Add an Enterprise DLP Email Policy
Table of Contents
Expand all | Collapse all
-
- Register and Activate Enterprise DLP on Prisma Access (Panorama Managed)
- Edit the Enterprise DLP Snippet Settings on the DLP App
- Enable Role Based Access to Enterprise DLP on Strata Cloud Manager
- Enable Optical Character Recognition on Strata Cloud Manager
- Enable Optical Character Recognition for Enterprise DLP
-
-
- Create a Data Profile on the DLP App
- Create a Data Profile with EDM Data Sets on the DLP App
- Create a Data Profile with Data Patterns and EDM Data Sets on the DLP App
- Create a Data Profile with Nested Data Profiles on the DLP App
- Create a Data Profile on Strata Cloud Manager
- Create a Data Profile with EDM Data Sets on Strata Cloud Manager
- Create a Data Profile with Data Patterns and EDM Data Sets on Strata Cloud Manager
- Create a Data Profile with Nested Data Profiles on Strata Cloud Manager
- Create a Data Filtering Profile on Panorama
- Create a Data Filtering Profile on Panorama for Non-File Detection
- Update a Data Profile on the DLP App
- Update a Data Profile on Strata Cloud Manager
- Update a Data Filtering Profile on Panorama
- Enable Existing Data Patterns and Filtering Profiles
-
- How Does Email DLP Work?
- Activate Email DLP
- Add an Enterprise DLP Email Policy
- Review Email DLP Incidents
-
- Monitor DLP Status with the DLP Health and Telemetry App
- View Enterprise DLP Log Details on the DLP App
- Manage Enterprise DLP Incidents on the DLP App
- View Enterprise DLP Audit Logs on the DLP App
- View Enterprise DLP Log Details on Strata Cloud Manager
- Manage Enterprise DLP Incidents on Strata Cloud Manager
- View Enterprise DLP Audit Logs on Strata Cloud Manager
- View Enterprise DLP Log Details on Panorama
Add an Enterprise DLP Email Policy
Add an
Enterprise Data Loss Prevention (E-DLP)
email policy to prevent sensitive data exfiltration
contained in outbound emails.Where Can I Use This? | What Do I Need? |
---|---|
|
|
Add and configure an
Enterprise Data Loss Prevention (E-DLP)
email policy so Enterprise DLP
to
prevent sensitive data exfiltration contained in outbound emails. The DLP email
policy specifies the incident severity and the action Enterprise DLP
takes when
matching traffic is inspected and sensitive data is detected.Enterprise DLP
supports inspection and detection of documents containing
sensitive data that are attached to an email. Enterprise DLP
does not
support inspection of document links.- Log intoStrata Cloud Manager.
- (Optional) Create custom data patterns and data profiles to specify custom match criteria.Skip this step if you want to use the predefinedEnterprise DLPdata profiles available by default.
- SelectandManageConfigurationSaaS SecurityData SecurityPoliciesEmail DLP PoliciesAdd Policy.
- Configure the Basic Information of the email DLP policy.
- Enter a descriptiveName.
- Specify the Evaluation Priority of the email DLP policy.This Evaluation Priority determines the order email DLP policies are evaluated.Select whether the new email DLP policy goesbeforeorafteran existing email DLP policy.
- For the Email Application, selectMicrosoft Exchange.
- Select theEnterprise DLPincident severity for whenEnterprise DLPdetects matching traffic.
- Select theDLP Data Profileto associate with the email DLP policy.The DLP data profile you select is used as the traffic match criteria thatEnterprise DLPevaluates inspected traffic against. The data profile can be either a predefined data profile or a custom data profile.
- Verify thatEnable Policyis toggled on.This setting is enabled by default when you add a new email DLP policy.
- (Optional) Configure the DLP email policyConditions.The DLP email policy conditions determine the email sender and recipient criteria for when inline inspection of email traffic should or should not be performed byEnterprise DLP. The Email DLP policy conditions have anANDrelationship. This means that all email sender and recipientConditionsyou configure must be met forEnterprise DLPto take action.You can configure all or only some of the DLP email policy conditions settings as needed. If no email sender or recipient conditions are configured, then all outbound email traffic is inspected byEnterprise DLPand evaluated against the data profile you selected in the previous step.For example, you configure the Email DLP policy conditions to inspect for theyourcompany.comSender Email Domainandgmail.comRecipient Email Domainonly. ForEnterprise DLPto take action, the email sender domain and recipient email domain must match what you have configured. In this instance,Enterprise DLPdoes not take action if theRecipient Email Domainisyahoo.com.
