Cloudflare One Release Notes

Last updated: Feb 19, 2026

  • Feb 17, 2026
    • Date parsed from source:
      Feb 17, 2026
    • First seen by Releasebot:
      Feb 19, 2026

    Cloudflare One by Cloudflare

    Access - Streamlined clientless access for private applications

    New Allow clientless access setting streamlines private self-hosted app access without a device client. It replaces the old bookmark workaround by enabling a prefixed URL tile in the App Launcher, shown to users who pass policy. Remote browser permissions required.

    Allow clientless access

    A new Allow clientless access setting makes it easier to enable access to private self-hosted applications without a device client.

    Previously, to provide clientless access to a private hostname or IP, you had to create a separate bookmark application pointing to a prefixed Clientless Web Isolation URL (for example, https://<your-teamname>.cloudflareaccess.com/browser/https://10.0.0.1/). This bookmark was visible to all users in the App Launcher, regardless of whether they had access to the underlying application.

    Now, you can manage clientless access directly within your private self-hosted application. When Allow clientless access is turned on, users who pass your Access application policies will see a tile in their App Launcher pointing to the prefixed URL. Users must have remote browser permissions to open the link.

    Original source Report a problem
  • Feb 17, 2026
    • Date parsed from source:
      Feb 17, 2026
    • First seen by Releasebot:
      Feb 19, 2026

    Cloudflare One by Cloudflare

    Access - Policies for bookmark applications

    You can now assign Access policies to bookmark apps, tailoring the App Launcher so users only see permitted bookmarks. Policies can restrict visibility by identity, device posture, and group membership, helping protect sensitive resources. If no policy is set, bookmarks remain visible to all users for backwards compatibility.

    You can now assign Access policies to bookmark applications.

    This lets you control which users see a bookmark in the App Launcher based on identity, device posture, and other policy rules.

    Previously, bookmark applications were visible to all users in your organization. With policy support, you can now:

    • Tailor the App Launcher to each user — Users only see the applications they have access to, reducing clutter and preventing accidental clicks on irrelevant resources.
    • Restrict visibility of sensitive bookmarks — Limit who can view bookmarks to internal tools or partner resources based on group membership, identity provider, or device posture.
    • Bookmarks support all Access policy configurations except purpose justification, temporary authentication, and application isolation. If no policy is assigned, the bookmark remains visible to all users (maintaining backwards compatibility).

    For more information, refer to Add bookmarks.

    Original source Report a problem
  • All of your release notes in one feed

    Join Releasebot and get updates from Cloudflare and hundreds of other software products.

  • Feb 17, 2026
    • Date parsed from source:
      Feb 17, 2026
    • First seen by Releasebot:
      Feb 18, 2026

    Cloudflare One by Cloudflare

    Cloudflare One, Cloudflare WAN, Cloudflare Network Firewall, Network Flow - Cloudflare One Product Name Updates

    Cloudflare renames networking products to reflect the Zero Trust and SASE journey, retiring old brands for clearer mappings. Magic WAN becomes Cloudflare WAN, IPsec to Cloudflare IPsec, GRE to Cloudflare GRE, Connector to Cloudflare One, Firewall to Cloudflare Network Firewall, and Monitoring to Network Flow. No action is required.

    We are updating naming related to some of our Networking products to better clarify their place in the Zero Trust and Secure Access Service Edge (SASE) journey.
    We are retiring some older brand names in favor of names that describe exactly what the products do within your network. We are doing this to help customers build better, clearer mental models for comprehensive SASE architecture delivered on Cloudflare.

    What's changing

    • Magic WAN → Cloudflare WAN
    • Magic WAN IPsec → Cloudflare IPsec
    • Magic WAN GRE → Cloudflare GRE
    • Magic WAN Connector → Cloudflare One Appliance
    • Magic Firewall → Cloudflare Network Firewall
    • Magic Network Monitoring → Network Flow

    No action is required by you — all functionality, existing configurations, and billing will remain exactly the same.

    For more information, visit the Cloudflare One documentation.

    Original source Report a problem
  • Feb 2, 2026
    • Date parsed from source:
      Feb 2, 2026
    • First seen by Releasebot:
      Feb 11, 2026

    Cloudflare One by Cloudflare

    Email security - Improved Accessibility and Search for Monitoring

    Monitoring page gets a polished upgrade with better visualization, accessibility, and actionable UI. Added widget search across Policies, Submitters, and Impersonation; clearer loading, empty, and error states; granular views for dispositions, malicious emails, link actions, and impersonations. Applies to all Email Security packages.

