- Nov 6, 2025
- Parsed from source:Nov 6, 2025
- Detected by Releasebot:Nov 7, 2025
Applications to be remapped to the new categories
New application categories are live to improve content reflection and HTTP traffic management. Remapping of existing apps to the new categories completes by Jan 30, 2026, with guidance to review rules and update policies before the switch. Expect potential traffic changes after the remap.
Applications category remapping and timeline
We have previously added new application categories to better reflect their content and improve HTTP traffic management: refer to Changelog. While the new categories are live now, we want to ensure you have ample time to review and adjust any existing rules you have configured against old categories. The remapping of existing applications into these new categories will be completed by January 30, 2026. This timeline allows you a dedicated period to:
- Review the new category structure.
- Identify any policies you have that target the older categories.
- Adjust your rules to reference the new, more precise categories before the old mappings change. Once the applications have been fully remapped by January 30, 2026, you might observe some changes in the traffic being mitigated or allowed by your existing policies. We encourage you to use the intervening time to prepare for a smooth transition.
Applications being remappedd
[Table of applications and their old and new categories]For more information on creating HTTP policies, refer to Applications and app types.
Original source Report a problem - Oct 28, 2025
- Parsed from source:Oct 28, 2025
- Detected by Releasebot:Oct 28, 2025
Access private hostname applications support all ports/protocols
Cloudflare Access now secures private hostname apps on all ports and protocols, extending Zero Trust to SSH, RDP, and other non-HTTPS services. You can enforce SSO, MFA, device posture, and session controls for any private app. Generally available across plans.
Cloudflare Access for private hostname applications can now secure traffic on all ports and protocols
Cloudflare Access for private hostname applications can now secure traffic on all ports and protocols.
Previously, applying Zero Trust policies to private applications required the application to use HTTPS on port 443 and support Server Name Indicator (SNI).
This update removes that limitation. As long as the application is reachable via a Cloudflare off-ramp, you can now enforce your critical security controls — like single sign-on (SSO), MFA, device posture, and variable session lengths — to any private application. This allows you to extend Zero Trust security to services like SSH, RDP, internal databases, and other non-HTTPS applications.
For example, you can now create a self-hosted application in Access for ssh.testapp.local running on port 22. You can then build a policy that only allows engineers in your organization to connect after they pass an SSO/MFA check and are using a corporate device.
This feature is generally available across all plans.
Original source Report a problem - Oct 28, 2025
- Parsed from source:Oct 28, 2025
- Detected by Releasebot:Oct 29, 2025
New Application Categories added for HTTP Traffic Management
Gateway introduces granular application categories for finer policy control. New categories cover Business, Education, Entertainment & Events, Food & Drink, Health & Fitness, Lifestyle, Navigation, Photography & Graphic Design, and Travel. A transition window until Jan 30, 2026 lets you remap policies.
New, more granular application categories in Gateway
To give you precision and flexibility while creating policies to block unwanted traffic, we are introducing new, more granular application categories in the Gateway product.
We have added the following categories to provide more precise organization and allow for finer-grained policy creation, designed around how users interact with different types of applications:- Business
- Education
- Entertainment & Events
- Food & Drink
- Health & Fitness
- Lifestyle
- Navigation
- Photography & Graphic Design
- Travel
The new categories are live now, but we are providing a transition period for existing applications to be fully remapped to these new categories.
The full remapping will be completed by January 30, 2026.
We encourage you to use this time to:- Review the new category structure.
- Identify and adjust any existing HTTP policies that reference older categories to ensure a smooth transition.
For more information on creating HTTP policies, refer to Applications and app types.
Original source Report a problem - Oct 28, 2025
- Parsed from source:Oct 28, 2025
- Detected by Releasebot:Oct 31, 2025
CASB introduces new granular roles
Cloudflare CASB adds two granular roles for finer access control: CASB Read for view-only access and CASB Admin for full config. Supports least privilege; DLP scans require the Cloudflare Zero Trust role. Roles appear under Manage Account > Members and in API tokens.
