Addressed Issues in Enterprise Data Loss Prevention (DLP) Plugin 1.0.5

Addressed issues in Enterprise data loss prevention (DLP) plugin 1.0.5

PLUG-9461

On the Panorama management server, a Panorama administrator (
Panorama
Administrators
) with a custom admin role (
Panorama
Admin Roles
) allowing read and write access to Enterprise DLP data patterns (
Objects
DLP
Data Filtering Patterns
) and profiles (
Objects
DLP
Data Filtering Profiles
) are able to only read Enterprise DLP data patterns and profiles.
Additionally, a Panorama administrator with full read and write access to the Panorama web interface can only read Enterprise DLP data patterns and profiles.

PLUG-9360

On the Panorama management server, data profiles (
Objects
DLP
Data Filtering Profiles
) created on the DLP app on the hub cannot be used in a Security policy rule (
Policies
Security
).
Workaround:
Commit the synchronized data profile created on the DLP app on Panorama.
  1. Select
    Objects
    DLP
    Data Filtering Profiles
    .
  2. Open the data profile created on the DLP app and click
    OK
    .
  3. Commit
    and
    Commit to Panorama
    .

PLUG-8313

On the Panorama management server, predefined data filtering profiles (
Objects
DLP
Data Filtering Profiles
) are not displayed because the Panorama
admin
administrator (
Panorama
Administrators
) does not exist.
Workaround:
Create the
admin
user.
  1. Select
    Panorama
    Administrators
    and
    Add
    a new administrator.
    • Name—
      Enter
      admin
      .
    • Password—
      Set the administrator password and
      Confirm Password
      .
    • Administrator Type—
      Select
      Dynamic
      .
    • Admin Role—
      Select
      Superuser
      .
  2. Click
    OK
    .
  3. Commit
    and
    Commit to Panorama
    .

Recommended For You