determine which Cloudflare activities are suspicious and should be investigated, and use the Cloudflare workflow to notify the investigator. For example, if you see a file upload event and think it should be investigated, rather than manually notifying the investigator, you can use the BlueApp for Cloudflare response action to create a firewall action to block the suspicious upload. The BlueApp for Cloudflare enables you to create firewall actions based on either the destination IP address or source IP address. These actions are available when you launch a response action directly from an alarm or event (described in the table below) or launch a response action in an orchestration rule.Documentation Index
Fetch the complete documentation index at: https://docs.levelblue.com/llms.txt
Use this file to discover all available pages before exploring further.
| Action | Description |
|---|---|
| Create a Cloudflare action from an alarm | Run this action to create a Cloudflare firewall rule (Block, Challenge, JS Challenge, Allow, Log) from an alarm. |
| Create a Cloudflare action from an event | Run this action to create a Cloudflare firewall rule (Block, Challenge, JS Challenge, Allow, Log) from an event. |
Note: Before launching a Cloudflare response action, you must have enabled and connected the BlueApp for Cloudflare to your Cloudflare Enterprise account. See Configuring the BlueApp for Cloudflare for more information.
- Go to Activity > Alarms.
- Review the alarms generated on the Cloudflare events, and then click the alarm to open its details.
- Click Select Action, and then select the Run Cloudflare Action tile.
- (Optional) If you have more than one USM Anywhere Sensor configured for the BlueApp for Cloudflare, select the sensor that you want to use for the action.
- From the App Action drop-down list, select Create firewall action from the destination IP Address or Create firewall action from the source IP Address, depending on your needs.
- From the Zone Name drop-down list, select the appropriate zone.
-
From the Action Type drop-down list, select the appropriate action type:
- Block: Blocks requests from accessing the site.
- Challenge: Forces the user to pass a Google reCAPTCHA challenge before proceeding. If the user passes this challenge, Cloudflare accepts the request. If they fail, the request is blocked.
- JS Challenge: Forces the user to pass a Cloudflare Javascript challenge before proceeding. If the user passes this challenge, Cloudflare accepts the request. If they fail, the request is blocked.
- Allow: Explicitly allows all matching requests, as long as no other Cloudflare firewall features block it.
-
Log: Logs the request in Cloudflare Logs.
Note: This action type is only available to Cloudflare Enterprise customers.
- Click Run. After USM Anywhere initiates the action for the alarm, it displays a confirmation.