Prisma Access
Secure AIP Labeled Files with Enterprise DLP
Table of Contents
Expand All
|
Collapse All
Prisma Access Docs
-
- 6.0 Preferred and Innovation
- 5.2 Preferred and Innovation
- 5.1 Preferred and Innovation
- 5.0 Preferred and Innovation
- 4.2 Preferred
- 4.1 Preferred
- 4.0 Preferred
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
-
-
- 4.0 & Later
- Prisma Access China
-
-
Secure AIP Labeled Files with Enterprise DLP
Leverage Enterprise Data Loss Prevention (E-DLP) to inspect and take action on assets protected with
Microsoft Azure Information Protection (AIP).
Where Can I Use This? | What Do I Need? |
---|---|
|
Or any of the following licenses that include the Enterprise DLP license
|
Use Enterprise Data Loss Prevention (E-DLP) on Strata Cloud Manager to inspect for and take action
on assets protected with Microsoft Microsoft Purview Information
Protection (formerly Azure Information Protection (AIP)).
- Create a document protected with a Microsoft AIP label.Refer to the Microsoft Microsoft Purview Information Protection documentation for detailed information.Log in to Strata Cloud Manager.Enable Enterprise DLP if not already enabled.Select ManageConfiguration Security ServicesData Loss Prevention.Create a file property data pattern for to inspect for AIP Tags.Create an advanced data profile and add the file property data pattern you created in the previous step.You can add any additional data patterns as needed.Modify the DLP Rule to define the type of traffic to inspect, the impacted file types, the action taken when sensitive data is detected, and the DLP incident log severity when Enterprise DLP detects sensitive data.Add the Enterprise DLP data profile to a profile group.
- Select ManageConfigurationSecurity ServicesProfile GroupsConfigurationNGFW and Prisma AccessSecurity ServicesProfile Groups.Add Profile Group or select an existing profile group.For the Data Loss Prevention Profile, select the DLP rule you modified in the previous step.Save.Add the profile group to a Security policy rule.
- Select ManageConfigurationSecurity ServicesSecurity Policy and Add Rule.Configure the Security policy rule as needed.For the Action and Advanced Inspection:
- set the Action as Allow.
- Verify the Action is Allow (default).
- For the Profile Group, select the profile group you added the DLP rule to in the previous step.
Save.In the Prisma Access - Pre Rules, verify that the Security policy rule is at the top of the policy rulebase to ensure traffic is not allowed or blocked before it can be inspected.Push Config.Verify that the Enterprise DLP successfully detects and takes action on the assets protected by AIP labels you specified in your Enterprise DLP configuration.You can use sites such as DLP ToolBox and DLP Test to verify.Refer to the Enterprise DLP Administrator's Guide for more information on supported applications.