Cloudflare One Release Notes

Last updated: Feb 11, 2026

  • Feb 2, 2026
    • Date parsed from source:
      Feb 2, 2026
    • First seen by Releasebot:
      Feb 11, 2026

    Cloudflare One by Cloudflare

    Email security - Improved Accessibility and Search for Monitoring

    Monitoring page gets a polished upgrade with better visualization, accessibility, and actionable UI. Added widget search across Policies, Submitters, and Impersonation; clearer loading, empty, and error states; granular views for dispositions, malicious emails, link actions, and impersonations. Applies to all Email Security packages.

    Monitoring page update

    We have updated the Monitoring page to provide a more streamlined and insightful experience for administrators, improving both data visualization and dashboard accessibility.

    Enhanced Visual Layout: Optimized contrast and the introduction of stacked bar charts for clearer data visualization and trend analysis.

    Improved Accessibility & Usability:
    Widget Search: Added search functionality to multiple widgets, including Policies, Submitters, and Impersonation.
    Actionable UI: All available actions are now accessible via dedicated buttons.
    State Indicators: Improved UI states to clearly communicate loading, empty datasets, and error conditions.
    Granular Data Breakdowns: New views for dispositions by month, malicious email details, link actions, and impersonations.

    This applies to all Email Security packages:

    • Advantage
    • Enterprise
    • Enterprise + PhishGuard
    Original source Report a problem
  • Jan 30, 2026
    • Date parsed from source:
      Jan 30, 2026
    • First seen by Releasebot:
      Jan 31, 2026

    Cloudflare One by Cloudflare

    BGP over GRE and IPsec tunnels

    Cloudflare adds BGP peering for Magic WAN and Magic Transit via the dashboard (beta), enabling dynamic route exchange over IPsec and GRE on-ramps. Automate subnet management, improve failover, and secure sessions with MD5 while exchanging routes with the Magic routing table.

    Magic WAN and Magic Transit BGP Peering

    Magic WAN and Magic Transit customers can use the Cloudflare dashboard to configure and manage BGP peering between their networks and their Magic routing table when using IPsec and GRE tunnel on-ramps (beta).

    Using BGP peering allows customers to:

    • Automate the process of adding or removing networks and subnets.
    • Take advantage of failure detection and session recovery features.

    With this functionality, customers can:

    • Establish an eBGP session between their devices and the Magic WAN / Magic Transit service when connected via IPsec and GRE tunnel on-ramps.
    • Secure the session by MD5 authentication to prevent misconfigurations.
    • Exchange routes dynamically between their devices and their Magic routing table.

    For configuration details, refer to:

    • Configure BGP routes for Magic WAN
    • Configure BGP routes for Magic Transit
    Original source Report a problem
  • All of your release notes in one place

    Join Releasebot and get updates from Cloudflare and hundreds of other software products.

  • Jan 27, 2026
    • Date parsed from source:
      Jan 27, 2026
    • First seen by Releasebot:
      Jan 29, 2026

    Cloudflare One by Cloudflare

    WARP client for Windows (version 2026.1.89.1)

    New Windows WARP beta client released with feature updates and fixes. Highlights include multi-user improvements, NetBIOS over TCP/IP control (disabled by default), and enhanced certificate posture checks plus improved Cloudflare One reporting.

    A new Beta release for the Windows WARP client is now available on the beta releases downloads page.
    This release contains minor fixes, improvements, and new features.

    Changes and improvements

    • Improvements to multi-user mode. Fixed an issue where when switching from a pre-login registration to a user registration, Mobile Device Management (MDM) configuration association could be lost.
    • Added a new feature to manage NetBIOS over TCP/IP functionality on the Windows client. NetBIOS over TCP/IP on the Windows client is now disabled by default and can be enabled in device profile settings.
    • Fixed an issue causing failure of the local network exclusion feature when configured with a timeout of 0.
    • Improvement for the Windows client certificate posture check to ensure logged results are from checks that run once users log in.
    • Improvement for more accurate reporting of device colocation information in the Cloudflare One dashboard.

    Known issues

    • For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum Windows 11 24H2 KB5062553 or higher for resolution.
    • Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to version 1.429.19.0 or later.
    • DNS resolution may be broken when the following conditions are all true:
      • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
      • A custom DNS server address is configured on the primary network adapter.
      • The custom DNS server address on the primary network adapter is changed while WARP is connected.
        To work around this issue, reconnect the WARP client by toggling off and back on.
    Original source Report a problem
  • Jan 27, 2026
    • Date parsed from source:
      Jan 27, 2026
    • First seen by Releasebot:
      Jan 29, 2026

    Cloudflare One by Cloudflare

    WARP client for macOS (version 2026.1.89.1)

    A new Beta release for the macOS WARP client is now available on the beta releases downloads page.
    This release contains minor fixes and improvements.

