Enterprise DLP Administration
Enterprise DLP Administration
April 2025
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2021-2025 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
April 14, 2025
Create and configure Enterprise Data Loss Prevention (E-DLP) data patterns and filtering profiles
for use in Security policy rules to enforce your organization’s data security standards to prevent
accidental data misuse, loss, or theft.
• Data Patterns
• Data Profiles
• Enable Existing Data Patterns and Filtering Profiles
• Modify a DLP Rule on Strata Cloud Manager
• Create a SaaS Security Policy Recommendation to Leverage Enterprise DLP
• Reduce False Positive Detections
• Exact Data Matching (EDM)
• Enterprise DLP End User Alerting with Cortex XSOAR
• Inspection of Contextual Secrets for Chat Applications
• Enterprise DLP and AI Apps
• Custom Document Types for Enterprise DLP
• Email DLP
• Endpoint DLP
7
Configure Enterprise DLP
• Data Dictionaries
• Recommendations for Security Policy Rules
• Enterprise DLP Migrator
Data Patterns
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Enterprise Data Loss Prevention (E-DLP) data patterns specify what content is sensitive and
needs to be protected—this is the content you’re filtering.
Predefined data patterns and built-in settings make it easy for you to protect files that contain
certain file properties (such as document title or author), credit card numbers, regulated
information from different countries (such as driver’s license numbers), and third-party DLP labels.
To improve detection rates for sensitive data in your organization, you can supplement predefined
data patterns by creating custom data patterns that are specific to your content inspection and
data protection requirements. In a custom data pattern, you can also define regular expressions
and file properties to look for metadata or attributes in the file’s custom or extended properties
and use it in a data filtering profile.
• Configure Regular Expressions
• Create a Custom Data Pattern
• Create a File Property Data Pattern
• Add Custom Match Criteria to a Predefined Data Pattern
The regular expression builder in Enterprise Data Loss Prevention (E-DLP) provides an easy
mechanism to configure regular expressions (regex for short), which you define when you create
a custom data pattern. You can use the regular expression builder to construct a data pattern
expression, view matches, filter occurrences and weight thresholds, and assess match results to
determine if the content poses a risk to your organization.
There are two types of regular expressions:
• Basic—Searches for a specific text pattern. When Enterprise DLP displays the match
occurrences when inspected traffic matches the data pattern match criteria.
• Weighted—Assigns a score to a text entry. When the score threshold is exceeded, such as
enough expressions from a pattern match an asset, the service returns a match for the pattern.
To reduce false-positives and maximize the search performance of your regular expressions,
you can assign scores using the weighted regular expression builder in Enterprise DLP to find
and calculate scores for the information that’s important to you. Scoring applies to a match
threshold, and when a threshold is exceeded, such as enough words from a pattern are found
in a document, the document will be indicated as a match for the pattern.
Use Case: Calculating and Scoring a weighted regular expression
For example, Joe is an employee at a water treatment plant and needs to compile user data on
a proprietary pH additive that is used when source water arrives at the plant. If Joe initiated a
regular expression search with just the term tap water thousands of match results display, as
the matched tap water documents list the additive. However, Joe is searching for the first use of
the additive and not every document the additive is listed in, making it difficult for Joe to find the
usage data he needs.
To get more accurate results, Joe can initiate a weighted regular expression to assign weight
and occurrence scores to the expression, or indicate the information to exclude by assigning a
negative weight value.
Joe enters a negative weight value to exclude tap water and higher values to source water and
the proprietary water additive. The results are filtered and counted to a more manageable list,
meaning that a document containing 10 occurrences of water counts as one when all files and
folders are scanned. This enables Joe to view the match results, adjust the totals for weight
and occurrences, and calculate an adjusted score to determine if the content poses a risk to his
organization.
STEP 1 | Consider the best practices for using regular expression matches.
• Use predefined data patterns instead of regular expressions. Use Enterprise DLP
predefined data patterns instead of regular expressions where possible. Data patterns
are more efficient than regular expressions because the predefined data patterns are
tuned for accuracy and the data is validated. For example, if you want to search for social
security numbers, use the US Social Security Number (SSN) data pattern instead of a regular
expression.
