: File Type Include or Exclude List for Data filtering Profiles
Focus
Focus

File Type Include or Exclude List for Data filtering Profiles

Table of Contents

File Type Include or Exclude List for Data filtering Profiles

Create a file type include or exclude list for file-based inspection using Enterprise Data Loss Prevention (E-DLP).
Enterprise Data Loss Prevention (E-DLP) now supports creating a file type include or exclude list for data filtering profiles configured for file-based inspection. This allows you to select one of two modes:
  • Inclusion Mode
    —Allow only specified file types be scanned by Enterprise DLP.
  • Exclusion Mode
    —Allow all supported files to be scanned by Enterprise DLP by default but excluding the file types you specify.
    Exclusion Mode includes True File Type Support and does not rely on file extensions to determine file types.
To create a file type include or exclude list for Enterprise DLP data filtering profiles, the Panorama management server and managed firewalls using Enterprise DLP must be running PAN-OS 11.0.2 or later release. Additionally, the Enterprise DLP plugin must be version 4.0.1 or later.
  1. Select
    Objects
    DLP
    Data Filtering Profiles
    and specify the
    Device Group
    .
  2. When creating the data filtering profile, specify the file types the DLP cloud service takes action against.
    1. Select
      File Types
      .
    2. Select the Scan Type to create a file type include or exclude list.
      • Include
        —DLP cloud service inspects only the file types you add to the File Type Array.
      • Exclude
        —DLP cloud service inspects all supported file types except for those added to the File Type Array.
    3. Click
      Modify
      to add the file types to the File Type Array and click
      OK
      .
  3. Click
    OK
    to save your changes.
  4. Attach the data filtering profile to a Security policy rule.
    1. Select
      Policies
      Security
      and specify the
      Device Group
      .
    2. Select the Security policy rule to which you want to add the data filtering profile.
    3. Select
      Actions
      and set the
      Profile Type
      to
      Profiles
      .
    4. Select the
      Data Filtering
      profile you created previously.
    5. Click
      OK
      .
  5. Commit and push your configuration changes to your managed firewalls that are using Enterprise DLP.
    The
    Commit and Push
    command isn’t recommended for Enterprise DLP configuration changes. Using the
    Commit and Push
    command requires the additional and unnecessary overheard of manually selecting the impacted templates and managed firewalls in the Push Scope Selection.
    1. Select
      Commit
      Commit to Panorama
      and
      Commit
      .
    2. Select
      Commit
      Push to Devices
      and
      Edit Selections
      .
    3. Select
      Device Groups
      and
      Include Device and Network Templates
      .
    4. Click
      OK
      .
    5. Push
      your configuration changes to your managed firewalls that are using Enterprise DLP.

Recommended For You