Enterprise DLP Configuration Export and Import
Focus
Focus
What's New in the NetSec Platform

Enterprise DLP Configuration Export and Import

Table of Contents


Enterprise DLP Configuration Export and Import

Preserve your Enterprise Data Loss Prevention (E-DLP) configuration with configuration export and import capabilities to quickly recover from undesirable states caused by administrative configuration errors.
Configuration errors during Enterprise Data Loss Prevention (E-DLP) policy updates pose risks, potentially leading to unintended security gaps or costly service disruptions. Enterprise DLP Configuration Export and Import addresses this challenge by providing a fast, reliable method for data pattern, data profile, and data dictionary configuration management. Enterprise DLP Configuration Export and Import enables your data security administrators to implement more rigorous change management processes for your data security policy.
For example, your data security administrators can use Enterprise DLP Configuration Export and Import to quickly validate data pattern, data dictionary, data profile changes in a non-production environment before deployment, ensuring consistency across your enforcement points. Conversely, they can export known good Enterprise DLP data pattern, data profile, and data dictionary configurations so they can import them back in the event of misconfiguration.
Enterprise DLP Configuration Export and Import is exclusively designed to manage the creation and updating of specific configuration elements, such as data patterns, data profiles, and data dictionaries within Enterprise DLP. When you import a configuration Enterprise DLP, only creates or updates data patterns, data dictionaries, or data profiles but does not delete.
Enterprise DLP generates an audit log capturing the details about the configuration export and import including the administrator that performed the operation, date the operation was performed, and time the operation was performed. These verifiable audit trails significantly strengthen your overall security posture, simplifying complex troubleshooting processes, and meeting stringent regulatory and internal governance compliance requirements.