Enterprise DLP
Setup Prerequisites for Enterprise DLP
Table of Contents
Expand All
|
Collapse All
Enterprise DLP Docs
Setup Prerequisites for Enterprise DLP
Ports, Fully Qualified Domain Names, and IP addressed required to enable Enterprise Data Loss Prevention (E-DLP).
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog Forwarding service IP
addresses to improve performance and expand availability for these services
globally.
You must allow these new service IP addresses on your network
to avoid disruptions for these services. Review the Enterprise DLP
Release Notes for more
information.
| Where Can I Use This? | What Do I Need? |
|---|---|
|
Or any of the following licenses that include the Enterprise DLP license
|
Allow specific secure and functional connections to Enterprise Data Loss Prevention (E-DLP) and
supported services. This is required to successfully send traffic for inspection and
verdict rendering and to utilize the various services for supported platforms.
- Enterprise DLP Inline Inspection—Allow the required ports and FQDNs on your network for supported platforms to successfully forward traffic to Enterprise DLP for inspection and verdict rendering.
- Evidence Storage, Syslog Forwarding, and ICAP Forwarding—Allow access to the region-specific IP addresses to automatically store copies of traffic scanned by Enterprise DLP, forward DLP incidents and audit syslogs to your third-party SIEM, SOAR, or automated ticketing systems, and integrate your existing on-premises third party DLP solutions using ICAP forwarding.Evidence Storage, Syslog Forwarding, and ICAP Forwarding services share the same IP addresses.
- FQDNs for EDM—Allow access to all required FQDNs, and region-specific FQDNs, to create and upload Exact Data Matching (EDM) data sets to region-specific or FedRAMP Enterprise DLP storage buckets.EDM and Data Dictionaries uploads share the same IP addresses.
- FQDNs for Data Dictionaries—Allow access to all required FQDNs, and region-specific FQDNs, to create and upload a data dictionary to region-specific or FedRAMP Enterprise DLP storage buckets.EDM and Data Dictionaries uploads share the same IP addresses.
- End User Coaching—Minimum prerequisite agent, software, and plugin versions to display notifications to your end users in the Access Experience User Interface (UI) when they generate an Enterprise DLP or Endpoint DLP incident. End User Coaching is an agent-based alerting mechanism.
- End User Alerting—Required integrations for Enterprise DLP and Cortex XSOAR to use End User Alerting and grant your team members the ability to self-service temporary exemptions for file uploads that match your Enterprise DLP data profile match criteria. End User Alerting is an agentless alerting mechanism.
- Ports and FQDNs
- Evidence Storage, Syslog Forwarding, and ICAP Forwarding
- FQDNs for EDM
- End User Coaching
- End User Alerting
Prerequisite Ports and FQDNs for Enterprise DLP
Allow access to the following IP addresses and open ports required to successfully
forward traffic to Enterprise Data Loss Prevention (E-DLP).
- Strata Cloud Manager Ports and FQDNsEnterprise DLP stores DLP incident data in regional storage buckets based on DLP incident traffic origin source. You must allow access to all of the listed FQDNs and ports on your network regardless regardless of the region and DLP incident source.The hawkeye.services-edge.paloaltonetworks.com FQDN automatically resolves to the closest Enterprise DLP server to scan forwarded traffic, and to store the traffic contents, evidence, time of scan, and snippets.(Switzerland and Brazil) Enterprise DLP scans forwarded traffic, stores traffic contents evidence, time of scan, and snippets in the respective regions. However, Enterprise DLP stores incident metadata in the region where you deployed your Strata Cloud Manager tenant.Regions
FQDNs Ports AustraliaAPACBrazilCanadaEuropeFranceIndiaJapanSwitzerlandUnited KingdomUnited States of America- http://ocsp.paloaltonetworks.com
- http://crl.paloaltonetworks.com
- http://ocsp.godaddy.com
- http://crl.godaddy.com
