View an Enterprise DLP Incident
View the DLP incident for sensitive traffic that matches traffic that matches your
data profiles.
On
May 7, 2025,
Palo Alto Networks is introducing new
Evidence Storage and
Syslog Forwarding service IP
addresses to improve performance and expand availability for these services
globally.
| Where Can I Use This? | What Do I Need? |
- NGFW (Managed by Panorama or Strata Cloud Manager)
- Prisma Access (Managed by Panorama or Strata Cloud Manager)
Prisma Browser
|
Or any of the following licenses that include the Enterprise DLP license
- Prisma Access CASB license
- Next-Generation
CASB for Prisma Access and NGFW (CASB-X) license
- Data Security license
|
Enterprise Data Loss Prevention (E-DLP) generates an incident when traffic matches data pattern match
criteria in your Enterprise DLP data profiles. You can filter and view the incident
details for the detected traffic, such as matched data patterns, the source and
destination of the traffic, the file, and file type. Additionally, the incident displays
the specific data pattern that the traffic matched and the total number of unique and
total occurrences of the data pattern matches.
Data security administrators can view the matched sensitive data in the form of a
snippet. A snippet is evidence or identifiable information associated with a
pattern match. For example, if you specified a data pattern of Credit Card Number, the
managed firewall returns the credit card number of the user as the snippet that was
matched. By default, the enforcement point returns snippets.
Enterprise DLP uses data masking to mask the data in the snippets. By
default, the DLP incident displays the last four digits of the value in cleartext
(partial masking). For example, a DLP incident displays a snippet of a credit card
number as XXXX-XXXX-XXXX-1234. You can also specify the
data to be completely displayed in cleartext or to fully mask the data and hide all
values.
Additionally, you can configure
syslog forwarding for
Enterprise DLP
incidents to your third-party security information and event management (SIEM), Security
Orchestration, and Response (SOAR), or other automated ticketing systems. This enables
your SOC Analysts and Incident admins to effectively triage, review, and resolve data
security risks that occur in your organization.
Strata Cloud Manager—View incidents generated by traffic forwarded to Enterprise DLP by NGFW, Prisma Access tenants, Prisma Browser, Email DLP, and Data Security (SaaS API) on Strata Cloud Manager.
Panorama—View incidents generated by traffic forwarded to Enterprise DLP by NGFW and Prisma Access tenants on Panorama.
Email DLP in SaaS Security—View incidents generated by traffic
forwarded to Enterprise DLP by Email DLP in SaaS Security.
Endpoint DLP—View incidents generated by traffic forwarded to Enterprise DLP for Endpoint DLP on Strata Cloud Manager.
Snippets are available for regular expression (regex)-based patterns only.
View Enterprise DLP Incident Details on Strata Cloud Manager
View the incident details for traffic that matches your Enterprise Data Loss Prevention (E-DLP) data
profiles on Strata Cloud Manager.
Log in to
Strata Cloud Manager.
(
Optional)
Configure syslog forwarding for
Enterprise DLP incidents.
Select .
Filter and group the
Incidents list to narrow down the
DLP incidents you want to investigate.
Scan Date—Enterprise DLP supports
filtering DLP incidents generated in the Past 60
Minutes, Past 3 Hours,
Past 24 Hours, Past 7
Days, Past 30 Days, or
Past 90 Days.
Add Filters—Add additional filters to narrow
down the scope of DLP incidents.
Palo Alto Networks recommends using the
Data
Profile filter. This filter displays all DLP
incidents triggered by a specific
data profile.
For the Regions filter, Enterprise DLP generates incidents in the Region
where the Public Cloud Server is located.
For Prisma Access (Managed by Strata Cloud Manager) and NGFW (Managed by Strata Cloud Manager), Enterprise DLP automatically resolves to the closest Public
Cloud Server to where the inspected traffic originated.
When Palo Alto Networks introduces a new Public Cloud Server,
Enterprise DLP automatically resolve to it if it’s
closer to where the inspected traffic originated.
This might mean that new DLP incidents generated after the
release of a new Public Cloud Server are generated in a
different Region.
Group By—Group the DLP incidents based on the
Incident Assignee,
Source,
Destination,
Asset, or Product
(enforcement channel).
Review the
Incidents list and click the
Incident ID to view the DLP incident
details.
You can also select and assign one or more incidents to a specific data
security administrator to investigate and resolve as part of y our
Enterprise DLP
incident case management process from this list.
Review the Incident Details to review specific incident details.
Make note of the Report ID for the DLP incident if you
have not already done so. Use the Report ID to view additional Traffic log
details regarding the DLP incident.
Review the Matches within Data Profiles to review snippets of matching traffic
and the data patterns that matched the traffic to better understand what
sensitive data
Enterprise DLP detected.
Toggle the Triggered Incidents to display only the
data patterns that contain matched criteria.
Enterprise DLP generates an
audit log when a user
accesses a DLP incident and reviews the associated snippet.
