Enable Existing Data Patterns and Filtering Profiles

Enable existing data patterns and filtering profiles not configured using
Enterprise data loss prevention (DLP)
.
After you successfully install the Enterprise data loss prevention (DLP) plugin on Panorama, existing data patterns and filtering profiles are no longer displayed but you can still reference them in your Security policy rules. If you have existing data filtering patterns and profiles configured that you need to edit after installing the
Enterprise DLP
plugin, you can display them again in your Panorama web interface.
Existing data patterns and data filtering profiles aren’t hidden if you’re using
Enterprise DLP
for Panorama-managed Prisma Access.
  1. Enable existing data patterns and filtering profiles on Panorama.
    1. Enable the existing data patterns and filtering profiles.
      admin>
      request plugins dlp hide-old-config no
      Panorama returns a
      pass
      message to confirm the existing data patterns and filtering profiles are now displayed.
      Enter the following command to disable the displaying of existing data patterns and filtering profiles.
      admin>
      request plugins dlp hide-old-config yes
  2. (
    Optional
    ) Enable existing data patterns and filtering profiles on the managed firewall if you have any Security policy rules configured locally on the firewall.
    1. Enable the existing data patterns and filtering profiles.
      admin>
      request plugins dlp hide-old-config no
      The firewall returns a
      pass
      message to confirm the existing data patterns and filtering profiles are now displayed.
      Enter the following command to disable the displaying of existing data patterns and filtering profiles.
      admin>
      request plugins dlp hide-old-config yes
  3. Edit your existing data patterns and filtering profiles.
    1. Select
      Objects
      Custom Objects
      Data Patterns
      and edit your data patterns.
    2. Select
      Objects
      Security Profiles
      Data Filtering
      and edit your data filtering profiles.
  4. Select
    Policies
    Security
    and select the
    Device Group
    to modify your Security policy rules as needed.
  5. Commit and push your configuration changes to your managed firewalls that are using
    Enterprise DLP
    .
    The
    Commit and Push
    command isn’t recommended for
    Enterprise DLP
    configuration changes. Using the
    Commit and Push
    command requires the additional and unnecessary overheard of manually selecting the impacted templates and managed firewalls in the Push Scope Selection.
    1. Select
      Commit
      Commit to Panorama
      and
      Commit
      .
    2. Select
      Commit
      Push to Devices
      and
      Edit Selections
      .
    3. Select
      Device Groups
      and
      Include Device and Network Templates
      .
    4. Click
      OK
      .
    5. Push
      your configuration changes to your managed firewalls that are using
      Enterprise DLP
      .

Recommended For You