Create a Data Profile with Data Patterns and EDM Datasets
on the DLP App
Create and configure an Enterprise data loss prevention
(DLP) data profile containing a predefined or custom data pattern
and an EDM dataset on the DLP app.
Enterprise data loss prevention (DLP) supports
creation of data profiles that contains at least one predefined
or custom Enterprise DLP data pattern and
at least one EDM dataset pattern.
Data profiles with a data pattern and an EDM dataset can only be created
on the DLP app on the hub and are viewable on Panorama, Prisma Access (Panorama
Managed), Prisma Access (Cloud
Managed), and the DLP app on the hub. Viewing a data profile
created on the DLP app on Panorama requires Panorama plugin for
Enterprise DLP 1.0.4 or later release.
When you create a data
profile using predefined data patterns, be sure to consider the detection types used
by the predefined data patterns because the detection type determines
how Enterprise data loss prevention (DLP) arrives at a verdict for scanned
files. For example, when you create a data profile that includes
three machine learning (ML)-based data patterns and seven regex-based
data patterns, Enterprise DLP will return verdicts based on the
seven regex-based patterns whenever the scanned file exceeds 1MB.
Updating a data profile to
include only data patterns is not allowed if the data profile includes
at least one EDM dataset when it was initially created. However, updating
a data profile that includes only EDM datasets to include EDM datasets
and data patterns is supported.
See Create a Data Profile on the DLP App to create
a data profile containing only predefined or custom data patterns.
- Log in to the DLP app on the hub.If you do not already have access to the DLP app on the hub, see the hub Getting Started Guide. Only Superusers can access the hub.
- Select.Data ProfilesAdd Data ProfileWith EDM or a combination of EDM and Data PatternsYou can also create a new data profile by copying an existing data profile. This allows you to quickly modify an existing data profile with additional match criteria while preserving the original data profile from which the new data profile was copied.Data profiles created by copying an existing data profile are appended withCopy - <name_of_original_data_profile>. This name can be edited as needed.Adding an EDM dataset to a copied data profile is supported only if the original data profile had an EDM dataset to begin with. Adding an EDM dataset to a data profile that does not already have an EDM dataset is not supported.
- Configure the Primary Rule for the data profile.Data pattern match criteria for traffic that you want to allow must be added to the Primary Rule. Data pattern match criteria for traffic that you want to block can be added to either Primary Rule or Secondary Rule.
- Enter a descriptiveData Profile Name.
- For the Primary Rule,Add RuleandAdd Data Pattern.
- Configure the data pattern conditions as needed.
- Select the operator for data pattern.
- Data Pattern—Select a custom or predefined data pattern.
- Occurrences—Specify the occurrences required to trigger a Security policy rule action.
- Confidence—Specify the confidence level required for a Security policy rule action to be taken (Low,Medium, orHigh)
- Add EDM Datasetto define the EDM dataset match criteria using anANDorORoperator to the Primary Rule.See Create a Data Profile with EDM Datasets on the DLP App for more information on configuring EDM dataset match criteria in a data profile.
- Configure the match criteria for a Security policy rule action based on the values in the primary and secondary fields.When you selectAny (OR), the maximumCountsetting is one less than the total number of fields included in thePrimary FieldorSecondary Field.Configure whether an action ifAny (OR)orAll (AND)primary fields are matched and ifAny (OR)orAll (AND)secondary fields are matched.For example, you configure the data profile to scan for at least 20 occurrences that match for All primary fields and Any secondary fields with a match count of 3. When applied to a Security policy rule, an action is taken when a scanned file contains at least 20 matches to all primary field values and any 3 of the secondary field values.