New granular roles in Cloudflare CASB
Cloudflare CASB (Cloud Access Security Broker) now supports two new granular roles to provide more precise access control for your security teams:
- Cloudflare CASB Read: Provides read-only access to view CASB findings and dashboards. This role is ideal for security analysts, compliance auditors, or team members who need visibility without modification rights.
- Cloudflare CASB: Provides full administrative access to configure and manage all aspects of the CASB product.
These new roles help you better enforce the principle of least privilege. You can now grant specific members access to CASB security findings without assigning them broader permissions, such as the Super Administrator or Administrator roles.
To enable Data Loss Prevention (DLP), scans in CASB, account members will need the Cloudflare Zero Trust role.
You can find these new roles when inviting members or creating API tokens in the Cloudflare dashboard under Manage Account > Members.
To learn more about managing roles and permissions, refer to the Manage account members and roles documentation.
Original source Report a problem - Oct 20, 2025
- Parsed from source:Oct 20, 2025
- Detected by Releasebot:Oct 28, 2025
Schedule DNS policies from the UI
Admins can create time-based DNS policies straight from the Zero Trust dashboard with presets and custom schedules, including timezone options and duration. This makes time-based policies accessible to all Gateway customers without API access.
Scheduled DNS policies
Admins can now create scheduled DNS policies directly from the Zero Trust dashboard, without using the API. You can configure policies to be active during specific, recurring times, such as blocking social media during business hours or gaming sites on school nights.
Preset Schedules: Use built-in templates for common scenarios like Business Hours, School Days, Weekends, and more.
Custom Schedules: Define your own schedule with specific days and up to three non-overlapping time ranges per day.
Timezone Control: Choose to enforce a schedule in a specific timezone (for example, US Eastern) or based on the local time of each user.
Combined with Duration: Policies can have both a schedule and a duration. If both are set, the duration's expiration takes precedence.
You can see the flow in the demo GIF:
This update makes time-based DNS policies accessible to all Gateway customers, removing the technical barrier of the API.
Original source Report a problem - Oct 17, 2025
- Parsed from source:Oct 17, 2025
- Detected by Releasebot:Oct 28, 2025
On-Demand Security Report
Cloudflare adds on demand security reports in the Email Security dashboard. Get executive summaries actionable insights and clear configuration views to demonstrate value to executives. Available across Advantage, Enterprise and Enterprise + PhishGuard.
New on-demand security reports
You can now generate on-demand security reports directly from the Cloudflare dashboard. This new feature provides a comprehensive overview of your email security posture, making it easier than ever to demonstrate the value of Cloudflare's Email security to executives and other decision makers.
These reports offer several key benefits:
- Executive Summary: Quickly view the performance of Email security with a high-level executive summary.
- Actionable Insights: Dive deep into trend data, breakdowns of threat types, and analysis of top targets to identify and address vulnerabilities.
- Configuration Transparency: Gain a clear view of your policy, submission, and domain configurations to ensure optimal setup.
This feature is available across the following Email security packages:
- Advantage
- Enterprise
- Enterprise + PhishGuard
- Oct 16, 2025
- Parsed from source:Oct 16, 2025
- Detected by Releasebot:Oct 28, 2025
Monitor Groups for Advanced Health Checking With Load Balancing
Cloudflare Load Balancing adds Monitor Groups to combine health checks into a single group for smarter failover. You can mix monitors, isolate for observation, and get holistic latency averages across the group. Available now via API for Enterprise Load Balancing.
Cloudflare Load Balancing now supports Monitor Groups, a powerful new way to combine multiple health monitors into a single, logical group. This allows you to create sophisticated health checks that more accurately reflect the true availability of your applications by assessing multiple services at once.
With Monitor Groups, you can ensure that all critical components of an application are healthy before sending traffic to an origin pool, enabling smarter failover decisions and greater resilience. This feature is now available via the API for customers with an Enterprise Load Balancing subscription.
