Create a Microsoft Exchange Outbound Connector
Table of Contents
Expand all | Collapse all
-
- Register and Activate Enterprise DLP on Prisma Access (Panorama Managed)
- Edit the Enterprise DLP Snippet Settings on the DLP App
- Enable Role Based Access to Enterprise DLP on Strata Cloud Manager
- Enable Optical Character Recognition on Strata Cloud Manager
- Enable Optical Character Recognition for Enterprise DLP
-
-
- Create a Data Profile on the DLP App
- Create a Data Profile with EDM Data Sets on the DLP App
- Create a Data Profile with Data Patterns and EDM Data Sets on the DLP App
- Create a Data Profile with Nested Data Profiles on the DLP App
- Create a Data Profile on Strata Cloud Manager
- Create a Data Profile with EDM Data Sets on Strata Cloud Manager
- Create a Data Profile with Data Patterns and EDM Data Sets on Strata Cloud Manager
- Create a Data Profile with Nested Data Profiles on Strata Cloud Manager
- Create a Data Filtering Profile on Panorama
- Create a Data Filtering Profile on Panorama for Non-File Detection
- Update a Data Profile on the DLP App
- Update a Data Profile on Strata Cloud Manager
- Update a Data Filtering Profile on Panorama
- Enable Existing Data Patterns and Filtering Profiles
-
- How Does Email DLP Work?
- Activate Email DLP
- Add an Enterprise DLP Email Policy
- Review Email DLP Incidents
-
- Monitor DLP Status with the DLP Health and Telemetry App
- View Enterprise DLP Log Details on the DLP App
- Manage Enterprise DLP Incidents on the DLP App
- View Enterprise DLP Audit Logs on the DLP App
- View Enterprise DLP Log Details on Strata Cloud Manager
- Manage Enterprise DLP Incidents on Strata Cloud Manager
- View Enterprise DLP Audit Logs on Strata Cloud Manager
- View Enterprise DLP Log Details on Panorama
Create a Microsoft Exchange Outbound Connector
Create an outbound Microsoft Exchange Online Connector to connect Microsoft Exchange
with
Enterprise Data Loss Prevention (E-DLP)
for inline inspection of emails. Where Can I Use This? | What Do I Need? |
---|---|
|
|
To prevents sensitive data exfiltration contained in outbound emails using
Enterprise Data Loss Prevention (E-DLP)
, you must create an outbound connector to control the flow
of emails forwarded from Microsoft Exchange Online to Enterprise DLP
.- SelectandMail flowConnectorsAdd a connectorto launch the Microsoft Exchange Connector wizard.
- Specify the connector source and destination.
- ForConnection from, selectOffice 365.
- ForConnection to, selectPartner organization.A partner can be any third-party cloud service that provides services such as services, such as data protection. In this case, the third-party partner organization is Palo Alto Networks.
- ClickNext.
- Name the Microsoft Exchange connector.
- Enter a descriptiveNamefor the connector.
- (Optional) Enter aDescriptionfor the connector.
- (Best Practices) ForWhat do you want to do after connector is saved?, check (enable)Turn it on.Enable this to automatically turn on the connector after you have finished creating and saved the new Microsoft Exchange connector.
- ClickNext.
- To specify when the connector should be used, selectOnly when I have a transport rule set up that redirects messages to this connectorand clickNext.Using the connector only when a transport rule exists enables fine-grained control of what action to take when an email contains sensitive data. By select this option, Microsoft Exchange enforces action on emails based on the action specified in theEnterprise DLPdata profile.
- To configure the route settings for emails, check (enable)Route email through these smart hoststo add the following smart host Fully Qualified Domain Name (FQDN) and clickNext.The FQDN specifies the region where emails are forwarded to the DLP cloud service for inspection and verdict rendering. This also generates and displays Email DLP incidents in the specified region. All processes and data related to Email DLP occur and are stored in this region.
- United States—mail.us-west1.email.dlp.paloaltonetworks.comEurope—mail.europe-west3.email.dlp.paloaltonetworks.comAPAC—mail.asia-southeast1.email.dlp.paloaltonetworks.com
- Specify the security restrictions for the connector.
- Check (enable)Always use Transport Layer Security (TLS) to secure the connection.This is required to successfully forward emails for inspection. Disabling this setting causes the connector connection to be rejected.
- SelectIssued by a trusted certificate authority (CA).
- Check (enable)Add the subject name or subject alternative (SAM) matches to this domain:and add the following domain name.Adding the subject name is required for positive identification of the Palo Alto Networks DLP cloud service. The CA issuer FQDN you add must match the email routing FQDN you added in the previous step.
- United States—mail.us-west1.email.dlp.paloaltonetworks.comEurope—mail.europe-west3.email.dlp.paloaltonetworks.comAPAC—mail.asia-southeast1.email.dlp.paloaltonetworks.com
- ClickNext.
Add a validation email.A valid email address associated with the email domain used by your organization. This is required to validate connectivity between the Microsoft Exchange Admin Center and the Palo Alto Networks smart host, and that emails can be successfully delivered.- Add a valid email address for validation.
- Validate.The Microsoft Exchange validation tests take a few minutes to complete.
- Under theTask, verify that theCheck connectivityvalidation test status to theEnterprise DLPFQDN displaysSucceed.It is expected that the following errors occur when adding the validation email.
- Validation failederror is displayed.
- TheSend test emailvalidation test status displaysFailed.
Enterprise DLP. - ClickDone.
- When prompted to confirm whether to proceed without successful validation, clickYes, proceed.
Review the connector details andCreate Connector.ClickDonewhen prompted that the outbound connector was successfully created.Back in the Connectors page, verify the outbound connector is displayed and that theStatusisOn.Create a Microsoft Exchange Inbound Connector if not already created.The inbound connector is required to return emails forwarded toEnterprise DLPfor inspection back to Microsoft Exchange.Skip this step if you have already created the inbound connector.After you successfully created the Microsoft Exchange connector, you must create Microsoft Exchange transports rule to forward emails to and fromEnterprise DLP, and to specify what actions Microsoft Exchange takes based on theEnterprise DLPverdicts.
Recommended For You