TCP 80 - https://api.paloaltonetworks.com
- https://apitrusted.paloaltonetworks.com
- certificatetrusted.paloaltonetworks.com
- certificate.paloaltonetworks.com
- hawkeye.services-edge.paloaltonetworks.com
- dlp.hawkeye.services-edge.paloaltonetworks.com
- ace.hawkeye.services-edge.paloaltonetworks.com
- urlcat.hawkeye.services-edge.paloaltonetworks.com
- enforcer-hawkeye.services-edge.paloaltonetworks.com
TCP 443 - Panorama Country Ports and FQDNsYou must allow access to all of the Enterprise DLP ports and FQDNs Required for All Regions on your network regardless of the region and DLP incident traffic source.Enterprise DLP stores DLP incident data in regional storage buckets based on DLP incident traffic source. You can allow the Default Cloud Content Server FQDN to automatically resolve to the closest Enterprise DLP server to scan forwarded traffic, and to store the file contents, evidence, time of scan, and snippets. Alternatively, you can configure a Regional Cloud Content Server FQDN to forward traffic to a specific Enterprise DLP server and storage bucket.The Cloud Content Server FQDN you allow on your network must be the same as the one you configure in the Cloud Content Settings to successfully forward traffic to Enterprise DLP.(Switzerland and Brazil) You must use the Default Regional Cloud Content Server FQDN. Enterprise DLP stores scans forwarded traffic, stores traffic contents evidence, time of scan, and snippets in the respective regions. However, Enterprise DLP stores incident metadata in the region where you deployed your Strata Cloud Manager tenant.Regions
FQDNs DLP Service Ports Required for All Regions- http://ocsp.paloaltonetworks.com
- http://crl.paloaltonetworks.com
- http://ocsp.godaddy.com
- http://crl.godaddy.com
TCP 80- https://api.paloaltonetworks.com
- https://apitrusted.paloaltonetworks.com
- certificatetrusted.paloaltonetworks.com
- certificate.paloaltonetworks.com
- dlp.hawkeye.services-edge.paloaltonetworks.com
- ace.hawkeye.services-edge.paloaltonetworks.com
- urlcat.hawkeye.services-edge.paloaltonetworks.com
- enforcer-hawkeye.services-edge.paloaltonetworks.com
TCP 443RegionsRegional Cloud Content Server FQDN Port DefaultBrazilSwitzerlandhawkeye.services-edge.paloaltonetworks.comTCP 443APACapac.hawkeye.services-edge.paloaltonetworks.comTCP 443Australiaau.hawkeye.services-edge.paloaltonetworks.comTCP 443Canadaca.hawkeye.services-edge.paloaltonetworks.comTCP 443Europeeu.hawkeye.services-edge.paloaltonetworks.comTCP 443Francefr.hawkeye.services-edge.paloaltonetworks.comTCP 443Indiain.hawkeye.services-edge.paloaltonetworks.comTCP 443Japanjp.hawkeye.services-edge.paloaltonetworks.comTCP 443United Kingdomuk.hawkeye.services-edge.paloaltonetworks.comTCP 443United States of Americaus.hawkeye.services-edge.paloaltonetworks.comTCP 443 - Panorama FedRAMP Ports and FQDNsEnterprise DLP supports FedRAMP Mod and High environments.
FQDNs Ports FedRAMP Impact Level- http://ocsp.paloaltonetworks.com
- http://crl.paloaltonetworks.com
- http://ocsp.godaddy.com
- http://crl.godaddy.com
TCP 80 ModerateHigh- https://api.paloaltonetworks.com
- https://apitrusted.paloaltonetworks.com
- certificatetrusted.paloaltonetworks.com
- certificate.paloaltonetworks.com
- dlp.hawkeye.services-edge.paloaltonetworks.com
- ace.hawkeye.services-edge.paloaltonetworks.com
- urlcat.hawkeye.services-edge.paloaltonetworks.com
- enforcer-hawkeye.services-edge.paloaltonetworks.com
- (Moderate) hawkeye.services-edge.pubsec-cloud.paloaltonetworks.com
- (High) gov-hawkeye.services-edge.paloaltonetworks.com
TCP 443
Setup Prerequisites for Enterprise DLP Evidence Storage, Syslog Forwarding, and ICAP Forwarding
Allow access to the IP addresses required for Enterprise Data Loss Prevention (E-DLP) Evidence
Storage, Syslog Forwarding, and ICAP Forwarding services.
Enterprise Data Loss Prevention (E-DLP) requires you to allow the same region-specific IP addresses on
your network for Evidence Storage, Syslog Forwarding, and ICAP Forwarding. If you have
already allowed these IP addresses for one service, you don't need to allow them again
for the others.
