Strata Cloud Manager
Focus
Focus
Enterprise DLP

Strata Cloud Manager

Table of Contents


Strata Cloud Manager

Create an
Enterprise Data Loss Prevention (E-DLP)
data profile on
Strata Cloud Manager
.
  1. Log in to
    Strata Cloud Manager
    .
  2. Edit the Data Filtering Settings on
    Strata Cloud Manager
    to configure the minimum and maximum data size limits and the actions the firewall takes when uploading files or to the DLP cloud service or when inspecting non-file based traffic.
  3. Select
    Manage
    Configuration
    Data Loss Prevention
    Data Profiles
    and
    Add Data Profile
    Classic Data Profile
    .
    You can also create a new data profile by copying an existing data profile. This allows you to quickly modify an existing data profile with additional match criteria while preserving the original data profile from which the new data profile was copied.
    Data profiles created by copying an existing data profile are appended with
    Copy - <name_of_original_data_profile>
    . This name can be edited as needed.
    Adding an EDM data set to a copied data profile is supported only if the original data profile had an EDM data set to begin with. Adding an EDM data set to a data profile that doesn’t already have an EDM data set isn’t supported.
  4. Configure the Primary Rule for the data profile.
    Data pattern match criteria for traffic that you want to allow must be added to the Primary Rule. Data pattern match criteria for traffic that you want to block can be added to either Primary Rule or Secondary Rule.
    1. Enter a descriptive
      Data Profile Name
      .
    2. Add Pattern Group
      and
      Add Data Pattern
      .
    3. Configure the match criteria.
      • Data Pattern
        —Select a custom or predefined data pattern.
      • Occurrence Condition
        —Specify the occurrences condition required to trigger a Security policy rule action.
        • Any
          —Security policy rule action triggered if
          Enterprise DLP
          detects at least one instance of matched traffic.
        • Less than or equal to
          —Security policy rule action triggered if
          Enterprise DLP
          detects instances of matched traffic, with the maximum being the specified
          Count
          .
        • More than or equal to
          —Security policy rule action triggered if
          Enterprise DLP
          detects instances of matched traffic, with a minimum being the specified
          Count
          .
        • Between (inclusive)
          —Security policy rule action triggered if
          Enterprise DLP
          detects any number of instances of matched traffic between the specific
          Count
          range.
      • Count
        —Specify the number of instances of matched traffic required to trigger a Security policy rule action. Range is
        1
        -
        500
        .
        For example, to match a pattern that appears three or more times in a file, select
        More than or equal to
        as the
        Occurrence Condition
        and specify
        3
        as the
        Threshold
        .
      • Confidence
        —Specify the confidence level required for a Security policy rule action to be taken (
        High
        or
        Low
        ).
    4. (
      Optional
      )
      Add Data Pattern
      to add additional data pattern match criteria to the Primary rule.
    5. (
      Optional
      )
      Add Data Pattern Group
      to add additional data pattern conditions using
      AND
      or
      OR
      operators to the Primary Rule.
      Refer to the descriptions above to configure any additional data pattern conditions as needed.
    6. (
      Optional
      ) Configure a Secondary Rule.
      Data pattern match criteria added to the Secondary Rule block all traffic that meets the match criteria for the data pattern conditions. If you want to allow traffic that matches a data pattern match criteria, add it to the Primary Rule.
    7. Review the
      Data Profile Preview
      to verify the data profile match criteria.
    8. Save
      the data profile.
  5. Select
    Manage
    Configuration
    Security Services
    Data Loss Prevention
    and search for the data profile you created to verify it was successfully created.
  6. Attach the data profile to a Security policy rule.


Recommended For You