• Use regular expressions sparingly. Regular expressions can be computationally expensive.
If you add a regular expression condition, observe the system for 1 hour for efficient
performance. Make sure that the system does not slow down and there are no false
positives.
• Test regular expressions. If you implement regular expression matching, consider using
a third-party tool to test the regular expressions before you enable the policy rules. The
recommended tool is RegexBuddy. Another good tool for testing your regular expressions is
RegExr. If your expression is incorrect, the service can’t match or will match incorrectly.
Term Description
Construct Description
Construct Description
Quantifier Description
? Match 1 or 0 times.
STEP 5 | Enter one regular expression per line, up to 100 lines of expressions.
There is no limit to the number of regular expressions you can add to a data pattern. Add as
many lines of regular expressions as needed.
STEP 6 | (Weighted expressions only): Assign a regular expression for each line entry between -9999
(lowest importance) to 9999 (highest importance) by entering the regular expression, the
delimiter, and the weight score. Enter a weight threshold score of one (1) of more.
Delimiter Note
: Colon.
Delimiter Note
| Pipe.
~ Tilde
Create an Enterprise Data Loss Prevention (E-DLP) custom data pattern using regular expressions.
Create data patterns to specify the match criteria and identify patterns using regular expressions
and keywords that represent sensitive information on your network. Enterprise DLP synchronizes
all data patterns across your Panorama™ management server and Strata Cloud Manager
associated with the tenant. You can edit all custom data patterns created on Panorama or Strata
Cloud Manager as needed.
• Strata Cloud Manager
• Panorama
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Detection Methods > Data
Patterns.
You can also create a new custom data pattern by copying an existing custom data
pattern. To copy a custom data pattern, select the data pattern name to view the data
pattern details and copy ( ). You can then configure the custom data pattern you
copied as needed.
Enterprise DLP is when detecting matched traffic. Enterprise DLP determines confidence level
by inspecting the distance of regular expressions to proximity keywords.
Panorama
You do not need to select the device group the managed firewalls using Enterprise DLP
are associated with. All data patterns are shared across all device groups by default.
STEP 4 | Specify a Type and criteria for the data pattern and specify a Name.
Use any of the following data pattern types:
• Regular Expression—Create regular expressions to use in the data pattern.
You can choose Basic or Advanced data patterns. Use the Advanced data pattern to create
a basic or weighted regular expression. With weighted regular expressions, each text
entry is assigned a score and when the score threshold is exceeded, such as when enough
expressions from a pattern match an asset, Enterprise DLP will indicate that the asset is a
match for the pattern.
Then use the query builder in the Regular Expressions field to add either regular (Basic) or
weighted (Advanced) expressions.
You can enter one or more Proximity Keywords to use with the data filtering pattern.
Proximity keywords aren’t case-sensitive. You can enter one or more proximity keywords
to increase the probability Enterprise DLP accurately detects a regular expression match.
Proximity keywords impact the Enterprise DLP confidence level, which reflects how
confident Enterprise DLP is when detecting matched traffic. Enterprise DLP determines
confidence level by inspecting the distance of regular expressions to proximity keywords.
• File Property—Add a file property pattern on which to match.
For data governance and protection of information, if you use classification labels or embed
tags in MS Office and PDF documents to include more information for audit and tracking
purposes, you can create a file property data pattern to match on the metadata or attributes
that are part of the custom or extended properties in the file. Regardless whether you use
an automated classification mechanism, such as Titus, or whether require users to add a tag,
you can specify a name-value pair on which to match on a custom or extended property
embedded in the file.
Enterprise DLP supports file property data patterns in MS Office and PDF documents and
supports both the OLE (.doc/.ppt) and XML (.docx/.pptx) formats of MS Office.
Then add a Tag Name and Tag Value.
A Tag Name and Tag Value are an associated pair that specifies the property for which
you want to look (for example, you can specify a Tag Name of Label and a Tag Value
of Confidential). You can add as many file properties as you’d like and when you later
reference the file property data pattern in a data filtering profile, Enterprise DLP will use a
boolean OR match in the match criteria.
