Enterprise DLP
Create a Microsoft Exchange Proofpoint Server Connector
Table of Contents
Create a Microsoft Exchange Proofpoint Server Connector
Create a Microsoft Exchange Connector for your Proofpoint server to forward emails
for encryption after
Enterprise Data Loss Prevention (E-DLP)
inspection and verdict rendering. - Prepare your Proofpoint server to encrypt emails inspected byEnterprise DLP.
- Enable DKIM signing for your Proofpoint server.When enabling DKIM signing, you must also selectEnabled for the domain.Additionally, keep a record of your DKIM public key. This is required when updating your domain host records.
- Contact your email domain provider to update your SPF record.
- Add your Proofpoint IP address to your SPF record.This is required to forward emails to Proofpoint for encryption. Skip this step if you have already updated your SPF record with your Proofpoint IP address.
- Add the DKIM public key to your domain host records.
- SelectandMail flowConnectorsAdd a connectorto launch the Microsoft Exchange Connector wizard.
- Specify the connector source and destination.
- ForConnection from, selectOffice 365.
- ForConnection to, selectPartner organization.A partner can be any third-party cloud service that provides services such as services, such as data protection. In this case, the third-party partner organization is Palo Alto Networks.
- ClickNext.
- Name the Microsoft Exchange connector.
- Enter a descriptiveNamefor the connector.
- (Optional) Enter aDescriptionfor the connector.
- (Best Practices) ForWhat do you want to do after connector is saved?, check (enable)Turn it on.Enable this to automatically turn on the connector after you have finished creating and saved the new Microsoft Exchange connector.
- ClickNext.
- To specify when the connector should be used, selectOnly when I have a transport rule set up that redirects messages to this connectorand clickNext.
- To configure the route settings for your Proofpoint server, check (enable)Route email through these smart hoststo add the Proofpoint server smart host Fully Qualified Domain Name (FQDN) and clickNext.
- Specify the security restrictions for the connector.
- Check (enable)Always use Transport Layer Security (TLS) to secure the connection.This is required to successfully forward emails for inspection. Disabling this setting causes the connector connection to be rejected.
- SelectIssued by a trusted certificate authority (CA).
- ClickNext.
- Add a validation email.A valid email address associated with the email domain used by your organization. This is required to validate connectivity between the Microsoft Exchange Admin Center and the Palo Alto Networks smart host, and that emails can be successfully delivered.
- Add a valid email address for validation.
- Validate.The Microsoft Exchange validation tests take a few minutes to complete.
- Under theTask, verify that theCheck connectivityvalidation test status to theEnterprise DLPFQDN displaysSucceed.
- ClickDone.
- When prompted to confirm whether to proceed without successful validation, clickYes, proceed.
- Review the connector details andCreate Connector.ClickDonewhen prompted that the outbound connector was successfully created.
- Back in the Connectors page, verify the outbound connector is displayed and that theStatusisOn.
- Create the Microsoft Exchange outbound and inbound connectors if not already created.The outbound connector is required to control the flow of emails forwarded from Microsoft Exchange Online toEnterprise DLPfor inline inspection The inbound connector is required to return emails forwarded toEnterprise DLPfor inspection back to Microsoft Exchange.Skip this step if you have already created the outbound and inbound connectors.
- After you successfully created the Microsoft Exchange connectors, you must create Microsoft Exchange transports rule to forward emails to and fromEnterprise DLP, and to specify what actions Microsoft Exchange takes based on theEnterprise DLPverdicts.