Edit the Enterprise DLP Data Filtering Settings
Edit the Enterprise Data Loss Prevention (DLP) data filtering
settings to specify the actions the managed firewall takes on file
scanned to the DLP cloud service.
Configure the network settings for files scanned
to the Enterprise Data Loss Prevention (DLP) cloud service and specify
the actions the firewall leveraging Enterprise DLP takes.
- Selectand select theDeviceSetupDLPTemplateassociated with the managed firewalls leveraging Enterprise DLP.
- Edit the Data Filtering Settings
- Specify theMax Latency (sec)for a file upload for an action is taken by the firewall.For inspection of files greater than 20MB, Palo Alto Networks recommends setting the max latency to greater than60seconds.
- Specify theAction on Max Latency(BlockorAllow) the firewall takes if no verdict was received for a file upload due to the upload time exceeding the configuredMax Latency.SelectingBlockapplies only to Enterprise DLP data filtering profiles configured to block files. This setting does not impact Enterprise DLP filtering profiles configured to alert when traffic containing sensitive data is scanned.
- Specify theMax File Size (MB)to enforce a maximum file size for files stored in the DLP cloud service.
- Specify theAction on Max File Size(BlockorAllow) the firewall takes if no verdict was received for a file upload due to the file size being larger than the configuredMax File Size.SelectingBlockapplies only to Enterprise DLP data filtering profiles configured to block files. This setting does not impact Enterprise DLP filtering profiles configured to alert when traffic containing sensitive data is scanned.
- Check (enable)Log Files Not Scannedto generate an alert in the data filtering log when a file cannot be scanned to the DLP cloud service.
- ClickOKto save your configuration changes.
- Edit the Enterprise DLP Action on Error Setting to configure the action the firewall takes if any error is encountered during non-file traffic data upload.
- Commit and push your configuration changes to your managed firewalls leveraging Enterprise DLP.While a performing aCommit and Pushis supported, it is not recommended for Enterprise DLP configuration changes and requires you to manually select the impacted templates and managed firewalls in the Push Scope Selection.
- SelectandCommitCommit to PanoramaCommityour configuration changes.
- SelectandCommitPush to DevicesEdit Selections.
- SelectDevice GroupsandInclude Device and Network Templates.
- ClickOK.
- Pushyour configuration changes to your managed firewalls.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.