    Monitoring page update

    We have updated the Monitoring page to provide a more streamlined and insightful experience for administrators, improving both data visualization and dashboard accessibility.

    Enhanced Visual Layout: Optimized contrast and the introduction of stacked bar charts for clearer data visualization and trend analysis.

    Improved Accessibility & Usability:
    Widget Search: Added search functionality to multiple widgets, including Policies, Submitters, and Impersonation.
    Actionable UI: All available actions are now accessible via dedicated buttons.
    State Indicators: Improved UI states to clearly communicate loading, empty datasets, and error conditions.
    Granular Data Breakdowns: New views for dispositions by month, malicious email details, link actions, and impersonations.

    This applies to all Email Security packages:

    • Advantage
    • Enterprise
    • Enterprise + PhishGuard
    Original source Report a problem
  • Jan 30, 2026
    • Date parsed from source:
      Jan 30, 2026
    • First seen by Releasebot:
      Jan 31, 2026

    Cloudflare One by Cloudflare

    BGP over GRE and IPsec tunnels

    Cloudflare adds BGP peering for Magic WAN and Magic Transit via the dashboard (beta), enabling dynamic route exchange over IPsec and GRE on-ramps. Automate subnet management, improve failover, and secure sessions with MD5 while exchanging routes with the Magic routing table.

    Magic WAN and Magic Transit BGP Peering

    Magic WAN and Magic Transit customers can use the Cloudflare dashboard to configure and manage BGP peering between their networks and their Magic routing table when using IPsec and GRE tunnel on-ramps (beta).

    Using BGP peering allows customers to:

    • Automate the process of adding or removing networks and subnets.
    • Take advantage of failure detection and session recovery features.

    With this functionality, customers can:

    • Establish an eBGP session between their devices and the Magic WAN / Magic Transit service when connected via IPsec and GRE tunnel on-ramps.
    • Secure the session by MD5 authentication to prevent misconfigurations.
    • Exchange routes dynamically between their devices and their Magic routing table.

    For configuration details, refer to:

    • Configure BGP routes for Magic WAN
    • Configure BGP routes for Magic Transit
    Original source Report a problem
  • Jan 27, 2026
    • Date parsed from source:
      Jan 27, 2026
    • First seen by Releasebot:
      Jan 29, 2026

    Cloudflare One by Cloudflare

    WARP client for Windows (version 2026.1.89.1)

    New Windows WARP beta client released with feature updates and fixes. Highlights include multi-user improvements, NetBIOS over TCP/IP control (disabled by default), and enhanced certificate posture checks plus improved Cloudflare One reporting.

    A new Beta release for the Windows WARP client is now available on the beta releases downloads page.
    This release contains minor fixes, improvements, and new features.

    Changes and improvements

    • Improvements to multi-user mode. Fixed an issue where when switching from a pre-login registration to a user registration, Mobile Device Management (MDM) configuration association could be lost.
    • Added a new feature to manage NetBIOS over TCP/IP functionality on the Windows client. NetBIOS over TCP/IP on the Windows client is now disabled by default and can be enabled in device profile settings.
    • Fixed an issue causing failure of the local network exclusion feature when configured with a timeout of 0.
    • Improvement for the Windows client certificate posture check to ensure logged results are from checks that run once users log in.
    • Improvement for more accurate reporting of device colocation information in the Cloudflare One dashboard.

    Known issues

    • For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum Windows 11 24H2 KB5062553 or higher for resolution.
    • Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to version 1.429.19.0 or later.
    • DNS resolution may be broken when the following conditions are all true:
      • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
      • A custom DNS server address is configured on the primary network adapter.
      • The custom DNS server address on the primary network adapter is changed while WARP is connected.
        To work around this issue, reconnect the WARP client by toggling off and back on.
    Original source Report a problem
  • Jan 27, 2026
    • Date parsed from source:
      Jan 27, 2026
    • First seen by Releasebot:
      Jan 29, 2026

    Cloudflare One by Cloudflare

    WARP client for macOS (version 2026.1.89.1)

    A new Beta release for the macOS WARP client is now available on the beta releases downloads page.
    This release contains minor fixes and improvements.

