Strata Cloud Manager
Focus
Focus
Enterprise DLP

Strata Cloud Manager

Table of Contents


Strata Cloud Manager

Enable
Enterprise Data Loss Prevention (E-DLP)
for
Prisma Access (Managed by Strata Cloud Manager)
and
SaaS Security
on
Strata Cloud Manager
.
  1. Enable
    Enterprise DLP
    .
  2. Log in to
    Strata Cloud Manager
    .
  3. Verify that the DLP license is active.
    1. Select
      Manage
      Configuration
      NGFW and Prisma Access
      Overview
      and navigate to the Licenses widget.
    2. Click the license Quantity and confirm that the Data Loss Prevention license is active.
      Confirm the Data Loss Prevention license Type displays
      PAID
      and that an expiration date is displayed.
    3. Select
      Manage
      Configuration
      and verify that
      Data Loss Prevention
      is displayed.
  4. Create the decryption profile required for
    Enterprise DLP
    to inspect traffic.
    1. Select
      Manage
      Configuration
      NGFW and Prisma Access
      Security Services
      Decryption
      and
      Add Profile
      .
    2. Enter a descriptive
      Name
      for the decryption profile.
    3. Review the predefined decryption profile settings.
      The predefined decryption profile settings enable
      Enterprise DLP
      to inspect traffic. Modifying the predefined decryption profile settings isn’t required unless you need to enable
      Strip ALPN
      .
    4. (
      Software Version 10.2.2 or earlier versions
      ) Configure the decryption profile to remove Application-Layer Protocol Negotiation (ALPN) headers from uploaded files.
      Remove the ALPN headers from files if any
      Strata Cloud Manager
      deployment is running software version 10.2.2 or earlier version. If your entire
      Strata Cloud Manager
      deployment is running software version 10.2.3 or later version, stripping ALPN headers isn’t required.
      A web security admin can also strip ALPN headers in the Web Security decryption settings(
      Manage
      Web Security
      Security Settings
      Decryption
      and edit the Action Options). Web Security admins don’t need to create a decryption policy rule and can push the setting to Remote Networks and Mobile Users.
      1. In the SSL Forward Proxy, click
        Advanced.
      2. Check (enable)
        Strip ALPN
        and
        Save
        .
    5. Save
      the Decryption profile group.
  5. Create a decryption policy rule to decrypt traffic for
    Enterprise DLP
    inspection.
    Cloud Management
    includes the predefined
    Exclude Microsoft O365 Optimized Endpoints - IPs
    and
    Exclude Microsoft O365 Optimized Endpoints - URLs
    decryption rules that exclude Microsoft Office 365 from decryption.
    For
    Enterprise DLP
    to successfully inspect traffic for Microsoft Office 365, you must position this new decryption rule before the predefined decryption exclusion rules. Alternatively, you can
    Disable
    these rules or
    Delete
    them.
    1. Select
      Manage
      Configuration
      NGFW and Prisma Access
      Security Services
      Decryption
      and
      Add Rule
      .
    2. Enter a descriptive
      Name
      and configure the decryption policy rule as needed.
    3. In the Action and Advanced Inspection section, configure the policy rule to
      Decrypt
      traffic that matches this rule.
    4. For the Type, select
      SSL Forward Proxy
      .
    5. Select the Decryption Profile you created to strip ALPN headers.
    6. Save
      the decryption policy rule.
  6. Push your data filtering profile.
    1. Push Config
      and
      Push
      .
    2. Select (enable)
      Remote Networks
      and
      Mobile Users
      .
    3. Push
      .


Recommended For You