Create Microsoft Exchange Transport Rules
Focus
Focus
Enterprise DLP

Create Microsoft Exchange Transport Rules

Table of Contents

Create Microsoft Exchange Transport Rules

Create Microsoft Exchange transports rule to forward emails to
Enterprise Data Loss Prevention (E-DLP)
for inspection, and to specify what actions Microsoft Exchange takes based on the
Enterprise DLP
verdicts.
Where Can I Use This?
What Do I Need?
  • SaaS Security
  • Enterprise Data Loss Prevention (E-DLP)
    license
  • SaaS Security
    license
    Or
  • Any of the following licenses
    • Prisma Access
      CASB license
    • Next-Generation CASB for Prisma Access and NGFW (CASB-X)
      license
    • Data Security
      license
Create Microsoft Exchange email transport rules to forward emails from Microsoft Exchange to the
Enterprise Data Loss Prevention (E-DLP)
cloud service for inspection to prevent exfiltration of sensitive data. Additionally, you must create transport rules to specify the actions Microsoft Exchange takes based on the verdicts rendered by
Enterprise DLP
. The following transport rules are required:
  • Email Transport
    Required to forward all outbound emails from Microsoft Exchange to the
    Enterprise Data Loss Prevention (E-DLP)
    cloud service for inline email inspection and verdict rendering. The email transport rule is required in all cases regardless of the verdict
    Enterprise DLP
    renders.
    Enterprise DLP
    adds
    x-panw-inspected: true
    to the email header for all inspected emails. If an outbound email already includes this header, it will not be forwarded to
    Enterprise DLP
    again. Instead, Microsoft Exchange will take the action specified in the hosted quarantine, admin approval, manager approval, encrypt, or block transport rules based on the verdict already rendered by
    Enterprise DLP
    .
  • Hosted Quarantine
    Instructs Microsoft Exchange to quarantine and forward the email to the spam quarantine mailbox hosted by Microsoft Exchange when
    Enterprise Data Loss Prevention (E-DLP)
    cloud service returns a
    Quarantine
    verdict for an email that contains sensitive data.
    Enterprise DLP
    adds
    x-panw-action: quarantine
    to the email header for inspected emails. The email is transported back to Microsoft Exchange and forwarded to the hosted quarantine spam inbox so an email administrator can review the email contents and decide whether to approve or block the email. Any future emails with this header already included will not be forwarded to
    Enterprise DLP
    again. Instead, Microsoft Exchange will take the action specified in the quarantine transport rule.
  • Admin Approval
    Instructs Microsoft Exchange to forward the email to the specified email administrator when
    Enterprise Data Loss Prevention (E-DLP)
    cloud service returns a
    Forward email for approval admin
    verdict for an email that contains sensitive data.
    Enterprise DLP
    adds
    x-panw-action: fwd_to_admin
    to the email header for inspected emails. The email is transported back to Microsoft Exchange so an email administrator can review the email contents and decide whether to approve or block the email. Any future emails with this header already included will not be forwarded to
    Enterprise DLP
    again. Instead, Microsoft Exchange will take the action specified in the transport rule.
  • Manager Approval
    Instructs Microsoft Exchange to forward the email to the sender's manager when
    Enterprise Data Loss Prevention (E-DLP)
    cloud service returns a
    Forward email for approval by end user's manager
    verdict for an email that contains sensitive data.
    Enterprise DLP
    adds
    x-panw-action: fwd_to_manager
    to the email header for inspected emails. The email is transported back to Microsoft Exchange so a manager can review the email contents and decide whether to approve or block the email. Any future emails with this header already included will not be forwarded to
    Enterprise DLP
    again. Instead, Microsoft Exchange will take the action specified in the transport rule.
  • Encrypt
    Instructs Microsoft Exchange on the action to take when
    Enterprise DLP
    returns a
    Encrypt
    verdict for an email that contains sensitive data.
    Enterprise DLP
    adds
    x-panw-action: encrypt
    to the email header for inspected emails. The email is transported back to Microsoft Exchange and encrypted based on the encryption settings you configure in the transport rule. Any future emails with this header already included will not be forwarded to
    Enterprise DLP
    again. Instead, Microsoft Exchange will take the action specified in the encrypt transport rule.
  • Block
    Instructs Microsoft Exchange on the action to take when
    Enterprise DLP
    returns a
    Block
    verdict for an email that contains sensitive data.
    Enterprise DLP
    adds
    x-panw-action: block
    to the email header for all inspected emails. Any future emails with this header already included will not be forwarded to
    Enterprise DLP
    for inspection. Instead, Microsoft Exchange takes the action specified in the Block transport rule.

