Create a Data Filtering Profile
Follow these steps to create a Data Filtering profile that ensures confidential information stays in your network.
Data Filtering profiles can keep sensitive information from leaving your network.
To get started, you’ll first create a data pattern that specifies the information types and fields that you want the firewall to filter. Then, you attach that pattern to a data filtering profile, which specifies how you want to enforce the content that the firewall filters. Add the data filtering profile to a security policy rule to start filtering traffic matching the rule.
- Define a new data pattern object to detect the information you want to filter.
- SelectandObjectsCustom ObjectsData PatternsAdda new object.
- Provide a descriptiveNamefor the new object.
- (Optional) SelectSharedif you want the data pattern to be available to:
- Every virtual system (vsys) on a multi-vsys firewall—If cleared (disabled), the data pattern is available only to the Virtual System selected in theObjectstab.
- Every device group on Panorama—If cleared (disabled), the data pattern is available only to the Device Group selected in theObjectstab.
- (Optional—Panorama only) SelectDisable overrideto prevent administrators from overriding the settings of this data pattern object in device groups that inherit the object. This selection is cleared by default, which means administrators can override the settings for any device group that inherits the object.
- (Optional—Panorama only) SelectData Captureto automatically collect the data that is blocked by the filter.Specify a password for Manage Data Protection on the Settings page to view your captured data ().DeviceSetupContent-IDManage Data Protection
- Set thePattern Typeto one of the following:
- Predefined Pattern—Filter for credit card, social security numbers, and personally identifiable information for several compliance standards including HIPAA, GDPR, Gramm-Leach-Bliley Act.
- Regular Expression—Filter for custom data patterns.
- File Properties—Filter based on file properties and the associated values.
- Adda new rule to the data pattern object.
- Specify the data pattern according to thePattern Typeyou selected for this object:
- Predefined—Select theNameand choose the predefined data pattern on which to filter.
- Regular Expression—Specify a descriptiveName, select theFile Type(or types) you want to scan, and then enter the specificData Patternyou want the firewall to detect.
- File Properties—Specify a descriptiveName, select theFile TypeandFile Propertyyou want to scan, and enter the specificProperty Valuethat you want the firewall to detect.
- To filter Titus classified documents: Select one of the non-AIP protected file types, and set theFile Propertyto TITUS GUID. Enter the Titus label GUID as theProperty Value.
- For Azure Information Protection labeled documents: Select anyFile Typeexcept Rich Text Format. For the file type you choose, set theFile Propertyto Microsoft MIP Label, and enter the Azure Informatin Protect label GUID as theProperty Value.
- ClickOKto save the data pattern.
- Add the data pattern object to a data filtering profile.
- SelectandObjectsSecurity ProfilesData FilteringAddor modify a data filtering profile.
- Provide a descriptiveNamefor the new profile.
- Adda new profile rule and select the Data Pattern you created in Step .
- SpecifyApplications,File Types, and whatDirectionof traffic (upload or download) you want to filter based on the data pattern.The file type you select must be the same file type you defined for the data pattern earlier, or it must be a file type that includes the data pattern file type. For example, you could define both the data pattern object and the data filtering profile to scan all Microsoft Office documents. Or, you could define the data pattern object to match to only Microsoft PowerPoint Presentations while the data filtering profile scans all Microsoft Office documents.If a data pattern object is attached to a data filtering profile and the configured file types do not align between the two, the profile will not correctly filter documents matched to the data pattern object.
- Set theAlert Thresholdto specify the number of times the data pattern must be detected in a file to trigger an alert.
- Set theBlock Thresholdto block files that contain at least this many instances of the data pattern.
- Set theLog Severityrecorded for files that match this rule.
- ClickOKto save the data filtering profile.
- Apply the data filtering settings to traffic.
- SelectandPoliciesSecurityAddor modify a security policy rule.
- SelectActionsand set the Profile Type toProfiles.
- Attach the Data Filtering profile you created in Step 2 to the security policy rule.
- (Recommended) Prevent web browsers from resuming sessions that the firewall has terminated.This option ensures that when the firewall detects and then drops a sensitive file, a web browser cannot resume the session in an attempt to retrieve the file.
- Selectand edit Content-ID Settings.DeviceSetupContent-ID
- Clear theAllow HTTP partial response.
- Monitor files that the firewall is filtering.Selectto view the files that the firewall has detected and blocked based on your data filtering settings.MonitorData Filtering
Recommended For You
Recommended videos not found.