- Configure the email sender conditions.To configure the email sender conditions you must specify whether the conditions are inclusive or exclusive of the specified email domains, user groups, or specific users.
- Is one of—Inclusion condition to evaluate emails sent from an email associated with the selected email domains, user groups, or specified users against the data profile specified in the DLP email policy.Any emails that are not a part of the selected email domains, user groups, or specified users are not evaluated against the data profile associated with the DLP email policy.
- Is not one of—Exclusion condition to evaluate emails sent from an email not associated with the selected email domains, user groups, or specified users against the data profile specified in the DLP email policy.Any emails that are part of the selected email domains, user groups, or specified users are not evaluated against the data profile associated with the DLP email policy.
- Specify theSender Email Domaincondition and select one or more email domains.The sender email domains available to select are those you added when you connected Microsoft Exchange.
- Specify theSender User Groupcondition and select one or more user groups.The sender user groups are obtained from your Client Identity Engine (CIE) configuration. Skip this step if you do not have CIE active onStrata Cloud Manager.
- Specify theSender Usercondition and enter an email.Click add (
) to include additional sender emails.
- Configure the email recipient conditions.To configure the email recipient conditions, you must specify whether the conditions are inclusive or exclusive of the specified email domains or specific users.
- Is one of—Inclusion condition to evaluate emails to be received by an email associated with the selected email domains or specified users against the data profile specified in the DLP email policy.Any emails that are not a part of the selected email domains or specified users are not evaluated against the data profile associated with the DLP email policy.
- Is not one of—Exclusion condition to evaluate emails to be received by an email not associated with the selected email domains or specified users against the data profile specified in the DLP email policy.Any emails that are part of the selected email domains or specified users are not evaluated against the data profile associated with the DLP email policy.
- Specify theRecipient Email Domaincondition and enter a valid email domain.Enterprise DLPsupports all valid email domains. The email domain is the web address that follows the@symbol in an email address. For example,gmail.comoryahoo.com.Click add (
) to include additional email domains.
- Specify theRecipient Usercondition and enter an email.Click add (
) to include additional recipient emails.
- Configure the DLP email policyResponse.The DLP email policy response configuration specifies the actionEnterprise DLPtakes when inspected traffic matches the data profile associated with the policy.
- Specify theActionEnterprise DLPtakes when inspected traffic matches the data profile associated with the policy.
- Monitor—Outbound email is allowed to leave your organization to the intended recipient. A DLP incident is generated
- Block—Outbound email is blocked from leaving your organization's network.The action Microsoft Exchange takes on aBlockverdict rendered byEnterprise DLPis based on the block transport rule you created.
- Quarantine—Outbound email is transported back to the email server and quarantined. The email is forwarded to the hosted quarantine spam inbox and requires review by an email administrator before the email is allowed to leave your organization's network.The action Microsoft Exchange takes on aQuarantineverdict rendered byEnterprise DLPis based on the quarantine transport rule you created.
- (Microsoft Exchange only)Forward email for approval by end user's manager—Outbound email is transported back to Microsoft Exchange and sent to the sender's manager for approval. Independent review is required by the sender's manager before the email is allowed to leave your organization's network.The action Microsoft Exchange takes on aForward email for approval by end user's managerverdict rendered byEnterprise DLPis based on the transport for manager approval rule you created.
- (Microsoft Exchange only)Forward email for approval admin—Outbound email is transported back to Microsoft Exchange and sent to the specified email admin for approval. Independent review is required by the specified email administrator before the email is allowed to leave your organization's network.The action Microsoft Exchange takes on aForward email for approval adminverdict rendered byEnterprise DLPis based on the transport for admin approval rule you created.
- (Microsoft Exchange only)Encrypt—Outbound email is allowed to leave your organization and is transported back to Microsoft Exchange to be encrypted before continuing its path to the intended recipient.The action Microsoft Exchange takes on aEncryptverdict rendered byEnterprise DLPis based on the encrypt transport rule you created.
- (Optional) Automatically assign anIncident AssigneewhenEnterprise DLPrenders aBlockorQuarantineverdict on matching traffic.Strength your security posture by assigning an incident assignee to follow up on and resolve events whereEnterprise DLPdetects outbound emails that contain sensitive information.
- (Optional) Add emails to sendNotificationsto receive alerts whenEnterprise DLPrendersBlockorQuarantineverdicts on inspected outbound traffic.Click add (
) to include additional emails to receive notifications.
- Save Policy.