- (Optional)Add Groupto nest additional match criteria for a data pattern or EDM dataset so you can more accurately define your compliance rules.When you clickAdd Group, the new match criteria group is nested under the most recently added data pattern or EDM dataset. You cannot nest a new match criteria group between existing data patterns or EDM datasets. If multiple data patterns or EDM datasets are added, you must remove the data patterns or EDM datasets that follow the data pattern or EDM dataset for which you want to added the nested match criteria. For example, you addedEDM_Dataset1,Data_Pattern2, andEDM_Dataset3to the Primary Rule. If you wanted to added nested match criteria toData_Pattern2, you must first removeEDM_Dataset3from the Primary Rule.You can select the same data pattern or EDM dataset or a different data pattern EDM dataset to more accurately define your compliance rules. Nesting match criteria is supported only when the data profile includes an EDM dataset. Enterprise DLP supports up to 3 level of additional nesting groups for each data pattern or EDM dataset. You can nest additional data patterns or EDM datasets under a data pattern or EDM dataset added to the Primary or Secondary Rule.Nested match criteria support theAND,OR, andNOToperators. Refer to the descriptions above to configure the nested match criteria.
- (Optional) Configure a Secondary Rule.Data pattern match criteria added to the Secondary Rule block all traffic that meet the match criteria for the data patterns by default and cannot be modified. If you want to allow traffic that matches a data pattern match criteria, add it to the Primary Rule.
- Review theData Profile Previewto verify the data profile match criteria.
- Savethe data profile.
- Verify that the data profile you created.
- DLP App on the hub—Log in to the DLP app on the hub as a Superuser and selectData Profilesto view the data profile you created.
- Prisma Access (Cloud Managed)
- Selectand search for the data profile you created.ManageConfigurationSecurity ServicesData Loss Prevention
- Panorama and Prisma Access (Panorama Managed)See Update a Data Filtering Profile on Panorama for more information on which data profile settings are editable on Panorama for a data profile created on Prisma Access (Cloud Managed).
- Selectand navigate to the data profile you created.ObjectsDLPData Filtering Profiles
- (Optional) Edit the data profile Action to block traffic.The Action for a data profile created on the Prisma Access (Cloud Managed) is configured toAlertby default.If the data profile has both Primary and Secondary Patterns, changing the data profile Action on Panorama deletes all Secondary Pattern match criteria.
- Select the data profile created on Prisma Access (Cloud Managed).
- Set the data profile Action toBlocktraffic that matches the data profile match criteria.
- SelectandCommitCommit to PanoramaCommit.
- ClickOK.
- SelectandCommitPush to DevicesEdit Selections.
- SelectDevice GroupsandInclude Device and Network Templates.
- Pushyour configuration changes to your managed firewalls that are leveraging Enterprise DLP.
- Verify that the data profile you created.
- View the data profile you created on the DLP app.
- Prisma Access (Cloud Managed)
- Selectand search for the data profile you created.ManageConfigurationSecurity ServicesData Loss Prevention
- Panorama and Prisma Access (Panorama Managed)See Update a Data Filtering Profile on Panorama for more information on which data profile settings are editable on Panorama for a data profile created on the DLP app on the hub.
- Selectand navigate to the data profile you created.ObjectsDLPData Filtering Profiles
- (Optional) Edit the data profile Action to block traffic.The Action for a data profile created on the DLP app on the hub is configured toAlertby default.If the data profile has both Primary and Secondary Patterns, changing the data profile Action on Panorama deletes all Secondary Pattern match criteria.
- Select the data profile created on the DLP app.
- Set the data profile Action toBlocktraffic that matches the data profile match criteria.
- SelectandCommitCommit to PanoramaCommit.
- ClickOK.
- SelectandCommitPush to DevicesEdit Selections.
- SelectDevice GroupsandInclude Device and Network Templates.
- Pushyour configuration changes to your managed firewalls that are leveraging Enterprise DLP.
- Attach the data profile to a Security policy rule.
- Prisma Access (Cloud Managed)—Modify a DLP Rule on Prisma Access (Cloud Managed).
- Panorama and Prisma Access (Panorama Managed)
- Selectand specify thePoliciesSecurityDevice Group.
- Select the Security policy rule to which you want to add the data profile.
- SelectActionsand set theProfile TypetoProfiles.
- Select theData Filteringprofile you created.
- ClickOK.
- SelectCommitandCommit and Push.
Recommended For You
Recommended Videos
Recommended videos not found.