Skip to content
Cloudflare Docs

Common policies

The following policies are commonly used to secure HTTP traffic.

Refer to the HTTP policies page for a comprehensive list of other selectors, operators, and actions.

Block attempts to reach sites by hostname or URL paths. Different approaches may be required based on how a site is organized.

Block all subdomains that use a host.

SelectorOperatorValueAction
Hostmatches regex.*example\.comBlock

Block a section of a site without blocking the entire site. For example, you can block a specific subreddit, such as reddit.com/r/gaming, without blocking reddit.com.

SelectorOperatorValueAction
URLmatches regex/r/gamingBlock

Block content categories which go against your organization's acceptable use policy.

SelectorOperatorValueAction
Content CategoriesinQuestionable Content, Security Risks, Miscellaneous, Adult Themes, GamblingBlock

To minimize the risk of shadow IT, some organizations choose to limit their users' access to certain web-based tools and applications. For example, the following policy blocks known AI tools:

SelectorOperatorValueAction
ApplicationinArtificial IntelligenceBlock

Configure access on a per user or group basis by adding identity-based conditions to your policies.

SelectorOperatorValueLogicAction
ApplicationinSalesforceAndBlock
User Group NamesinContractors

Skip inspection for groups of applications

Section titled “Skip inspection for groups of applications”

Certain client applications, such as Zoom or Apple services, rely on certificate pinning. The TLS decryption performed by Cloudflare Gateway will cause errors when users visit those applications. To avoid this behavior, you must add a Do Not Inspect HTTP policy.

Gateway evaluates Do Not Inspect policies first. We recommend moving your Do Not Inspect policies to the top of the list to reduce confusion.

SelectorOperatorValueAction
ApplicationinDo Not InspectDo Not Inspect

Require devices to have certain software installed or other configuration attributes. For instructions on setting up a device posture check, refer to Enforce device posture.

Perform an OS version check to ensure users are running at least a minimum version.

SelectorOperatorValueAction
Passed Device Posture ChecksinMinimum OS versionAllow

Perform a file check to ensure users have a certain file on their device.

Since the file path will be different for each operating system, you can configure a file check for each system and use the Or logical operator to only require one of the checks to pass.

SelectorOperatorValueLogicAction
Passed Device Posture ChecksinmacOS File CheckOrAllow
Passed Device Posture ChecksinLinux File Check

Require users to re-authenticate after a certain amount of time has elapsed.

If you are using the Browser Isolation add-on, refer to our list of common Isolate policies.

Bypass inspection for self-signed certificates

Section titled “Bypass inspection for self-signed certificates”

When accessing origin servers with certificates not signed by a public certificate authority, you must bypass TLS decryption.

SelectorOperatorValueAction
Domainininternal.example.comDo Not Inspect

Block the upload or download of files based on their type.

SelectorOperatorValueLogicAction
Upload File TypesinMicrosoft Office Word Document (docx)AndBlock
Download File TypesinPDF (pdf)

For more information on supported file types, refer to Download and Upload File Types.

To enable Gateway inspection for Google Drive traffic, you must add a Cloudflare certificate to Google Drive.

Block file downloads from Google Drive.

SelectorOperatorValueLogicAction
ApplicationinGoogle DriveAndBlock
URL Path & Querymatches regex.*(e=download|export).*

Block file uploads from Google Drive.

SelectorOperatorValueLogicAction
ApplicationinGoogle DriveAndBlock
Upload Mime Typematches regex.*And
Hostis notdrivefrontend-pa.clients6.google.com

Block file downloads from Gmail.

SelectorOperatorValueLogicAction
Hostismail-attachment.googleusercontent.comAndBlock
URL Path & Queryis/attachment/u/0