Enterprise DLP
How Enterprise DLP Safeguards Against ChatGPT Data Leakage
Table of Contents
Expand All
|
Collapse All
Enterprise DLP Docs
-
- About Enterprise DLP
- What’s Supported with Enterprise DLP?
- Data Patterns, Document Types, and Data Profiles
- Enable Role Based Access
- Edit the Cloud Content Settings
- Edit the Enterprise DLP Data Filtering Settings
- Edit the Enterprise DLP Snippet Settings
- Configure Syslog Forwarding for Enterprise DLP Incidents
- Request a New Feature
-
-
- Enable Existing Data Patterns and Filtering Profiles
- Modify a DLP Rule on Strata Cloud Manager
- Create a SaaS Security Policy Recommendation to Leverage Enterprise DLP
- Reduce False Positive Detections
- Data Dictionaries
- Recommendations for Security Policy Rules
- Enterprise DLP Migrator
-
-
-
-
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- April 2024
- March 2024
- January 2024
- December 2023
- November 2023
- October 2023
- August 2023
- July 2023
- June 2023
- May 2023
- March 2023
- February 2023
- January 2023
- November 2022
- October 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- July 2021
- New Features in Enterprise DLP Plugin 5.0
- New Features in Enterprise DLP Plugin 4.0
- New Features in Enterprise DLP Plugin 3.0
- New Features in Enterprise DLP Plugin 1.0
-
- Known Issues in the Enterprise DLP Cloud Service
- Known Issues in Endpoint DLP
-
- Known Issues in Enterprise DLP Plugin 3.0.9
- Known Issues in Enterprise DLP Plugin 3.0.8
- Known Issues in Enterprise DLP Plugin 3.0.7
- Known Issues in Enterprise DLP Plugin 3.0.6
- Known Issues in Enterprise DLP Plugin 3.0.5
- Known Issues in Enterprise DLP Plugin 3.0.4
- Known Issues in Enterprise DLP Plugin 3.0.3
- Known Issues in Enterprise DLP Plugin 3.0.2
- Known Issues in Enterprise DLP Plugin 3.0.1
- Known Issues in Enterprise DLP Plugin 3.0.0
-
- Known Issues in Enterprise DLP Plugin 1.0.8
- Known Issues in Enterprise DLP Plugin 1.0.7
- Known Issues in Enterprise DLP Plugin 1.0.6
- Known Issues in Enterprise DLP Plugin 1.0.5
- Known Issues in Enterprise DLP Plugin 1.0.4
- Known Issues in Enterprise DLP Plugin 1.0.3
- Known Issues in Enterprise DLP Plugin 1.0.2
- Known Issues in Enterprise DLP Plugin 1.0.1
- Enterprise DLP Limitations
-
How Enterprise DLP Safeguards Against ChatGPT Data Leakage
Learn more about how Enterprise Data Loss Prevention (E-DLP) safeguard your sensitive data from
exfiltration through ChatGPT.
Where Can I Use This? | What Do I Need? |
---|---|
|
Or any of the following licenses that include the Enterprise DLP license
|
Learn more about using Enterprise Data Loss Prevention (E-DLP) in your Security policy rules to prevent data exfiltration to
ChatGPT.
With the rise of generative Artificial Intelligence (AI), new Natural Language Processing
and Generation (NPL/NLG) interface-based apps have seen unprecedented adoption. ChatGPT
is a popular generative pre-trained transformer (GPT) language model application and
presents an ever increasing risk of exfiltration of sensitive data. Palo Alto Networks
maintains its commitment to a holistic approach on data security. Enterprise DLP
offers immediate prevention of sensitive data exfiltration to AI apps like ChatGPT.
Existing ChatGPT Traffic - Discovery
Before you use Enterprise DLP to prevent data exfiltration to ChatGPT, it is
important to understand by who and how often ChatGPT is accessed on your network.
Panorama, Prisma Access (Managed by Panorama), Cloud Management, and Next-Generation
CASB for Prisma Access and NGFW allows users to monitor all egress activity and easily identify
new AI app usage by employees on your network.
Panorama
Use the Unified Log View for NGFW (Managed by Panorama) managed firewalls and
Panorama Managed
Prisma Access.
- Use the Unified Log View (MonitorLogsUnified) to discover traffic to ChatGPT.
- ChatGPT traffic is captured through the App ID openai-chatgpt and can be found with the following filter query:(app eq openai-chatgpt)
Strata Cloud Manager
Use the Log Viewer for NGFW (Managed by Strata Cloud Manager) and Prisma Access (Managed by Strata Cloud Manager).
- Use Log Viewer (ActivityLogsLogs Viewer) to discover traffic to ChatGPT.
- ChatGPT traffic is captured through the App ID openai-chatgpt and can be found with the following app filter query:app = 'openai-chatgpt'

Next-Generation CASB
- Use the Discovered Apps (Discovered AppsApplications) to discover traffic to ChatGPT.
- Add Filter to narrow down the Category to Artificial Intelligence applications and Tag as Unknown.This filter allows you to narrow down all traffic to uncategorised AI applications on your network. Uncategorised applications display as unknown but can be manually recategorized as sanctioned, unsanctioned, or tolerated once the initial discovery is completed based on your organization's risk posture.
- Alternatively, you can search for ChatGPT in the Search Application Name search bar.

Block or Allow ChatGPT
How to Block ChatGPT
You can choose to block access to ChatGPT entirely using the App ID if the risk of
employees having access to ChatGPT messaging and API features is too high. For Next-Generation
CASB for Prisma Access and NGFW, you can block access to ChatGPT through the
Artificial Intelligence category.
- Panorama — Create an Application Block Rule to explicitly block traffic to ChatGPT.The application block rule applies to Panorama managed firewalls and Panorama Managed Prisma Access
- Cloud Management—In Discovered Apps (ManageConfigurationSaaS SecurityDiscovered AppsApplications) and filter for ChatGPT to block access (ActionsBlock Access).Additionally, you can select ActionsTag to apply existing unsanctioned, tolerated, or sanctioned app policies for egress traffic to ChatGPT.This applies to Prisma Access (Managed by Strata Cloud Manager) and SaaS Security.
- Next-Generation CASB—In Discovered Apps (VisibilityDiscovered AppsApplications) and filter for ChatGPT to block access (ActionsBlock Access).Additionally, you can select ActionsTag to apply existing unsanctioned, tolerated, or sanctioned app policies for egress traffic to ChatGPT.
Allow ChatGPT and Prevent Exfiltration of Sensitive Data
With Enterprise DLP you can create new or leverage existing data detection logic
for data sent to ChatGPT through chat or API. Enterprise DLP can perform
in-line content inspection to identify and stop sensitive data loss to generative AI
apps such as ChatGPT without completely blocking access. This will allow your
employees to continue to access ChatGPT while ensuring no sensitive data is
mishandled and leaves your network.
To allow access to ChatGPT on your network while preventing data leakage, you must
create a Security policy rule using an Enterprise DLP data profile.