    Changes and improvements

    • Fixed an issue causing failure of the local network exclusion feature when configured with a timeout of 0.
    • Improvement for more accurate reporting of device colocation information in the Cloudflare One dashboard.
    Original source Report a problem
  • Jan 27, 2026
    • Date parsed from source:
      Jan 27, 2026
    • First seen by Releasebot:
      Jan 29, 2026

    Cloudflare One by Cloudflare

    Configure Cloudflare source IPs (beta)

    Magic WAN now lets you configure the source IP range used by Cloudflare services when reaching private networks, ensuring symmetric routing and private, secure paths. IPv4 defaults to 100.64.0.0/12 (configurable to any /12); IPv6 uses 2606:4700:cf1:5000::/64 (not configurable). Affected connectors include GRE, IPsec, CNI, WARP, with Cloudflare One Unified Routing required.

    Magic WAN: Configure Cloudflare source IPs

    Magic WAN now allows you to configure the source IP address range used by Cloudflare services (such as Load Balancing, Gateway, and Browser Isolation) when sending traffic to your private networks.

    Previously, traffic to private networks was sourced from public Cloudflare IPs, which may have caused IP conflicts. With this feature, you can now configure a dedicated, non-Internet-routable private IP range to ensure:

    • Symmetric routing over private network connections
    • Proper firewall state preservation
    • Private traffic stays on secure paths

    Key details

    • IPv4: Sourced from 100.64.0.0/12 by default, configurable to any /12 CIDR
    • IPv6: Sourced from 2606:4700:cf1:5000::/64 (not configurable)
    • Affected connectors: GRE, IPsec, CNI, WARP Connector, and WARP Client (Cloudflare Tunnel is not affected)

    Configuring Cloudflare source IPs requires Cloudflare One Unified Routing (beta) and the "Cloudflare One Networks Write" permission.

    For configuration details, refer to Configure Cloudflare source IPs.

    Original source Report a problem
  • Jan 15, 2026
    • Date parsed from source:
      Jan 15, 2026
    • First seen by Releasebot:
      Jan 21, 2026
    • Modified by Releasebot:
      Jan 29, 2026

    Cloudflare One by Cloudflare

    Support for CrowdStrike device scores in User Risk Scoring

    Cloudflare One expands User Risk Scoring with two CrowdStrike driven behaviors that automatically escalate a user’s risk when the device shows low or medium CrowdStrike scores. This enables granular, dynamic security policies tied to endpoint health. It leverages OS signals and sensor configurations for sharper access control.

    Cloudflare One has expanded its User Risk Scoring capabilities by introducing two new behaviors for organizations using the CrowdStrike integration.

    Administrators can now automatically escalate the risk score of a user if their device matches specific CrowdStrike Zero Trust Assessment (ZTA) score ranges. This allows for more granular security policies that respond dynamically to the health of the endpoint.

    New risk behaviors

    The following risk scoring behaviors are now available:

    • CrowdStrike low device score: Automatically increases a user's risk score when the connected device reports a "Low" score from CrowdStrike.
    • CrowdStrike medium device score: Automatically increases a user's risk score when the connected device reports a "Medium" score from CrowdStrike.

    These scores are derived from CrowdStrike device posture attributes, including OS signals and sensor configurations.

    Original source Report a problem
  • Jan 15, 2026
    • Date parsed from source:
      Jan 15, 2026
    • First seen by Releasebot:
      Jan 16, 2026

    Cloudflare One by Cloudflare

    Verify WARP Connector connectivity with a simple ping

    WARP Connector gains direct LAN IP ping after install for fast connectivity validation. Starting with version 2025.10.186.0, it responds to traffic to its LAN IP for immediate visibility into reachability within your private network.

    Connectivity validation for WARP Connector

    We have made it easier to validate connectivity when deploying WARP Connector as part of your software-defined private network.

    You can now ping the WARP Connector host directly on its LAN IP address immediately after installation. This provides a fast, familiar way to confirm that the Connector is online and reachable within your network before testing access to downstream services.

    Starting with version 2025.10.186.0, WARP Connector responds to traffic addressed to its own LAN IP, giving you immediate visibility into Connector reachability.

    Learn more about deploying WARP Connector and building private network connectivity with Cloudflare One.

    Original source Report a problem

Related products