Create Gmail Transport Rules
Focus
Focus
Enterprise DLP

Create Gmail Transport Rules

Table of Contents
Transport rules establish the actions Gmail takes based on the monitor, quarantine, or block verdicts rendered by Enterprise Data Loss Prevention (E-DLP).
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog Forwarding service IP addresses to improve performance and expand availability for these services globally.
You must allow these new service IP addresses on your network to avoid disruptions for these services. Review the Enterprise DLP Release Notes for more information.
Where Can I Use This?What Do I Need?
  • Data Security
  • One of the following licenses that include the Enterprise DLP license
    Review the Supported Platforms for details on the required license for each enforcement point.
    • Prisma Access CASB license
    • Next-Generation CASB for Prisma Access and NGFW (CASB-X) license
    • Data Security license
  • Email DLP license
Transport rules instruct Gmail to forward emails to Enterprise Data Loss Prevention (E-DLP) and establish the actions Gmail takes based on the quarantine,or block verdicts rendered by Enterprise DLP.
Create Gmail transport rules to forward emails from Gmail to the Enterprise DLP cloud service for inspection to prevent exfiltration of sensitive data. Additionally, you must create transport rules to specify the actions Gmail takes based on the verdicts rendered by Enterprise DLP. The following transport rules are required:
    Expand all
    Collapse all
  • Email Transport
  • Quarantine
  • Block
  • Encrypt
A transport rule isn't required for emails that match your Email DLP policy where the action is set to Monitor. In this case, Enterprise DLP adds x-panw-action - monitor to the email header, a DLP incident is created, and the email continues to its intended recipient.
Create a Gmail email transport rule to forward traffic to the Enterprise Data Loss Prevention (E-DLP) cloud service for inline email inspection.
  1. In the Dashboard, select AppsGoogle WorkspaceGmailCompliance.
  2. In the Content compliance section, Add Another Rule.
  3. Configure the email transport rule.
    1. In the Content compliance field, enter a descriptive name for the transport rule.
    2. For the Email messages to affect, select Outbound.
      This instructs Gmail to forward the email to Enterprise DLP before it leaves your network when the email recipient is outside your organization.
    3. Configure email forwarding to Enterprise DLP for emails that have not been inspected.
      1. In the Add experiences that describe the content you want to search for in each message section, select If ALL of the following match the message.
      2. Add a condition to forward emails that haven't been inspected by Enterprise DLP.
        • In the Add setting page, select Advanced content match.
        • For the Location, select Full Headers.
        • For the Match type, select Not contains text.
        • For the Content, enter x-panw-inspected.
        Click Save to continue.
      3. Add a condition to forward emails to Enterprise DLP when the sender is blank or empty.
        • In the Add setting page, select Advanced content match.
        • For the Location, select Any envelope sender.
        • For the Match type, select Not matches regex.
        • For the Regexp, enter ^$.
        Click Save to continue.
      4. Save.
    4. Configure the action Gmail takes for emails that have already been inspected by Enterprise DLP, and the encryption settings.
      1. In the If the above expressions match, do the following section, enable Change Route.
      2. Select the Email DLP Host you created.
      3. For the Encryption (onward delivery only), select Require secure transport (TLS).
    5. Configure the types of Gmail accounts the transport rule affects.
      1. Show Options.
        After you expand the options menu, the button displays Hide Options.
      2. In the Account types to affect section, select Users, Groups, and Unrecognized / Catch-all.
    6. Save.
  4. Verify that the email transport rule was successfully added and that the Status is Enabled.
Create a Gmail quarantine transport rule to quarantine and forward a quarantined email to Gmail hosted quarantine for approval after inspection by Enterprise Data Loss Prevention (E-DLP).
  1. In the Dashboard, select AppsGoogle WorkspaceGmailCompliance.
  2. In the Content compliance section, Add Another Rule.
  3. Configure the quarantine transport rule.
    1. In the Content compliance field, enter a descriptive name for the transport rule.
    2. For the Email messages to affect, select Outbound.
      This instructs Gmail to forward the email to Enterprise DLP before it leaves your network when the email recipient is outside your organization.
    3. Configure email forwarding to Enterprise DLP for emails that have not been inspected.
      1. In the Add experiences that describe the content you want to search for in each message section, select If ANY of the following match the message.
