Enterprise DLP
Modify a DLP Rule on Strata Cloud Manager for a Granular Data Profile
Table of Contents
Expand All
|
Collapse All
Enterprise DLP Docs
Modify a DLP Rule on Strata Cloud Manager for a Granular Data Profile
Modify a granular Enterprise Data Loss Prevention (E-DLP) data profile rule to enforce data security
standards on Strata Cloud Manager.
- Log in to Strata Cloud Manager.Create a Granular Data Profile on Strata Cloud Manager.Select ManageConfigurationData Loss PreventionDLP Rules and in the Actions column, Edit the DLP rule.Enterprise DLP assigns the DLP rule an identical name as the data profile from which it was automatically created. You can't change this name.Define the Basic Information for the granular data profile.
- Select the File Mode to explicitly include or exclude specific file types from Enterprise DLP inspection.
- Include—Enterprise DLP only inspects the selected file types configured in the data profiles added to the granular data profile. All other file types are ignored and not sent to Enterprise DLP for inspection and verdict rendering.
- Exclude—The NGFW or Prisma Access tenant ignores the selected File Types and does not send them Enterprise DLP for inspection and verdict rendering. The NGFW or Prisma Access tenant forwards all other file types to Enterprise DLP.
(Optional) Enter a Description for the DLP Rule.Click Next to continue.Define the granular data profile Match Criteria.Define the match criteria for each data profile added to the granular data profile.- Enable file inspection, non-file inspection, or both.Review the supported file types and apps that support file and non-file based traffic inspection.
- File Based Match Criteria—Forwards file-based traffic to Enterprise DLP.
- Non-File Based Match Criteria—Forwards non-file based traffic to Enterprise DLP.
Select the File Direction you want to inspect.You can select Upload (default), Download, or Both.Select the Action Enterprise DLP takes if inspected traffic contains sensitive data.You can select Alert (default) or Block.Set the Log Severity for the DLP incident when Enterprise DLP detects sensitive data that matches this data profile.You can select Critical, High, Medium, Low, or Informational (default).(File Based Match Criteria only) Select the File Type you want to forward to Enterprise DLP. Click Modify to add one or more supported file types.Add at least one file type to forward to Enterprise DLP. Skip this step if you disabled File Based Match Criteria in the previous step.Click Next to continue.Configure the URL Category and Application Exclusion lists.- (Optional) URL Category List —Exclude forwarding traffic from one or more specific URLs to Enterprise DLP.You can use a predefined URL category or create a custom URL category in the Global Configuration Scope. You can select multiple URL categories to exclude traffic from non-file inspection.
- (Required for Non-File Based Match Criteria) Application List Exclusion—Exclude forwarding traffic from one or more specific apps to Enterprise DLP.Enterprise DLP requires at least one Application Filter if you enable exclusions for non-file based traffic inspection. Palo Alto Networks recommends adding the predefined DLP App Exclusion application filter if you don't have a custom or predefined application filter you want to add. Alternatively, you can create a custom application filter in the Global Configuration Scope. You can select multiple application filters to exclude app traffic from non-file inspection.
Click Next to continue.Review the Summary of the granular data profile.Edit the Basic Information, Match Criteria, or Exclusions to modify the granular data profile configuration if needed.Save the granular data profile if you don’t need to make any further edits.(Best Practices for File Based Inspection) Create a File Blocking profile and create a Block Rule to block the file types you don't explicitly forward to Enterprise DLP.Palo Alto Networks recommends creating this File Blocking profile to ensure sensitive data can't be exfiltrated in file types Enterprise DLP does not support.Create a Shared Profile Group for the Enterprise DLP data filtering profile.- Select ManageConfigurationSecurity ServicesProfile Groups and Add Profile Group.Enter a descriptive Name for the Profile Group.(Best Practices for File Based Inspection) For the File Blocking Profile, select the File Blocking profile you created in the previous step.For the Data Loss Prevention Profile, select the Enterprise DLP data profile.Add any other additional profiles as needed.Save the profile group.Create a Security policy rule and attached the Profile Group.
- Select ManageConfigurationSecurity Policy and Add Rule.You can also update an existing Security policy to attach a Profile Group for Enterprise DLP filtering.Configure the Security policy as needed.Navigate to the Action and Advanced Inspection section, and select the Profile Group you created in the previous step.Save the Security policy.Push Config and push your configuration changes.