What you can do:
- Combine Multiple Monitors: Group different health monitors (for example, HTTP, TCP) that check various application components, like a primary API gateway and a specific /login service.
- Isolate Monitors for Observation: Mark a monitor as "monitoring only" to receive alerts and data without it affecting a pool's health status or traffic steering. This is perfect for testing new checks or observing non-critical dependencies.
- Improve Steering Intelligence: Latency for Dynamic Steering is automatically averaged across all active monitors in a group, providing a more holistic view of an origin's performance.
This enhancement is ideal for complex, multi-service applications where the health of one component depends on another. By aggregating health signals, Monitor Groups provide a more accurate and comprehensive assessment of your application's true status.
For detailed information and API configuration guides, please visit our developer documentation for Monitor Groups.
Original source Report a problem - Oct 16, 2025
- Parsed from source:Oct 16, 2025
- Detected by Releasebot:Oct 28, 2025
WARP client for Windows (version 2025.9.173.1)
Cloudflare releases a Windows WARP Beta with PMTUD MTU discovery and dynamic packet sizing, plus a new GUI status message for unstable networks. It improves multi-user state handling, shows tunnel and DNS health, and fixes deletion errors.
A new Beta release for the Windows WARP client is now available on the beta releases downloads page.
Changes and improvements
- Improvements for Windows multi-user to maintain the global WARP override state when switching between users.
- The GUI now displays the health of the tunnel and DNS connections by showing a connection status message when the network may be unstable. This will make it easier to debug connectivity issues.
- Deleting registrations no longer returns an error when succeeding.
- Path Maximum Transmission Unit Discovery (PMTUD) is now used to discover the effective MTU of the connection. This allows the client to improve connection performance optimized for the current network.
Known issues
- For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum Windows 11 24H2 KB5062553 or higher for resolution.
- Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to Route traffic to fallback server.
- Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to version 1.429.19.0 or later.
- DNS resolution may be broken when the following conditions are all true:
- WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
- A custom DNS server address is configured on the primary network adapter.
- The custom DNS server address on the primary network adapter is changed while WARP is connected.
To work around this issue, reconnect the WARP client by toggling off and back on.
- Oct 16, 2025
- Parsed from source:Oct 16, 2025
- Detected by Releasebot:Oct 28, 2025
WARP client for macOS (version 2025.9.173.1)
New macOS WARP beta adds PMTUD MTU discovery and a new GUI network status to help diagnose unstable connections. The update shows tunnel and DNS health, fixes deletion errors, and boosts performance on current networks. Note macOS 15.x issues and fallback server guidance apply.
A new Beta release for the macOS WARP client is now available on the beta releases downloads page.
This release contains minor fixes, improvements, and new features including Path Maximum Transmission Unit Discovery (PMTUD). With PMTUD enabled, the client will dynamically adjust packet sizing to optimize connection performance. There is also a new connection status message in the GUI to inform users that the local network connection may be unstable. This will make it easier to debug connectivity issues.
Changes and improvements
- The GUI now displays the health of the tunnel and DNS connections by showing a connection status message when the network may be unstable. This will make it easier to debug connectivity issues.
- Deleting registrations no longer returns an error when succeeding.
- Path Maximum Transmission Unit Discovery (PMTUD) is now used to discover the effective MTU of the connection. This allows the client to improve connection performance optimized for the current network.
Known issues
- macOS Sequoia: Due to changes Apple introduced in macOS 15.0.x, the WARP client may not behave as expected. Cloudflare recommends the use of macOS 15.4 or later.
- Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to Route traffic to fallback server.
- Oct 10, 2025
- Parsed from source:Oct 10, 2025
- Detected by Releasebot:Oct 28, 2025
- Modified by Releasebot:Nov 7, 2025
New domain categories added
We have added three new domain categories under the Technology parent category, to better reflect online content and improve DNS filtering.
New categories added
[Table of new domain categories]
Refer to Gateway domain categories to learn more.
Original source Report a problem