Email Transport

Create a Microsoft Exchange email transport rule to forward traffic to the
Enterprise Data Loss Prevention (E-DLP)
cloud service for inline email inspection.
  1. Skip this step if you have already created both the outbound and inbound connectors.
  2. Select
    Mail flow
    Rules
    Add a rule
    Create a new rule
    to create a new email transport rule.
  3. Configure the email transport rule conditions.
    1. Enter a
      Name
      for the email transport rule.
    2. Specify the email recipient.
      This instructs Microsoft Exchange to forward the email to
      Enterprise DLP
      before it leaves your network when the email recipient is outside your organization.
      1. For
        Apply this rule if
        , select
        The recipient
        .
      2. For the recipient, select
        is external/internal
        . When prompted to select the recipient location, select
        Outside the organization
        Click
        Save
        to continue.
    3. Specify Microsoft Exchange Connector you created as the transport target for email inspection.
      1. For
        Do the following
        , select
        redirect the message to
        .
      2. For the transport target, select
        the following connector
        . When prompted, select the outbound connector.
        Click
        Save
        to continue.
    4. Add an exception for emails that exceed the maximum message size supported by
      Enterprise DLP
      .
      Enterprise DLP
      supports inspection of email messages up to 20 MB in size. Larger email messages are not supported and should not be forwarded to
      Enterprise DLP
      .
      1. In the s
        Except If
        field, select
        The message
        .
      2. Select
        size is greater than or equal to
        . When prompted, enter the following maximum-supported message size KB:
        20480
    5. Add an exception for emails that were already inspected by
      Enterprise DLP
      .
      1. In the
        Except if
        condition, click the add symbol ( ) to add a new
        Or
        condition.
      2. Select the
        The message headers
        condition.
      3. For the
        Or
        condition action, select
        matches any of these words
        .
      4. Click
        Enter text
        to set the message header to
        x-panw-inspected
        .
      5. Click
        Enter words
        and enter
        true
        .
        Click
        Add
        and select the word you added. Click
        Save
        to continue.
    6. Click
      Next
      to continue.
  4. Configure the email transport rule settings.
    1. For the
      Rule mode
      , ensure
      Enforce
      is selected.
      This setting is enabled by default when a new transport rule is created.
    2. (
      Optional
      ) Configure the rest of the email transport rule settings as needed.
    3. Click
      Next
      to continue.
    4. Save
      .
  5. Review the email transport rule configuration and click
    Finish.
    Click
    Done
    when prompted that the email transport rule was successfully created. You are redirected back to the Microsoft Exchange Rules page.
  6. Modify the email transport rule priority as needed.
    To change the priority of a transport rule, select the transport rule and
    Move Up
    or
    Move Down
    as needed.
    A proper rule hierarchy is recommended to ensure emails successfully forward to
    Enterprise DLP
    .
    • The email transport rule should always be the highest priority rule relative to the other transport rules required for Email DLP.
    • Any email encryption rules not created as part of the email DLP configuration must be ordered below the transport rules created for Email DLP.
      Enterprise DLP
      cannot inspect encrypted emails.
    • There is no impact in regards to priority between the quarantine transport rules, block transport rule, encrypt transport rule, or any other transport rules that exist.
      After
      Enterprise DLP
      inspects and returns the email back to Microsoft Exchange, the appropriate transport rule action will occur based on the email header.