For files protected with Microsoft Azure Information Protection (AIP), you must
enter the full AIP label Name that you want to take action on. This can be either the
MSIP_Label_<GUID>_Enabled label name or the Sensitivity label name.
STEP 6 | Commit and push the new configuration to your managed firewalls.
The Commit and Push command isn’t recommended for Enterprise DLP configuration
changes. Using the Commit and Push command requires the additional and
unnecessary overheard of manually selecting the impacted templates and managed
firewalls in the Push Scope Selection.
You must always include the temporary __dlp administrator when performing a
partial configuration push. This is required to keep Panorama and the DLP cloud
service in sync.
For example, you have an admin Panorama admin user who is allowed to commit
and push configuration changes. The admin user made changes to the Enterprise
DLP configuration and only wants to commit and push these changes to managed
firewalls. In this case, the admin user is required to also select the __dlp user in
the partial commit and push operations.
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
3. Commit.
4. Select Commit > Push to Devices.
5. Select Push Changes Made By and then click the current Panorama admin user to select
additional admins to include in the partial push.
In this example, the admin user is currently logged in and performing the push
operation. The admin user must click admin and then select the __dlp user. If there are
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
Create an Enterprise Data Loss Prevention (E-DLP) data pattern using file properties to specify
the match criteria and identify patterns that represent sensitive information on your network.
All data patterns you create are shared across Panorama™ management server and Strata
Cloud Manager deployments associated with the tenant. All custom data patterns created on
Panoramaor Strata Cloud Manager can be edited and copied as needed.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Detection Methods > Data
Patterns.
You can also create a new file property data pattern by copying an existing file
property data pattern. To copy a custom data pattern, select the data pattern name to
view the data pattern details and copy ( ). You can then configure the file property
data pattern you copied as needed.
STEP 4 | Enter a descriptive Name for the file property data pattern.
STEP 6 | Select the File Property Type and enter the corresponding Value.
Enterprise DLP supports file property data patterns in MS Office and PDF documents and
supports both the OLE (.doc/.ppt) and XML (.docx/.pptx) formats of MS Office.
(Extended Properties and Custom only) You must enter the file property Name to identify
which extended or custom property Enterprise DLP needs to inspect for.
• AIP Tags
Microsoft Azure Information Protection (AIP) labels used to classify and protect documents
and emails. AIP tags are case insensitive and only whole word matches are supported.
Regex expressions and wildcards are not supported.
Review the examples of the supported AIP tag format when configuring a file property data
pattern to prevent exfiltration of documents with AIP tags:
• MSIP_Label_305f50f5-e953-4c63-867b-388561f41989_Enabled=true
• MSIP_Label_305f50f5-
e953-4c63-867b-388561f41989_SetDate=2024-01-25T07:05:49Z
• MSIP_Label_305f50f5-
e953-4c63-867b-388561f41989_Method=Privileged
• MSIP_Label_305f50f5-
e953-4c63-867b-388561f41989_Name=Confidential
Enterprise DLP supports using either the Name or Display Name for a Microsoft
Purview sensitivity label.
• MSIP_Label_305f50f5-
e953-4c63-867b-388561f41989_SiteId=fb8ed654-3195-4846-
ac37-491dc8a2349e
• MSIP_Label_305f50f5-
e953-4c63-867b-388561f41989_ActionId=218bb304-
e1fc-46f2-9210-7fb21702c52a
• MSIP_Label_305f50f5-e953-4c63-867b-388561f41989_ContentBits=2
Only one AIP Tag entry is supported per data pattern. However,
you can add up to 10 AIP tag values to an AIP Tag entry using
; as a separator. For example, MSIP_Label_305f50f5-
e953-4c63-867b-388561f41989_Enabled:true; MSIP_Label_305f50f5-
e953-4c63-867b-388561f41989_SetDate:2024-01-25T07:05:49Z;
SIP_Label_305f50f5-e953-4c63-867b-388561f41989_Method:Privileged.
• Asset Name
Asset names are the file name of files you want to prevent exfiltration. Asset names are
case insensitive.
