Sensitive data often leaks inadvertently through an app URL when identifiers like
employee IDs or financial details appear in query parameters. If you don't inspect
your app traffic URL, it can persist in browser history or server logs and create
significant compliance risks and unauthorized access points.
With
Enterprise Data Loss Prevention (E-DLP)
URL Inspection, you can now inspect
outbound HTTP traffic for sensitive data. The feature specifically targets HTTP PUT
and POST requests, extracting the full URL path and query parameters to detect
sensitive data embedded directly within the app URL. By evaluating traffic against
custom and predefined regex patterns, data dictionaries, and Exact Data Matching
(EDM) datasets, you can identify and block requests that contain sensitive data.
This granular visibility enables your security administrators to enforce strict data
governance policies, ensuring that critical information does not leave your network
through web requests.