Hosted Quarantine

Create a Microsoft Exchange Quarantine transport rule to quarantine and forward a quarantined email to Microsoft Exchange hosted quarantine for approval after inspection by
Enterprise Data Loss Prevention (E-DLP)
.
Microsoft supports email approvals on the web browser-based Microsoft Exchange only. Approving or rejecting emails on the Microsoft Exchange mobile application or desktop client is not supported.
  1. Skip this step if you have already created both the outbound and inbound connectors.
  2. Select
    Mail flow
    Rules
    Add a rule
    Create a new rule
    to create a new email transport rule.
  3. Configure the quarantine transport rule conditions.
    1. Enter a
      Name
      for the quarantine transport rule.
    2. Add the quarantine email message header.
      The
      quarantine
      header is added by the DLP cloud service when an email contains sensitive information that needs to be approved by your email administrator.
      1. For
        Apply this rule if
        , select
        The message headers...
        .
      2. Select
        match these text patterns
        .
      3. Click
        Enter Text
        . When promoted, enter the following.
        x-panw-action
        Click
        Save
        to continue.
      4. Click
        Enter words
        . When prompted, enter the following and
        Add
        :
        quarantine
        Select the word you added. Click
        Save
        to continue.
    3. Specify the action Microsoft Exchange takes when an email header includes the quarantine header added by
      Enterprise DLP
      .
      1. For
        Do the following
        , select
        Redirect the message to
        .
      2. Select
        hosted quarantine
        .
    4. Click
      Next
      to continue.
  4. Configure the quarantine transport rule settings.
    1. For the
      Rule mode
      , ensure
      Enforce
      is selected.
      This setting is enabled by default when a new transport rule is created.
    2. (
      Optional
      ) Configure the rest of the quarantine transport rule settings as needed.
    3. Click
      Next
      to continue.
  5. Review the quarantine transport rule configuration and click
    Finish.
    Click
    Done
    when prompted that the quarantine transport rule was successfully created. You are redirected back to the Microsoft Exchange Rules page.
  6. Modify the email transport rule priority as needed.
    To change the priority of a transport rule, select the transport rule and
    Move Up
    or
    Move Down
    as needed.
    A proper rule hierarchy is recommended to ensure emails successfully forward to
    Enterprise DLP
    .
    • The email transport rule should always be the highest priority rule relative to the other transport rules required for Email DLP.
    • Any email encryption rules not created as part of the email DLP configuration must be ordered below the transport rules created for Email DLP.
      Enterprise DLP
      cannot inspect encrypted emails.
    • There is no impact in regards to priority between the quarantine transport rules, block transport rule, encrypt transport rule, or any other transport rules that exist.
      After
      Enterprise DLP
      inspects and returns the email back to Microsoft Exchange, the appropriate transport rule action will occur based on the email header.
  7. An email administrator must review and approve or reject quarantined emails forwarded to the hosted quarantine mailbox.

Admin Approval

Create a Microsoft Exchange transport rule to forward an email to the specified email administrator for approval after inspection by
Enterprise Data Loss Prevention (E-DLP)
.
Microsoft supports email approvals on the web browser-based Microsoft Exchange only. Approving or rejecting emails on the Microsoft Exchange mobile application or desktop client is not supported.
  1. Skip this step if you have already created both the outbound and inbound connectors.
  2. Select
    Mail flow
    Rules
    Add a rule
    Create a new rule
    to create a new email transport rule.
  3. Configure the transport rule conditions.
    1. Enter a
      Name
      for the transport rule.
    2. Add the email message header.
      The
      fwd_to_admin
      email header is added by the DLP cloud service when an email contains sensitive information requiring email administrator approval.
      1. For
        Apply this rule if
        , select
        The message headers...
        .
      2. Select
        match these text patterns
        .
      3. Click
        Enter Text
        . When promoted, enter the following.
        x-panw-action
        Click
        Save
        to continue.
      4. Click
        Enter words
        . When prompted, enter the following and
        Add
        :
        fwd_to_admin
        Select the word you added. Click
        Save
        to continue.
    3. Specify the action Microsoft Exchange takes when an email header includes the header added by
      Enterprise DLP
      .
      1. For
        Do the following
        , select
        Forward the message for approval
        .
      2. Select
        to these people
        .
    4. Click
      Next
      to continue.
  4. Configure the transport rule settings.
    1. For the
      Rule mode
      , ensure
      Enforce
      is selected.
      This setting is enabled by default when a new transport rule is created.
    2. (
      Optional
      ) Configure the rest of the transport rule settings as needed.
    3. Click
      Next
      to continue.
  5. Review the transport rule configuration and click
    Finish.
    Click
    Done
    when prompted that the transport rule was successfully created. You are redirected back to the Microsoft Exchange Rules page.
  6. Modify the transport rule priority as needed.
    To change the priority of a transport rule, select the transport rule and
    Move Up
    or
    Move Down
    as needed.
    A proper rule hierarchy is recommended to ensure emails successfully forward to
    Enterprise DLP
    .
    • The email transport rule should always be the highest priority rule relative to the other transport rules required for Email DLP.
    • Any email encryption rules not created as part of the email DLP configuration must be ordered below the transport rules created for Email DLP.
      Enterprise DLP
      cannot inspect encrypted emails.
    • There is no impact in regards to priority between the quarantine transport rules, block transport rule, encrypt transport rule, or any other transport rules that exist.
      After
      Enterprise DLP
      inspects and returns the email back to Microsoft Exchange, the appropriate transport rule action will occur based on the email header.