- Evidence Storage—Allow the IP addresses for the region or zone where Enterprise DLP scans traffic to— automatically store inspected files. To download stored files from your evidence storage bucket, you may also need to allow specific user IP addresses. If your organization uses a virtual private network (VPN), you must allow the subnets that can download files from your evidence storage bucket.
- Syslog Forwarding—Allow the IP addresses to forward Enterprise Data Loss Prevention (E-DLP) incident syslogs to your third-party security information and event management (SIEM), Security Orchestration, Automation and Response (SOAR), or other automated ticketing systems. This enables your SOC analysts and incident admins to triage, review, and resolve data security risks in your organization.
- ICAP Forwarding—Allow the IP addresses to integrate your existing on-premises third-party DLP solutions with Enterprise DLP using Internet Content Adaptation Protocol (ICAP). You can configure Enterprise DLP to forward inspected files to your on-premises ICAP server for further inspection while still leveraging the advanced inline ML-based detections that Enterprise DLP offers.
You must allow the Default IP addresses to successfully
connect to Enterprise DLP services. The region-specific IP addresses you need to
allow depend on the region or zone where Enterprise DLP scans traffic.
- Country IP Addresses
Region IP Address Date IntroducedAustralia13.54.198.248April 30, 202252.63.9.15434.87.236.168May 7, 2025Brazil56.124.6.8356.125.134.63November 10, 2025Canada15.222.125.234April 30, 202299.79.19.3334.118.182.133May 7, 2025France15.237.145.165April 30, 202213.36.207.21534.155.50.15May 7, 2025Germany3.123.172.116April 30, 202252.59.186.4235.198.73.41May 7, 2025India15.207.246.3April 30, 20223.108.103.21434.47.134.16May 7, 2025Japan3.115.43.201April 30, 202235.72.148.7735.74.96.3852.68.52.7734.84.142.203May 7, 2025Singapore13.228.151.58April 30, 202252.74.82.7734.142.217.106May 7, 2025Switzerland34.65.89.231June 13, 2025United Kingdom13.43.141.10April 30, 202218.169.44.22835.177.5.452.56.54.90(London, England) 35.197.230.50May 7, 2025(Default) United States of America3.230.176.219April 30, 20223.226.106.17318.190.146.2043.16.224.25334.223.123.7835.164.119.23052.27.148.9554.189.225.13634.135.174.89May 7, 202534.173.206.5234.172.74.25034.48.104.24435.197.73.22734.94.161.16534.66.246.16435.225.238.12435.223.231.16934.58.60.13035.238.28.6234.67.76.48104.154.217.1935.202.179.25334.123.101.142 - (Evidence Storage only) FedRAMP IP AddressesCountryIP AddressFedRAMP Impact LevelDate Introduced
United States 3.31.2.863.31.9.10715.205.197.250ModerateApril 30, 2022
Prerequisite FQDNs for Exact Data Matching (EDM)
Fully Qualified Domain Names (FQDN) required to upload data sets for Exact Data
Matching (EDM).
To ensure General Data Protection Regulation (GDPR) compliance, the EDM CLI app hashes
and encrypts EDM data sets before upload to the Enterprise DLP EDM data set storage
bucket. The EDM CLI app first hashes the data set using the SHA256 hash function when
you initiate an EDM data set upload. The EDM CLI app then encrypts the EDM data set
using AES Symmetric encryption before beginning the EDM data set upload to the Enterprise DLP EDM data set storage bucket. The raw data in your EDM data sets
never leave your organization's network, and Enterprise DLP does not store or have
access to the raw EDM data set data. Enterprise DLP stores only hashed and
encrypted EDM data set data in the EDM data set storage bucket. Review the Enterprise DLP
Privacy Datasheet for more information about
how Enterprise DLP captures, processes, and stores personal information.
You need to allow the following FQDNs on your network to use EDM:
- API Egress—https://api.dlp.paloaltonetworks.comRequired for commercial and FedRAMP users to allow egress access to Enterprise DLP EDM API and allow EDM functionality on your network.
- EDM Client Authorization—https://auth.apps.paloaltonetworks.comRequired for Enterprise DLP to authorize EDM client tokens for commercial and FedRAMP users.
