Connect Microsoft Exchange and Enterprise DLP
Focus
Focus
Enterprise DLP

Connect Microsoft Exchange and Enterprise DLP

Table of Contents

Connect Microsoft Exchange and
Enterprise DLP

After you create the email transport rules, you must connect Microsoft Exchange and
Enterprise Data Loss Prevention (E-DLP)
to complete onboarding.
Where Can I Use This?
What Do I Need?
  • SaaS Security
  • Enterprise Data Loss Prevention (E-DLP)
    license
  • SaaS Security
    license
    Or
  • Any of the following licenses
    • Prisma Access
      CASB license
    • Next-Generation CASB for Prisma Access and NGFW (CASB-X)
      license
    • Data Security
      license
Connect Microsoft Exchange to
Enterprise Data Loss Prevention (E-DLP)
through
SaaS Security
on
Strata Cloud Manager
to complete the onboarding.
Before you begin connecting Microsoft Exchange to
Enterprise DLP
, ensure that the admin performing the connection has at least
Email Administrator
access for Microsoft Exchange. This is required to allow
Enterprise DLP
API access to Microsoft Exchange.
  1. Contact your email domain provider to update your SFP record to add the required
    Enterprise DLP
    service IP addresses.
    Add the IP addresses for the region where your email domain is hosted. You can update your SFP record with multiple regional IP addresses if you have email domains hosted in multiple regions.
    • APAC
      35.186.151.226
      and
      34.87.43.120
    • E.U
      34.141.90.172
      and
      34.107.47.119
    • U.S
      34.168.197.200
      and
      34.83.143.116
  2. (
    Best Practices
    ) Confirm that Active Directory is properly configured so email senders have a manager to approve or reject quarantined emails.
    Microsoft Exchange Active Directory is required to assign a manager to a sender. You can create a transport rule to quarantine and send the email for approval by the sender's manager. To successfully quarantine a sender's email if sensitive data is detected by
    Enterprise DLP
    , a sender must have a manager assigned.
    If no manager is assigned to a user, then the quarantined email is sent to the recipient because no manager is assigned to approve or reject the email.
  3. Palo Alto Networks recommends configuring evidence storage so you can download emails for investigative analysis when your review Email DLP incidents.
  4. CIE is recommended so you can create targeted Email DLP policies.
  5. Create the Microsoft Exchange connectors and transport rules, and create the Email DLP Policy.
    Palo Alto Networks recommends setting up all connectors, transport rules and Email DLP policies to ensure enforcements begins as soon as you successfully connect Microsoft Exchange Online to
    Enterprise DLP
    .
  6. Log in to
    Strata Cloud Manager
    .
  7. Select
    Manage
    Configuration
    SaaS Security
    Settings
    Apps Onboarding
    .
  8. Search for
    Exchange
    and click
    Microsoft Exchange
    .
  9. In the
    Email DLP Instance
    , click
    Add Instance
    .
  10. In the
    Setup Connectors and Rules
    page, click
    Continue to Next Section
    since you have already configured the outbound connector, inbound connector, and transport rules.
  11. In the
    Configure Smart Host
    page, add the email domains and relay hosts.
    Adding one or more email domains and relay hosts is required to ensure emails inspected by
    Enterprise DLP
    are successfully forwarded back to Microsoft Exchange.
    1. Enter an
      Email Domain
      and its corresponding
      Relay Host
      you obtained in the previous step.
      Obtain Your Microsoft Exchange Domain and Relay Host if you don't have the Microsoft Exchange email domain and relay host immediately available.
    2. (
      Optional
      )
      Add
      any additional email domains and relay hosts as needed.
    3. Connect
      .
  12. Microsoft Exchange is now successfully connected and onboarded.
  13. Configure the Email DLP settings.

Recommended For You