Manager Approval

Create a Microsoft Exchange email transport rule to forward an email to the sender's manager for approval after inspection by
Enterprise Data Loss Prevention (E-DLP)
.
Microsoft Exchange Active Directory is required to assign a manager to a user. To successfully send an email for manager approval if sensitive data is detected by
Enterprise DLP
, the sender must have a manager assigned.
If no manager is assigned to the sender, then the email is sent to the recipient because no manager is assigned to approve or reject the email.
Additionally, Microsoft supports email approvals on the web browser-based Microsoft Exchange only. Approving or rejecting emails on the Microsoft Exchange mobile application or desktop client is not supported.
  1. Skip this step if you have already created both the outbound and inbound connectors.
  2. Select
    Mail flow
    Rules
    Add a rule
    Create a new rule
    to create a new email transport rule.
  3. Configure the transport rule conditions.
    1. Enter a
      Name
      for the transport rule.
    2. Add the email message header.
      The
      fw_to_manager
      header is added by the DLP cloud service when an email contains sensitive information requiring manager approval.
      1. For
        Apply this rule if
        , select
        The message headers...
        .
      2. Select
        match these text patterns
        .
      3. Click
        Enter Text
        . When promoted, enter the following.
        x-panw-action
        Click
        Save
        to continue.
      4. Click
        Enter words
        . When prompted, enter the following and
        Add
        :
        fwd_to_manager
        Select the word you added. Click
        Save
        to continue.
    3. Specify the action Microsoft Exchange takes when an email header includes the header added by
      Enterprise DLP
      .
      Microsoft Exchange Active Directory is required to assign a manager to a user. To successfully forward a sender's email if sensitive data is detected by
      Enterprise DLP
      , a user must have a manager assigned.
      If no manager is assigned to a user, then the email is sent to the recipient because no manager is assigned to approve or reject the email.
      1. For
        Do the following
        , select
        Forward the message for approval
        .
      2. Select
        to the sender's manager
        .
    4. Click
      Next
      to continue.
  4. Configure the transport rule settings.
    1. For the
      Rule mode
      , ensure
      Enforce
      is selected.
      This setting is enabled by default when a new transport rule is created.
    2. (
      Optional
      ) Configure the rest of the transport rule settings as needed.
    3. Click
      Next
      to continue.
  5. Review the transport rule configuration and click
    Finish.
    Click
    Done
    when prompted that the transport rule was successfully created. You are redirected back to the Microsoft Exchange Rules page.
  6. Modify the email transport rule priority as needed.
    To change the priority of a transport rule, select the transport rule and
    Move Up
    or
    Move Down
    as needed.
    A proper rule hierarchy is recommended to ensure emails successfully forward to
    Enterprise DLP
    .
    • The email transport rule should always be the highest priority rule relative to the other transport rules required for Email DLP.
    • Any email encryption rules not created as part of the email DLP configuration must be ordered below the transport rules created for Email DLP.
      Enterprise DLP
      cannot inspect encrypted emails.
    • There is no impact in regards to priority between the quarantine transport rules, block transport rule, encrypt transport rule, or any other transport rules that exist.
      After
      Enterprise DLP
      inspects and returns the email back to Microsoft Exchange, the appropriate transport rule action will occur based on the email header.