    Changes and improvements

    • Fixed an issue causing failure of the local network exclusion feature when configured with a timeout of 0.
    • Improvement for more accurate reporting of device colocation information in the Cloudflare One dashboard.
    Original source Report a problem
  • Jan 27, 2026
    • Date parsed from source:
      Jan 27, 2026
    • First seen by Releasebot:
      Jan 29, 2026

    Cloudflare One by Cloudflare

    Configure Cloudflare source IPs (beta)

    Magic WAN now lets you configure the source IP range used by Cloudflare services when reaching private networks, ensuring symmetric routing and private, secure paths. IPv4 defaults to 100.64.0.0/12 (configurable to any /12); IPv6 uses 2606:4700:cf1:5000::/64 (not configurable). Affected connectors include GRE, IPsec, CNI, WARP, with Cloudflare One Unified Routing required.

    Magic WAN: Configure Cloudflare source IPs

    Magic WAN now allows you to configure the source IP address range used by Cloudflare services (such as Load Balancing, Gateway, and Browser Isolation) when sending traffic to your private networks.

    Previously, traffic to private networks was sourced from public Cloudflare IPs, which may have caused IP conflicts. With this feature, you can now configure a dedicated, non-Internet-routable private IP range to ensure:

    • Symmetric routing over private network connections
    • Proper firewall state preservation
    • Private traffic stays on secure paths

    Key details

    • IPv4: Sourced from 100.64.0.0/12 by default, configurable to any /12 CIDR
    • IPv6: Sourced from 2606:4700:cf1:5000::/64 (not configurable)
    • Affected connectors: GRE, IPsec, CNI, WARP Connector, and WARP Client (Cloudflare Tunnel is not affected)

    Configuring Cloudflare source IPs requires Cloudflare One Unified Routing (beta) and the "Cloudflare One Networks Write" permission.

    For configuration details, refer to Configure Cloudflare source IPs.

    Original source Report a problem
  • Jan 15, 2026
    • Date parsed from source:
      Jan 15, 2026
    • First seen by Releasebot:
      Jan 21, 2026
    • Modified by Releasebot:
      Jan 29, 2026

    Cloudflare One by Cloudflare

    Support for CrowdStrike device scores in User Risk Scoring

    Cloudflare One expands User Risk Scoring with two CrowdStrike driven behaviors that automatically escalate a user’s risk when the device shows low or medium CrowdStrike scores. This enables granular, dynamic security policies tied to endpoint health. It leverages OS signals and sensor configurations for sharper access control.

    Cloudflare One has expanded its User Risk Scoring capabilities by introducing two new behaviors for organizations using the CrowdStrike integration.

    Administrators can now automatically escalate the risk score of a user if their device matches specific CrowdStrike Zero Trust Assessment (ZTA) score ranges. This allows for more granular security policies that respond dynamically to the health of the endpoint.

    New risk behaviors

    The following risk scoring behaviors are now available:

    • CrowdStrike low device score: Automatically increases a user's risk score when the connected device reports a "Low" score from CrowdStrike.
    • CrowdStrike medium device score: Automatically increases a user's risk score when the connected device reports a "Medium" score from CrowdStrike.

    These scores are derived from CrowdStrike device posture attributes, including OS signals and sensor configurations.

    Original source Report a problem
  • Jan 15, 2026
    • Date parsed from source:
      Jan 15, 2026
    • First seen by Releasebot:
      Jan 16, 2026

    Cloudflare One by Cloudflare

    Verify WARP Connector connectivity with a simple ping

    WARP Connector gains direct LAN IP ping after install for fast connectivity validation. Starting with version 2025.10.186.0, it responds to traffic to its LAN IP for immediate visibility into reachability within your private network.

    Connectivity validation for WARP Connector

    We have made it easier to validate connectivity when deploying WARP Connector as part of your software-defined private network.

    You can now ping the WARP Connector host directly on its LAN IP address immediately after installation. This provides a fast, familiar way to confirm that the Connector is online and reachable within your network before testing access to downstream services.

    Starting with version 2025.10.186.0, WARP Connector responds to traffic addressed to its own LAN IP, giving you immediate visibility into Connector reachability.

    Learn more about deploying WARP Connector and building private network connectivity with Cloudflare One.

    Original source Report a problem
  • Jan 15, 2026
    • Date parsed from source:
      Jan 15, 2026
    • First seen by Releasebot:
      Jan 16, 2026
    • Modified by Releasebot:
      Jan 27, 2026

    Cloudflare One by Cloudflare

    Network Services navigation update

    Cloudflare maps Network Services to solutions in the dashboard for Magic Transit, Magic WAN, and Magic Firewall. A new Overview, renamed top nav, and reorganized configs under Routes, Connectors, and Insights streamline tasks and reflect how services work together.