Enterprise DLP displays the proximity keyword and the
corresponding snippet of sensitive data that generated the DLP
incident.
For custom regex data patterns, Enterprise DLP displays only the
first proximity keyword for sensitive data with a High
Confidence match.
(Nested and Granular Data Profiles) Enterprise DLP
displays Triggered by each data profile
containing match criteria in the data profile that inspected traffic
matched against.
When viewing a data pattern, Enterprise DLP displays the total
number of Occurrences as well as the
number of Unique Occurrences for all
High, Medium, and Low Confidence detections.
(File Property data pattern) File size of the file that
generated the DLP incident.
(
EDM data sets)
Enterprise DLP displays the column
header of the
EDM data set
that matches the detected sensitive data.
Enterprise DLP
displays multiple column headers when sensitive data is detected in
multiple different columns.
Click
Report False Positive if
Enterprise DLP incorrectly detected and took action on the file
or network traffic that it should not have. This is referred to as a
false positive detection.
Report a false positive detection to
Palo Alto Networks to improve
Enterprise DLP detection accuracy for yourself and other
Enterprise DLP users.
General Example
EDM Data Set Example
Review the file log to learn about the traffic data for the DLP incident.
Select .
From the Firewall drop-down, select
File.
Filter to view the file log for the DLP incident using the Report
ID.
Review the file log to learn more about the traffic data for the DLP
incident.
Manage your
Enterprise DLP incidents.
Panorama
View the log details for traffic that matches your data profiles on firewalls that
are using Enterprise Data Loss Prevention (E-DLP) on the Panorama® management server.
Log in to the
Panorama web
interface.
(
Optional)
Configure syslog forwarding for
Enterprise DLP incidents.
Select and
Filter the data filtering logs by
entering
( subtype eq dlp ).
View more details about the file including file snippets.
Click
to the left of the specific log entry for which you want to view more
details.
Select
DLP to view the pattern details.
Show Snippet to view a snippet of the data that
matched the specific data pattern.
For
nested data profiles,
Enterprise DLP displays the name of the nested data profile
and not the specific data profile containing the match criteria
that matched inspected traffic. For example, you create a nested
data profile called
DataProfile and
you add
Profile1,
Profile2, and
Profile3.
Enterprise DLP
inspects traffic that matches
Profile2 and blocks it. In this
scenario, the
Data Profile Name in
the DLP incident logs displays
DataProfile.
Review the masked snippet to understand what sensitive data
Enterprise DLP detected.
Manage your
Enterprise DLP incidents.
View Email DLP Incident Details
View the DLP incident details for traffic that matches your an Email DLP policy rule
on Strata Cloud Manager.
Log in to
Strata Cloud Manager.
Select .
Filter and group the
Incidents list to narrow down the
DLP incidents you want to investigate.
Scan Date—Enterprise DLP supports
filtering DLP incidents generated in the Past 60
Minutes, Past 3 Hours,
Past 24 Hours, Past 7
Days, Past 30 Days, or
Past 90 Days.
Add Filters—Add the
Channels filter and select
Email DLP. Add any additional filters to
narrow down the scope of DLP incidents.
Palo Alto Networks recommends using the
Data
Profile filter. This filter displays all DLP
incidents triggered by a specific
data profile.
For the Regions filter, Enterprise DLP generates incidents in the Region
where the Public Cloud Server is located.
When Palo Alto Networks introduces a new Public Cloud Server,
Enterprise DLP automatically resolve to it if it’s
closer to where the inspected traffic originated.
This might mean that new DLP incidents generated after the
release of a new Public Cloud Server are generated in a
different Region.
Review the
Incidents list and click the
Incident ID to view the DLP incident
details.
You can also select and assign one or more incidents to a specific data
security administrator to investigate and resolve as part of y our
Enterprise DLP
incident case management process from this list.
Review the Incident Details to review specific incident details.
Make note of the Report ID for the DLP incident if you
have not already done so. Use the Report ID to view additional Traffic log
details regarding the DLP incident.
Review the Matches within Data Profiles to review snippets of matching traffic
and the data patterns that matched the traffic to better understand what
sensitive data
Enterprise DLP detected.
Toggle the Triggered Incidents to display only the
data patterns that contain matched criteria.
Enterprise DLP generates an
audit log when a user
accesses a DLP incident and reviews the associated snippet.
Enterprise DLP displays the proximity keyword and the
corresponding snippet of sensitive data that generated the DLP
incident.
For custom regex data patterns, Enterprise DLP displays only the
first proximity keyword for sensitive data with a High
Confidence match.
When viewing a data pattern, Enterprise DLP displays the total
number of Occurrences as well as the
number of Unique Occurrences for all
High, Medium, and Low Confidence detections.
(File Property data pattern) File size of the file that
generated the DLP incident.
(
EDM data sets)
Enterprise DLP displays the column
header of the
EDM data set
that matches the detected sensitive data.