Only one Asset Name entry is supported per data pattern. However, you can add up to 100
Asset Name values to an Asset Name entry using ; as a separator. Asset Names entries
support plaintext and fully formed regex expressions for the Asset Name value. Asset Name
is designed to inspect for a full word match. If a partial match is required, then the inclusion
of a wild card character in the regular expression is required.
• For plaintext Asset Name values, the asset name must include the file extension. For
example, billing-info.csv or customer-data.docx.
• For regex, the following expression matches all variations of file types when the specific
keywords are present due to the inclusion of a wild card at the end of the expression
to specify the file type. For example, password.csv and ccn.docx match this regex
expression:
(?i)(\(ssn|password|pwd|security|credit|CCN|finance).*
• Alternatively, the following regex expression matches variations in the file name and all
variations of file types due to the inclusion of a wildcard added before the expression
specifying the file name and a wild card at the end of the expression. For example,
100ssn.txt, 200ssn.docx, and 300ssn.csv match this regex expression:
(?i)(\.*(ssn|password|pwd|security|credit|CCN|finance).*
Only one Asset Name entry is supported per data pattern. However, you can add up to 100
asset name values to an Asset Name entry using ; as a separator:
billing-info.csv;customer-data.docx;(?i)(\.*(ssn|password|pwd|
security|credit|CCN|finance).*.
• Author
First and last name of the file owner contained in the asset metadata. Author tags are case
and space insensitive and only whole word matches are supported. No regex expressions or
wildcards are supported.
Only one Author entry is supported per data pattern. However, you can add up to 100
Author values to an Author entry using ; as a separator. For example, Bill Smith; john
doe; leslieBarnes.
The Author file property type is not supported for source code files.
• File Extension
Specify one or more file types supported by Enterprise DLP. File Extension tags are case
and space insensitive and only whole word matches are supported. Regex expressions
and wildcards are not supported. To scan files based on a specific file extension, the file
extension must be included in the file name.
Only one File Extension entry is supported per data pattern. However, you can add up
to 10 File Extension values to a File Extension entry using ; as a separator. For example,
.pdf;.csv;.rtf.
• File SHA
String of letters and numbers that represent a long checksum. Only SHA-256 are supported.
File Extension tags are case and space insensitive and only whole word matches are
supported. Regex expressions and wildcards are not supported.
Only one File SHA entry is supported per data pattern. However, you can add up
to 1,000 File SHA values to an File SHA entry using ; as a separator. For example,
CA4D03E8F8A495AA671930184A04275E050D096B9E7E3CF693E0AB12898F3A46;5C4753EAE1F
• Extended Properties
Unique Advanced properties added to Microsoft Suite (Word, Excel, PPT, PDF) file
properties that are not the default General properties.
Only one Extended Properties entry is supported per data pattern. However, you can add
up to 100 Extended Property values to an Extended Properties entry using ; as a separator.
• Custom
Unique Custom properties added to Microsoft Suite (Word, Excel, PPT, PDF) file properties
that are not the default General properties.
Multiple Custom entries are supported per data pattern. However, only one Custom value
per Custom entry is supported.
Clone a predefined regular expression (regex) data pattern to add specific inclusion or exclusion
and provide custom match criteria to enhance detection and prevention of data exfiltration of
sensitive data. This allows users to enhance predefined regex data pattern with more customized
match criteria.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Detection Methods > Data
Patterns.
STEP 5 | Add the custom match criteria to specify data to include or exclude from inspection and
verdict rendering.
Up to 50,000 characters are supported in each field. You can add multiple custom data match
criteria requirements in a single field separated by a semicolon (;). You specify one, some, or all
custom data match criteria.
• Include Matches Starting With—Inclusive match criteria to inspect for and trigger
Enterprise DLP enforcement for only data matches starting with one or more of the criteria
added.
This field is an AND operator.
• Include Matches End With—Inclusive match criteria to inspect for and trigger Enterprise
DLP enforcement for only data matches ending with one or more of the criteria added.
This field is an AND operator.
• Exclude Matches Starting With—Exclude match criteria from Enterprise DLP inspection and
enforcement for data matches starting with one or more of the criteria added.
This field is an OR operator.