- (FedRAMP High only) FedRAMP High Authorization—https://auth.fed.apps.paloaltonetworks.usRequired by FedRAMP High users to authorize Enterprise DLP EDM functionality on your network.
- EDM Data Set Uploads—The country-specific Public API URL and Storage Bucket FQDNs where you want EDM data sets stored.You must allow both FQDNs to successfully upload hashed and encrypted EDM data sets or a data dictionary to an Enterprise DLP storage bucket.
- Country Storage BucketsFor EDM CLI app 3.5 or earlier, allow the region-specific Public API URL and the Default FQDN.For EDM CLI app 4.0 or later, allow the region-specific Public API URL and FQDN.CountryPublic API URLFQDN for EDM CLI App 3.5 or EarlierFQDN for EDM CLI App 4.0 or Later
United States https://nam-west-oauth.dss.paloaltonetworks.com(Default) https://prod-edm-dataset-bucket.s3.us-west-2.amazonaws.comhttps://prod-edm-dataset-bucket-us-west-2.s3.us-west-2.amazonaws.comAustraliahttps://au-oauth.dss.paloaltonetworks.comNot Supportedhttps://prod-edm-dataset-bucket-ap-southeast-2.s3.ap-southeast-2.amazonaws.comCanadahttps://ca-oauth.dss.paloaltonetworks.comNot Supportedhttps://prod-edm-dataset-bucket-ca-central-1.s3.ca-central-1.amazonaws.comFrancehttps://fr-oauth.dss.paloaltonetworks.comNot Supportedhttps://prod-edm-dataset-bucket-eu-west-3.s3.eu-west-3.amazonaws.comGermanyhttps://emea-oauth.dss.paloaltonetworks.comNot Supportedhttps://prod-edm-dataset-bucket-eu-central-1.s3.eu-central-1.amazonaws.com India https://in-oauth.dss.paloaltonetworks.comNot Supportedhttps://prod-edm-dataset-bucket-ap-south-1.s3.ap-south-1.amazonaws.comJapanhttps://jp-saas-oauth.dss.paloaltonetworks.comNot Supportedhttps://prod-edm-dataset-bucket-ap-northeast-1.s3.ap-northeast-1.amazonaws.comSingaporehttps://apac-oauth.dss.paloaltonetworks.comNot Supportedhttps://prod-edm-dataset-bucket-.ap-southeast-1.s3.ap-southeast-1.amazonaws.comSwitzerlandhttps://sui-oauth.dss.paloaltonetworks.comNot Supportedhttps://prod-edm-dataset-bucket-eu-central-2.s3.eu-central-2.amazonaws.comUnited Kingdomhttps://uk-oauth.dss.paloaltonetworks.comNot Supportedhttps://prod-edm-dataset-bucket-eu-west-2.s3.eu-west-2.amazonaws.com - FedRAMP Storage BucketsCountryPublic API URLFQDN for EDM CLI App 3.5 or Earlier
FQDN for EDM CLI App 4.0 or Later FedRAMP Impact LevelUnited States https://apigov.dlp.pubsec-cloud.paloaltonetworks.comhttps://fm-prod-edm-dataset-bucket.s3.us-gov-west-1.amazonaws.comhttps://fm-prod-edm-dataset-bucket-us-gov-west-1.s3.us-gov-west-1.amazonaws.comModerateUnited States https://api-gov.dlp.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.us-gov-west-1.amazonaws.comhttps://prod-edm-dataset-bucket-us-gov-west-1.s3.us-gov-west-1.amazonaws.comHigh
Setup Prequisites for Enterprise DLP FQDNs for Data Dictionaries
Fully Qualified Domain Names (FQDN) required to upload data dictionaries to Enterprise Data Loss Prevention (E-DLP).
- (FedRAMP High only) FedRAMP High Authorization—https://auth.fed.apps.paloaltonetworks.usRequired by FedRAMP High users to authorize Enterprise DLP functionality on your network.
- Data Dictionary Uploads—The country-specific Public API URL and Storage Bucket FQDNs where you want your data dictionaries stored.You must allow both FQDNs to successfully upload a data dictionary to an Enterprise DLP storage bucket.
