Integrate Prisma Access with Microsoft Purview for data loss prevention. Secure
network traffic, detect sensitive data, and enforce policies to prevent data
leaks.
Where Can I Use This?
What Do I Need?
Strata Cloud Manager
Prisma Access license
PAN-OS version 11.2.7-h8
SaaS Agent version 6.1 HF3
Prisma Access integrates with Microsoft Purview Information Protection to
enable sensitive data detection and policy enforcement on network traffic. This
integration leverages Microsoft Purview's data loss prevention (DLP) capabilities to
secure data transmitted through your network, providing context for granular data
protection policies.
Prisma Access inspects and forwards network traffic. Microsoft Purview
Information Protection defines and applies data protection policies, identifies
sensitive data, and provides policy scopes. This integration combines Prisma Access's
network visibility with Purview's data classification engine to prevent data leaks and
enhance your data security.
Core architectural components and interactions include:
Prisma Access captures and inspects network egress traffic from
GlobalProtect.
Microsoft Purview Information Protection serves as the central DLP engine. It
defines data protection policies, identifies sensitive information based on
configured rules, and provides policy scopes. Purview policies apply exclusively
based on Microsoft Entra IDs.
Strata Cloud Manager is used by global administrator to grant admin consent
so that Palo Alto Networks applications can access the tenant's protection scope
policies.
Microsoft Entra ID is the authoritative source for user identities. Purview
policies apply exclusively based on Microsoft Entra IDs, requiring synchronization
for accurate policy enforcement.
The Microsoft Graph API retrieves the Microsoft Entra ID Object ID for each
user based on their user principal name (UPN), a prerequisite for Purview's policy
application.
You can initiate integration setup directly from Strata Cloud Manager. An API
handshake establishes communication with your Microsoft Purview tenant, authorizing the
Prisma Access application registration within your M365 environment and granting Prisma
Access the necessary permissions for accessing Microsoft Purview DLP policies.
Prisma Access establishes an API connection with Microsoft Purview DLP to learn
relevant traffic scopes, including:
FQDNs for applications
User activity types
User identifiers
Prisma Access captures data payloads and metadata for all file and non-file
traffic. This content is forwarded to Microsoft Purview for process content inspection.
Prisma Access synchronizes with Microsoft Entra ID to map user identities. The Microsoft
Graph API obtains the unique Object ID from Microsoft Entra ID for each user based on
their UPN. This ensures accurate application of Purview's policies, which rely on Entra
ID Object IDs.
Prerequisites
Before you enable Microsoft Purview Integration, make sure you have completed the
following prerequisites:
Configure Cloud Identity Engine (CIE) to
allow the CIE to collect data from your Microsoft Entra ID for policy enforcement
and user visibility.