    The Network Services menu structure in Cloudflare's dashboard has been updated to reflect solutions and capabilities instead of product names. This will make it easier for you to find what you need and better reflects how our services work together.
    Your existing configurations will remain the same, and you will have access to all of the same features and functionality.
    The changes visible in your dashboard may vary based on the products you use. Overall, changes relate to Magic Transit, Magic WAN, and Magic Firewall.

    Summary of changes

    • A new Overview page provides access to the most common tasks across Magic Transit and Magic WAN.
    • Product names have been removed from top-level navigation.
    • Magic Transit and Magic WAN configuration is now organized under Routes and Connectors. For example, you will find IP Prefixes under Routes, and your GRE/IPsec Tunnels under Connectors.
    • Magic Firewall policies are now called Firewall Policies.
    • Magic WAN Connectors and Connector On-Ramps are now referenced in the dashboard as Appliances and Appliance profiles. They can be found under Connectors > Appliances.
    • Network analytics, network health, and real-time analytics are now available under Insights.
    • Packet Captures are found under Insights > Diagnostics.
    • You can manage your Sites from Insights > Network health.
    • You can find Magic Network Monitoring under Insights > Network flow.

    If you would like to provide feedback, complete this form. You can also find these details in the January 7, 2026 email titled [FYI] Upcoming Network Services Dashboard Navigation Update.

    Original source Report a problem
  • Jan 13, 2026
    • Date parsed from source:
      Jan 13, 2026
    • First seen by Releasebot:
      Jan 15, 2026

    Cloudflare One by Cloudflare

    WARP client for Windows (version 2025.10.186.0)

    GA release for Windows WARP client brings new global connectivity control via an external signal, a device posture check for Antivirus, plus fixes like audio/CPU improvements, better proxy support, and IPC reliability.

    A new GA release for the Windows WARP client is now available on the stable releases downloads page.
    This release contains minor fixes, improvements, and new features. New features include the ability to manage WARP client connectivity for all devices in your fleet using an external signal, and a new WARP client device posture check for Antivirus.

    Changes and improvements

    • Added a new feature to manage WARP client connectivity for all devices using an external signal. This feature allows administrators to send a global signal from an on-premises HTTPS endpoint that force disconnects or reconnects all WARP clients in an account based on configuration set on the endpoint.
    • Fixed an issue that caused occasional audio degradation and increased CPU usage on Windows by optimizing route configurations for large domain-based split tunnel rules.
    • The Local Domain Fallback feature has been fixed for devices running WARP client version 2025.4.929.0 and newer. Previously, these devices could experience failures with Local Domain Fallback unless a fallback server was explicitly configured. This configuration is no longer a requirement for the feature to function correctly.
    • Proxy mode now supports transparent HTTP proxying in addition to CONNECT-based proxying.
    • Fixed an issue where sending large messages to the daemon by Inter-Process Communication (IPC) could cause the daemon to fail and result in service interruptions.
    • Added support for a new WARP client device posture check for Antivirus. The check confirms the presence of an antivirus program on a Windows device with the option to check if the antivirus is up to date.

    Known issues

    • For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum Windows 11 24H2 KB5062553 or higher for resolution.
    • Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to version 1.429.19.0 or later.
    • DNS resolution may be broken when the following conditions are all true:
      • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
      • A custom DNS server address is configured on the primary network adapter.
      • The custom DNS server address on the primary network adapter is changed while WARP is connected.
        To work around this issue, reconnect the WARP client by toggling off and back on.
    Original source Report a problem
  • Jan 13, 2026
    • Date parsed from source:
      Jan 13, 2026
    • First seen by Releasebot:
      Jan 15, 2026

    Cloudflare One by Cloudflare

    WARP client for macOS (version 2025.10.186.0)

    GA release for macOS WARP client adds fixes, improvements, and a new centralized connectivity control. Local Domain Fallback is fixed for recent versions; proxy mode now supports transparent HTTP proxying; new external signal lets admins force disconnects or reconnects across all devices.

    A new GA release for the macOS WARP client is now available on the stable releases downloads page.

    This release contains minor fixes, improvements, and new features, including the ability to manage WARP client connectivity for all devices in your fleet using an external signal.

    Changes and improvements

    • The Local Domain Fallback feature has been fixed for devices running WARP client version 2025.4.929.0 and newer. Previously, these devices could experience failures with Local Domain Fallback unless a fallback server was explicitly configured. This configuration is no longer a requirement for the feature to function correctly.
    • Proxy mode now supports transparent HTTP proxying in addition to CONNECT-based proxying.
    • Added a new feature to manage WARP client connectivity for all devices using an external signal. This feature allows administrators to send a global signal from an on-premises HTTPS endpoint that force disconnects or reconnects all WARP clients in an account based on configuration set on the endpoint.
    Original source Report a problem

Related products