Encrypt

Create a Microsoft Exchange Encrypt transport rule to encrypt an outbound email to Microsoft Exchange after inspection by
Enterprise Data Loss Prevention (E-DLP)
.
  1. Skip this step if you have already created both the outbound and inbound connectors.
  2. Select
    Mail flow
    Rules
    Add a rule
    Create a new rule
    to create a new email transport rule.
  3. Configure the encrypt transport rule conditions.
    1. Enter a
      Name
      for the encrypt transport rule.
    2. Add the encrypt email message header.
      The
      encrypt
      header is added by the DLP cloud service when an email contains sensitive information that should be encrypted.
      1. For
        Apply this rule if
        , select
        The message headers...
        .
      2. Select
        match these text patterns
        .
      3. Click
        Enter Text
        . When promoted, enter the following.
        x-panw-action
        Click
        Save
        to continue.
      4. Click
        Enter words
        . When prompted, enter the following and
        Add
        :
        encrypt
        Select the word you added. Click
        Save
        to continue.
    3. Specify the action Microsoft Exchange takes when an email header includes the encrypt header added by
      Enterprise DLP
      .
      1. For
        Do the following
        , select
        Modify the message security
        .
      2. Select
        Apply Office 365 Message Encryption and rights protection
        .
      3. Select the RMS template you want to use for outbound email encryption and
        Save
        .
    4. Click
      Next
      to continue.
  4. Configure the encrypt transport rule settings.
    1. For the
      Rule mode
      , ensure
      Enforce
      is selected.
      This setting is enabled by default when a new transport rule is created.
    2. (
      Optional
      ) Configure the rest of the encrypt transport rule settings as needed.
    3. Click
      Next
      to continue.
  5. Review the encrypt transport rule configuration and click
    Finish.
    Click
    Done
    when prompted that the encrypt transport rule was successfully created. You are redirected back to the Microsoft Exchange Rules page.
  6. Modify the email transport rule priority as needed.
    To change the priority of a transport rule, select the transport rule and
    Move Up
    or
    Move Down
    as needed.
    A proper rule hierarchy is recommended to ensure emails successfully forward to
    Enterprise DLP
    .
    • The email transport rule should always be the highest priority rule relative to the other transport rules required for Email DLP.
    • Any email encryption rules not created as part of the email DLP configuration must be ordered below the transport rules created for Email DLP.
      Enterprise DLP
      cannot inspect encrypted emails.
    • There is no impact in regards to priority between the quarantine transport rules, block transport rule, encrypt transport rule, or any other transport rules that exist.
      After
      Enterprise DLP
      inspects and returns the email back to Microsoft Exchange, the appropriate transport rule action will occur based on the email header.

Block

Create a Microsoft Exchange Block transport rule to specify the action Microsoft Exchange takes when an email contains sensitive data and is blocked.
  1. Skip this step if you have already created both the outbound and inbound connectors.
  2. Select
    Mail flow
    Rules
    Add a rule
    Create a new rule
    to create a new email transport rule.
  3. Configure the Block transport rule conditions.
    1. Enter a
      Name
      for the Block transport rule.
    2. Add the Block email message header.
      The Block header is added by the DLP cloud service when an inspected email contains sensitive information that is blocked.
      1. For
        Apply this rule if
        , select
        The message headers...
        .
      2. Select
        includes any of these words
        .
      3. Click
        Enter Text
        . When promoted, enter the following.
        x-panw-action
        Click
        Save
        to continue.
      4. Click
        Enter words
        . When prompted, enter the following and
        Add
        :
        block
        Select the word you added. Click
        Save
        to continue.
    3. Specify the action Microsoft Exchange takes when an email header includes the Block header added by
      Enterprise DLP
      .
      1. For
        Do the following
        , select
        Block the message
        .
      2. Select
        reject the message and include an explanation
        . When prompted, enter the explanation for why the email was blocked.
        This is the response members of your organization receive when an outbound email is blocked.
        Click
        Save
        to continue.
    4. Click
      Next
      to continue.
  4. Configure the Block transport rule settings.
    1. For the
      Rule mode
      , ensure
      Enforce
      is selected.
      This setting is enabled by default when a new transport rule is created.
    2. (
      Optional
      ) Configure the rest of the Block transport rule settings as needed.
    3. Click
      Next
      to continue.
    4. Save
      .
  5. Review the Block transport rule configuration and click
    Finish.
    Click
    Done
    when prompted that the Block transport rule was successfully created. You are redirected back to the Microsoft Exchange Rules page.
  6. Modify the email transport rule priority as needed.
    To change the priority of a transport rule, select the transport rule and
    Move Up
    or
    Move Down
    as needed.
    A proper rule hierarchy is recommended to ensure emails successfully forward to
    Enterprise DLP
    for inspection.
    • The email transport rule should always be the highest priority rule relative to the other transport rules required for
      Enterprise DLP
      inspection.
    • Any email encryption rules not created as part of the email DLP configuration must be ordered below the transport rules created for
      Enterprise DLP
      inspection.
      Enterprise DLP
      cannot inspect encrypted emails.
    • There is no impact in regards to priority between the quarantine transport rules, block transport rule, encrypt transport rule, or any other transport rules that exist.
      After
      Enterprise DLP
      inspects and returns the email back to Microsoft Exchange, the appropriate transport rule action will occur based on the email header.

Recommended For You