Connect Microsoft Exchange and Enterprise DLP
Table of Contents
Expand all | Collapse all
-
- Register and Activate Enterprise DLP on Prisma Access (Panorama Managed)
- Edit the Enterprise DLP Snippet Settings on the DLP App
- Enable Role Based Access to Enterprise DLP on Strata Cloud Manager
- Enable Optical Character Recognition on Strata Cloud Manager
- Enable Optical Character Recognition for Enterprise DLP
-
-
- Create a Data Profile on the DLP App
- Create a Data Profile with EDM Data Sets on the DLP App
- Create a Data Profile with Data Patterns and EDM Data Sets on the DLP App
- Create a Data Profile with Nested Data Profiles on the DLP App
- Create a Data Profile on Strata Cloud Manager
- Create a Data Profile with EDM Data Sets on Strata Cloud Manager
- Create a Data Profile with Data Patterns and EDM Data Sets on Strata Cloud Manager
- Create a Data Profile with Nested Data Profiles on Strata Cloud Manager
- Create a Data Filtering Profile on Panorama
- Create a Data Filtering Profile on Panorama for Non-File Detection
- Update a Data Profile on the DLP App
- Update a Data Profile on Strata Cloud Manager
- Update a Data Filtering Profile on Panorama
- Enable Existing Data Patterns and Filtering Profiles
-
- How Does Email DLP Work?
- Activate Email DLP
- Add an Enterprise DLP Email Policy
- Review Email DLP Incidents
-
- Monitor DLP Status with the DLP Health and Telemetry App
- View Enterprise DLP Log Details on the DLP App
- Manage Enterprise DLP Incidents on the DLP App
- View Enterprise DLP Audit Logs on the DLP App
- View Enterprise DLP Log Details on Strata Cloud Manager
- Manage Enterprise DLP Incidents on Strata Cloud Manager
- View Enterprise DLP Audit Logs on Strata Cloud Manager
- View Enterprise DLP Log Details on Panorama
Connect Microsoft Exchange and Enterprise DLP
Enterprise DLP
After you create the email transport rules, you must connect Microsoft Exchange and
Enterprise Data Loss Prevention (E-DLP)
to complete onboarding.Where Can I Use This? | What Do I Need? |
---|---|
|
|
Connect Microsoft Exchange to
Enterprise Data Loss Prevention (E-DLP)
through SaaS Security
on Strata Cloud Manager
to complete the onboarding.Before you begin connecting Microsoft Exchange to
Enterprise DLP
, ensure
that the admin performing the connection has at least Email
Administrator
access for Microsoft Exchange. This is required
to allow Enterprise DLP
API access to Microsoft Exchange. - Contact your email domain provider to update your SFP record to add the requiredEnterprise DLPservice IP addresses.Add the IP addresses for the region where your email domain is hosted. You can update your SFP record with multiple regional IP addresses if you have email domains hosted in multiple regions.
- APAC—35.186.151.226and34.87.43.120
- E.U—34.141.90.172and34.107.47.119
- U.S—34.168.197.200and34.83.143.116
- (Best Practices) Confirm that Active Directory is properly configured so email senders have a manager to approve or reject quarantined emails.Microsoft Exchange Active Directory is required to assign a manager to a sender. You can create a transport rule to quarantine and send the email for approval by the sender's manager. To successfully quarantine a sender's email if sensitive data is detected byEnterprise DLP, a sender must have a manager assigned.If no manager is assigned to a user, then the quarantined email is sent to the recipient because no manager is assigned to approve or reject the email.
- (Best Practices) Save Evidence for Investigative Analysis with Enterprise DLP.Palo Alto Networks recommends configuring evidence storage so you can download emails for investigative analysis when your review Email DLP incidents.
- CIE is recommended so you can create targeted Email DLP policies.
- Create the Microsoft Exchange connectors and transport rules, and create the Email DLP Policy.Palo Alto Networks recommends setting up all connectors, transport rules and Email DLP policies to ensure enforcements begins as soon as you successfully connect Microsoft Exchange Online toEnterprise DLP.
- The outbound connector controls the flow of emails forwarded from Microsoft Exchange toEnterprise DLP.
- The inbound connector controls the flow of emails forwarded toEnterprise DLPback to Microsoft Exchange.
- Transport rules allows Microsoft Exchange to forward emails toEnterprise DLPand establishes the actions Microsoft Exchange takes based on the hosted quarantine, admin approval, manager approval, encrypt, or block transport rules verdicts rendered byEnterprise DLP.
- The DLP email policy specifies the incident severity and the actionEnterprise DLPtakes when matching traffic is inspected and sensitive data is detected.
- Log intoStrata Cloud Manager.
- Select.ManageConfigurationSaaS SecuritySettingsApps Onboarding
- Search forExchangeand clickMicrosoft Exchange.
- In theEmail DLP Instance, clickAdd Instance.
- In theSetup Connectors and Rulespage, clickContinue to Next Sectionsince you have already configured the outbound connector, inbound connector, and transport rules.
- In theConfigure Smart Hostpage, add the email domains and relay hosts.Adding one or more email domains and relay hosts is required to ensure emails inspected byEnterprise DLPare successfully forwarded back to Microsoft Exchange.
- Enter anEmail Domainand its correspondingRelay Hostyou obtained in the previous step.Obtain Your Microsoft Exchange Domain and Relay Host if you don't have the Microsoft Exchange email domain and relay host immediately available.
- (Optional)Addany additional email domains and relay hosts as needed.
- Connect.
- Microsoft Exchange is now successfully connected and onboarded.