Enable Existing Data Patterns and Filtering Profiles

Enable existing data patterns and filtering profiles not configured using Enterprise DLP (data loss prevention).
After you successfully install the Enterprise data loss prevention (DLP) plugin on Panorama, existing data patterns and filtering profiles are no longer displayed but you can still reference them in your Security policy rules. If you have existing data filtering patterns and profiles configured that you need to edit after installing the Enterprise DLP plugin, you can display them again in your Panorama web interface.
Existing data patterns and data filtering profiles are not hidden if you are leveraging Enterprise DLP for Panorama-managed Prisma Access.
  1. Enable existing data patterns and filtering profiles on Panorama.
    1. Enable the existing data patterns and filtering profiles.
      admin>
      request plugins dlp hide-old-config no
      Panorama returns a
      pass
      message to confirm the existing data patterns and filtering profiles are now displayed.
      Enter the following command to disable the displaying of existing data patterns and filtering profiles.
      admin>
      request plugins dlp hide-old-config yes
  2. (
    Optional
    ) Enable existing data patterns and filtering profiles on the managed firewall if you have any Security policy rules configured locally on the firewall.
    1. Enable the existing data patterns and filtering profiles.
      admin>
      request plugins dlp hide-old-config no
      The firewall returns a
      pass
      message to confirm the existing data patterns and filtering profiles are now displayed.
      Enter the following command to disable the displaying of existing data patterns and filtering profiles.
      admin>
      request plugins dlp hide-old-config yes
  3. Edit your existing data patterns and filtering profiles.
    1. Select
      Objects
      Custom Objects
      Data Patterns
      and edit your data patterns.
    2. Select
      Objects
      Security Profiles
      Data Filtering
      and edit your data filtering profiles.
  4. Select
    Policies
    Security
    and select the
    Device Group
    to modify your Security policy rules as needed.
  5. Commit and push your configuration changes to your managed firewalls that are leveraging Enterprise DLP.
    The
    Commit and Push
    command is not recommended for Enterprise DLP configuration changes. Using the
    Commit and Push
    command requires the additional and unnecessary overheard of manually selecting the impacted templates and managed firewalls in the Push Scope Selection.
    1. Select
      Commit
      Commit to Panorama
      and
      Commit
      .
    2. Select
      Commit
      Push to Devices
      and
      Edit Selections
      .
    3. Select
      Device Groups
      and
      Include Device and Network Templates
      .
    4. Click
      OK
      .
    5. Push
      your configuration changes to your managed firewalls that are leveraging Enterprise DLP.

Recommended For You