Create a Block Transport Rule
Table of Contents
Expand all | Collapse all
-
- Register and Activate Enterprise DLP on Prisma Access (Panorama Managed)
- Edit the Enterprise DLP Snippet Settings on the DLP App
- Enable Role Based Access to Enterprise DLP on Strata Cloud Manager
- Enable Optical Character Recognition on Strata Cloud Manager
- Enable Optical Character Recognition for Enterprise DLP
-
-
- Create a Data Profile on the DLP App
- Create a Data Profile with EDM Data Sets on the DLP App
- Create a Data Profile with Data Patterns and EDM Data Sets on the DLP App
- Create a Data Profile with Nested Data Profiles on the DLP App
- Create a Data Profile on Strata Cloud Manager
- Create a Data Profile with EDM Data Sets on Strata Cloud Manager
- Create a Data Profile with Data Patterns and EDM Data Sets on Strata Cloud Manager
- Create a Data Profile with Nested Data Profiles on Strata Cloud Manager
- Create a Data Filtering Profile on Panorama
- Create a Data Filtering Profile on Panorama for Non-File Detection
- Update a Data Profile on the DLP App
- Update a Data Profile on Strata Cloud Manager
- Update a Data Filtering Profile on Panorama
- Enable Existing Data Patterns and Filtering Profiles
-
- How Does Email DLP Work?
- Activate Email DLP
- Add an Enterprise DLP Email Policy
- Review Email DLP Incidents
-
- Monitor DLP Status with the DLP Health and Telemetry App
- View Enterprise DLP Log Details on the DLP App
- Manage Enterprise DLP Incidents on the DLP App
- View Enterprise DLP Audit Logs on the DLP App
- View Enterprise DLP Log Details on Strata Cloud Manager
- Manage Enterprise DLP Incidents on Strata Cloud Manager
- View Enterprise DLP Audit Logs on Strata Cloud Manager
- View Enterprise DLP Log Details on Panorama
Create a Block Transport Rule
Create a Microsoft Exchange Block transport rule to specify the action Microsoft
Exchange takes when an email contains sensitive data and is blocked.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
The Microsoft Exchange Block transport rule instructs Microsoft Exchange on the
action to take when
Enterprise Data Loss Prevention (E-DLP)
cloud service returns a
Block
verdict for an email that contains sensitive
data. Enterprise DLP
adds x-panw-action: block
to the
email header for all inspected emails. Any future emails with this header already
included will not be forwarded to Enterprise DLP
for inspection. Instead,
Microsoft Exchange takes the action specified in the Block transport rule. - Create the outbound and inbound connectors.Skip this step if you have already created both the outbound and inbound connectors.
- Selectto create a new email transport rule.Mail flowRulesAdd a ruleCreate a new rule
- Configure the Block transport rule conditions.
- Enter aNamefor the Block transport rule.
- Add the Block email message header.The Block header is added by the DLP cloud service when an inspected email contains sensitive information that is blocked.
- ForApply this rule if, selectThe message headers....
- Selectincludes any of these words.
- ClickEnter Text. When promoted, enter the following.x-panw-actionClickSaveto continue.ClickEnter words. When prompted, enter the following andAdd:blockSelect the word you added. ClickSaveto continue.
Specify the action Microsoft Exchange takes when an email header includes the Block header added byEnterprise DLP.- ForDo the following, selectBlock the message.
- Selectreject the message and include an explanation. When prompted, enter the explanation for why the email was blocked.This is the response members of your organization receive when an outbound email is blocked.ClickSaveto continue.
ClickNextto continue. - Configure the Block transport rule settings.
- For theRule mode, ensureEnforceis selected.This setting is enabled by default when a new transport rule is created.
- (Optional) Configure the rest of the Block transport rule settings as needed.
- ClickNextto continue.
- Save.
- Review the Block transport rule configuration and clickFinish.ClickDonewhen prompted that the Block transport rule was successfully created. You are redirected back to the Microsoft Exchange Rules page.
- Modify the email transport rule priority as needed.To change the priority of a transport rule, select the transport rule andMove UporMove Downas needed.A proper rule hierarchy is recommended to ensure emails successfully forward toEnterprise DLPfor inspection.
- The email transport rule should always be the highest priority rule relative to the other transport rules required forEnterprise DLPinspection.
- Any email encryption rules not created as part of the email DLP configuration must be ordered below the transport rules created forEnterprise DLPinspection.Enterprise DLPcannot inspect encrypted emails.
- There is no impact in regards to priority between the quarantine transport rules, block transport rule, encrypt transport rule, or any other transport rules that exist.AfterEnterprise DLPinspects and returns the email back to Microsoft Exchange, the appropriate transport rule action will occur based on the email header.