- Country Storage BucketsCountryPublic API URLStorage BucketAustraliahttps://au-oauth.dss.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.ap-southeast-2.amazonaws.comCanadahttps://ca-oauth.dss.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.ca-central-1.amazonaws.comFrancehttps://fr-oauth.dss.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.eu-west-3.amazonaws.comGermanyhttps://emea-oauth.dss.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.eu-central-1.amazonaws.com
India https://in-oauth.dss.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.ap-south-1.amazonaws.comJapanhttps://jp-saas-oauth.dss.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.ap-northeast-1.amazonaws.comSingaporehttps://apac-oauth.dss.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.ap-southeast-1.amazonaws.comSwitzerlandhttps://sui-oauth.dss.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.eu-central-2.amazonaws.comUnited Kingdomhttps://uk-oauth.dss.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.eu-west-2.amazonaws.comUnited States https://nam-west-oauth.dss.paloaltonetworks.comhttps://prod-edm-dataset-bucket.s3.us-west-2.amazonaws.com - FedRAMP Storage BucketsCountryPublic API URLStorage BucketFedRAMP Impact Level
United States https://apigov.dlp.pubsec-cloud.paloaltonetworks.comhttps://prod-edm-dataset-bucket.us-gov-west-1.amazonaws.comModerateUnited States https://api-gov.dlp.paloaltonetworks.comhttps://prod-edm-dataset-bucket.us-gov-west-1.amazonaws.comHigh
Setup Prerequisites for Enterprise DLP End User Coaching
Agent and version minimum prerequisites for Enterprise Data Loss Prevention (E-DLP) End User
Coaching to display notifications to your users when they generate DLP incident.
Review GlobalProtect
app, Prisma Access Agent, Prisma Access, and Enterprise DLP plugin documentation for detailed information about minimum and
recommended versions.
- GlobalProtect app Compatibility Matrix
- Prisma Access Agent Prerequisites
- Prisma Access Compatibility Matrix
- Enterprise DLP plugin Compatibility Matrix
- Enterprise DLP (Inline)RequirementGlobalProtect appPrisma Access AgentAgent Version6.2.7 or laterIncident NotificationAutonomous DEM version 5.0.0 or laterConfiguration ManagementStrata Cloud ManagerEndpoint Operating System for Agent Notification
- Windows 10 or later
- macOS 13 or later
- Ubuntu 20.04, 22.04, or 24.04
- Red Hat Enterprise Linux (RHEL) 8.9, 9.1, 9.3 or later
- Windows 10 version 2004 or later
- macOS 14 (Sonoma) or later
Prisma Access Version5.1 (Preferred or Innovation) or laterPrisma Access Dataplane Version- PAN-OS 10.2.10-h19
- PAN-OS 10.2.17 or later
- PAN-OS 11.1.0 or later release
- PAN-OS 11.2.6 or later
- PAN-OS 10.2.10-h19
- PAN-OS 10.2.17 or later 10.2 release
- PAN-OS 11.2.6 or later
Enterprise DLP Plugin VersionEnterprise DLP plugin 3.0.10 or later - Endpoint DLPRequirementPrisma Access AgentAgent VersionIncident NotificationAutonomous DEM version 5.3.4 or laterConfiguration ManagementStrata Cloud ManagerEndpoint Operating System for Agent Notification
- Windows 10 version 2004 or later
- macOS 14 (Sonoma) or later
Prisma Access Version5.1 (Preferred or Innovation) or laterPrisma Access Dataplane Version- PAN-OS 10.2.10-h19
- PAN-OS 10.2.17 or later 10.2 version
- PAN-OS 11.2.6 or later
Prerequisites for Enterprise DLP End User Alerting with Cortex XSOAR
The integrated platforms, supported applications, and configuration prerequisites
required to use the Enterprise Data Loss Prevention (E-DLP) End User Alerting with Cortex XSOAR.
Review the Palo Alto Networks product portfolio integration, supported application, and
configuration prerequisites required to use Enterprise Data Loss Prevention (E-DLP) End User Alerting
with Cortex XSOAR.
| Requirements | Panorama (Palo Alto Networks Next-Generation Firewalls) | Prisma Access (Managed by Panorama) | Strata Cloud Manager |
|---|---|---|---|
PAN-OS Release |
| N/A | |
Palo Alto Networks Product Portfolio Integration | Cortex XSOAR | ||
Supported Applications | Slack, Microsoft Teams, Email | ||
IP Mapping to Email Addresses | |||