      2. Add.
      3. In the Add setting page, select Advanced content match.
      4. For the Location, select Full Headers.
      5. For the Match type, select Starts with.
      6. For the Content, enter x-panw-action: quarantine.
      7. Save.
    4. Configure the action Gmail takes for emails that need to be quarantined.
      1. In the If the above expressions match, do the following section, select Quarantine message.
      2. In the Move the message to the following quarantine, select the Gmail quarantine inbox you want to forward emails that need to be reviewed by an email administrator.
      3. Enable Notify sender when email is quarantined (onward delivery only).
    5. Configure the types of Gmail accounts the transport rule affects.
      1. Show Options.
        After you expand the options menu, the button displays Hide Options.
      2. In the Account types to affect section, select Users, Groups, and Unrecognized / Catch-all.
    6. Save.
  4. Verify that the email transport rule was successfully added and that the Status is Enabled.
  5. An email administrator must review and allow or reject quarantined emails forwarded to the quarantine mailbox.
    Due to a Gmail limitation, SaaS Security generates two Email DLP logs (ManageConfigurationSaaS SecurityData SecurityLogsEmail DLP Logs) when a quarantined email is allowed. The first Email DLP log describes the initial outbound email blocked by Email DLP. The second Email DLP log describes the allowed outbound email that is sent back to Enterprise DLP to add x-panw-inspected: true and x-panw-action: monitor to the email header before it continues on its path to the intended recipient.
Create a Gmail block transport rule to specify the action Gmail takes when an email contains sensitive data and is blocked.
  1. In the Dashboard, select AppsGoogle WorkspaceGmailCompliance.
  2. In the Content compliance section, Add Another Rule.
  3. Configure the email transport rule.
    1. In the Content compliance field, enter a descriptive name for the transport rule.
    2. For the Email messages to affect, select Outbound.
      This instructs Gmail to forward the email to Enterprise DLP before it leaves your network when the email recipient is outside your organization.
    3. Configure email forwarding to Enterprise DLP for emails that have not been inspected.
      1. In the Add experiences that describe the content you want to search for in each message section, select If ANY of the following match the message.
      2. Add.
      3. In the Add setting page, select Advanced content match.
      4. For the Location, select Full Headers.
      5. For the Match type, select Starts with.
      6. For the Content, enter x-panw-action: block.
      7. Save.
    4. Configure the action Gmail takes for emails that are blocked.
      1. In the If the above expressions match, do the following section, select Reject message.
      2. (Optional) Enter a customized rejection notice when an email is blocked.
    5. Configure the types of Gmail accounts the transport rule affects.
      1. Show Options.
        After you expand the options menu, the button displays Hide Options.
      2. In the Account types to affect section, select Users, Groups, and Unrecognized / Catch-all.
    6. Save.
  4. Verify that the email transport rule was successfully added and that the Status is Enabled.
Create a Gmail encrypt transport rule to specify the action Gmail takes when an email contains sensitive data and needs to be encrypted before being sent to the recipient.
  1. In the Dashboard, select AppsGoogle WorkspaceGmailCompliance.
  2. In the Content compliance section, Add Another Rule.
  3. Configure the email transport rule.
    1. In the Content compliance field, enter a descriptive name for the transport rule.
    2. For the Email messages to affect, select Outbound.
      This instructs Gmail to forward the email to Enterprise DLP before it leaves your network when the email recipient is outside your organization.
    3. Configure email forwarding to Enterprise DLP for emails that have not been inspected.
      1. In the Add experiences that describe the content you want to search for in each message section, select If ANY of the following match the message.
      2. Add.
      3. In the Add setting page, select Advanced content match.
      4. For the Location, select Full Headers.
      5. For the Match type, select Contains text.
      6. For the Content, enter x-panw-action: encrypt.
      7. Save.
    4. Configure the action Gmail takes for encrypted emails.
      1. In the If the above expressions match, do the following section, select Modify message.
      2. For the Subject, select Modify message.
      3. For the Headers, select Add customer headers
      4. Add the custom message header.
        • For the Header key, enter x-proof-pointencryptdesktop.
        • For the Header value, enter encrypt.
        Save to continue.
    5. Configure the route to forward emails to your Proofpoint server for encryption.
      1. In the Route section, select Change route.
      2. Select the Proofpoint server route you created.
    6. Save.
  4. Verify that the email transport rule was successfully added and that the Status is Enabled.