Enterprise DLP
displays multiple column headers when sensitive data is detected in
multiple different columns.
Click
Report False Positive if
Enterprise DLP incorrectly detected and took action on the file
or network traffic that it should not have. This is referred to as a
false positive detection.
Report a false positive detection to
Palo Alto Networks to improve
Enterprise DLP detection accuracy for yourself and other
Enterprise DLP users.
Review the file log to learn about the traffic data for the DLP incident.
Select .
From the Firewall drop-down, select
File.
Filter to view the file log for the DLP incident using the Report
ID.
Review the file log to learn more about the traffic data for the DLP
incident.
Manage your
Enterprise DLP incidents.
View Enterprise DLP Log Details for Endpoint DLP
View the log details for traffic that matches your Enterprise Data Loss Prevention (E-DLP) data
profiles for Endpoint DLP on Strata Cloud Manager.
No data profile or snippet is displayed for a Peripheral Control Endpoint DLP
policy rule. A peripheral control policy rule controls an endpoint device's
access to a peripheral device (block or alert). As a result, no data profile
is required because no traffic inspection occurs.
Multiple DLP Incidents () can be generated for a single file move operation from the
endpoint and peripheral device. Some examples of when this may occur
are:
Extracting the file contents of a compressed file from the endpoint
to a peripheral device.
An application that generates any artifact files when writing to a
peripheral device. For example, the Microsoft BITSAdmin tool
generates multiple .tmp files when
writing to a peripheral device.
To prevent exfiltration of sensitive data, Enterprise DLP inspects every file
associated with the file move operation from the endpoint to the peripheral
device. This ensures that all impacted files are captured in your logs and
analyzed. However, this may result in the creation of unnecessary DLP
Incidents.
Log in to
Strata Cloud Manager.
(
Optional)
Configure syslog forwarding for
Enterprise DLP incidents.
Select .
Select a
Scan Date and
Region to
filter the DLP incidents.
Enterprise DLP Incidents are generated in the
Region where the Public Cloud Server is located.
For Prisma Access (Managed by Strata Cloud Manager) and NGFW (Managed by Strata Cloud Manager), Enterprise DLP
automatically resolves to the closest Public Cloud Server to where the
inspected traffic originated.
When a new Public Cloud Server is introduced, Enterprise DLP
automatically resolve to it if it’s closer to where the inspected
traffic originated.
This might mean that new DLP Incidents generated after the release of a
new Public Cloud Server are generated in a different
Region.
Add Filter and select the
Action
to filter for the specific
Endpoint DLP policy rule
action you want to investigate.
For example, select only Block if you wanted to
investigate all Endpoint DLP incidents where access to a peripheral device
or file movement from the endpoint to the peripheral device was blocked.
Review the
Incidents and click the
Incident
ID to review detailed information for a specific incident.
Review the Incident Details to review specific incident details.
Make note of the Report ID for the DLP incident if you
have not already done so. Use the Report ID to view additional Traffic log
details regarding the DLP incident.
(
Data in Motion only) Review the Matches within Data Profiles to
review snippets of matching traffic and the data patterns that matched the
traffic to better understand what sensitive data
Enterprise DLP
detected.
Toggle the Triggered Incidents to display only the
data patterns that contain matched criteria.
Enterprise DLP generates an
audit log when a user
accesses a DLP incident and reviews the associated snippet.
Enterprise DLP displays the proximity keyword and the
corresponding snippet of sensitive data that generated the DLP
incident.
Enterprise DLP displays proximity keywords for sensitive data
detected in unstructured data only. Enterprise DLP does not
support displaying proximity keywords for sensitive data detected in
structured content.
For custom regex data patterns, Enterprise DLP displays only the
first proximity keyword for sensitive data with a High
Confidence match.
(Nested and Granular Data Profiles) Enterprise DLP
displays Triggered by each data profile
containing match criteria in the data profile that inspected traffic
matched against.
When viewing a data pattern, Enterprise DLP displays the total
number of Occurrences as well as the
number of Unique Occurrences for all
High, Medium, and Low Confidence detections.
(File Property data pattern) File size of the file that
generated the DLP incident.
(
EDM data sets)
Enterprise DLP displays the column
header of the
EDM data set
that matches the detected sensitive data.
Enterprise DLP
displays multiple column headers when sensitive data is detected in
multiple different columns.
Click
Report False Positive if
Enterprise DLP incorrectly detected and took action on the file
or network traffic that it should not have. This is referred to as a
false positive detection.
Report a false positive detection to
Palo Alto Networks to improve
Enterprise DLP detection accuracy for yourself and other
Enterprise DLP users.
General Example
EDM Data Set Example
Review the file log to learn about the traffic data for the DLP incident.
Select .
From the Firewall drop-down, select
File.
Filter to view the file log for the DLP incident using the Report
ID.
Review the file log to learn more about the traffic data for the DLP
incident.
Manage your
Enterprise DLP incidents.