• Exclude Matches Ending With—Exclude match criteria from Enterprise DLP inspection and
enforcement for data matches ending with one or more of the criteria added.
This field is an OR operator.
STEP 6 | Save.
Data Profiles
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
To get started, you’ll first create a data pattern that specifies the information types and fields
that you want the firewall to filter. Then, you attach that pattern to a data filtering profile, which
specifies how you want to enforce the content that the firewall filters. Add the data filtering
profile to a Security policy rule to start filtering traffic matching the rule.
Enterprise Data Loss Prevention (E-DLP) profiles specify how you want to enforce the sensitive
content that you’re filtering. Predefined data profiles have data patterns that include industry-
standard data identifiers, keywords, and built-in logic in the form of machine learning, regular
expressions, and checksums for legal and financial data patterns.
Enterprise DLP profiles are active only when they’re attached to a Security policy rule; they
scan traffic that matches the rule. If a user uploads a file that matches a data pattern, an alert is
triggered or the file is blocked (depending on the action you define in the DLP profile).
You can't delete data profiles after creation. See the Supported Data Profile Actions for
more information on the data profile actions Enterprise DLP supports.
After you create a data pattern, you need to create a data profile to add those data patterns and
specify matches and confidence levels. All data profiles you create are shared across Panorama™
management server and Strata Cloud Manager deployments associated with the tenant. All classic
data profiles created on Panorama or Strata Cloud Manager can be edited and copied as needed.
Viewing a data profile created on the DLP on Panorama requires Panorama plugin for Enterprise
DLP 1.0.4 or later release.
(Panorama only) A data profile configured for detection of non-file traffic allows you to configure
URL and application exclusion lists. The URL and application exclusion lists allow you to select
Shared URL and application traffic to exclude from inspection. For the application exclusion list, at
least one application exclusion is required to create a data filtering profile for inspecting non-file
traffic. The predefined DLP App Exclusion Filter is provided containing commonly used
applications that can be safely excluded from inspection. When you create a data filtering profile
using predefined data patterns, be sure to consider the detection type used by the predefined
data patterns because the detection type determines how Enterprise Data Loss Prevention (E-
DLP) arrives at a verdict for scanned files. If you downgrade from PAN-OS 10.2.1 or later release
and Enterprise DLP plugin 3.0.1 or late release to PAN-OS 10.1 and Enterprise DLP plugin 1.0,
data filtering profiles created on Panorama for non-file inspection are automatically converted
into file-based data filtering profiles.
When you create a data profile using predefined data patterns, be sure to consider the detection
type used by the predefined data patterns because the detection type determines how Enterprise
Data Loss Prevention (E-DLP) arrives at a verdict for scanned files.
Updating a classic data profile to include an advanced detection method such as Exact
Data Matching (EDM) and custom document types set isn’t supported.
You need to create an advanced data profile if you want to create a data profile that
combines a predefined or custom data pattern and advanced detection methods, see
STEP 2 | Edit the data filtering settings on Strata Cloud Manager to configure the minimum and
maximum data size limits and the actions the firewall takes when uploading files or to the
DLP cloud service or when inspecting non-file based traffic.
STEP 3 | Select Manage > Configuration > Data Loss Prevention > Data Profiles and Add Data Profile
> Classic Data Profile.
You can also create a new data profile by copying an existing data profile. This allows you
to quickly modify an existing data profile with additional match criteria while preserving the
original data profile from which the new data profile was copied.
Data profiles created by copying an existing data profile are appended with Copy -
<name_of_original_data_profile>. This name can be edited as needed.
Adding an EDM data set to a copied data profile is supported only if the original data
profile had an EDM data set to begin with. Adding an EDM data set to a data profile
that doesn’t already have an EDM data set isn’t supported.
Data pattern match criteria for traffic that you want to allow must be added to the
Primary Rule. Data pattern match criteria for traffic that you want to block can be
added to either Primary Rule or Secondary Rule.
Data pattern match criteria added to the Secondary Rule block all traffic that
meets the match criteria for the data pattern conditions. If you want to allow
traffic that matches a data pattern match criteria, add it to the Primary Rule.
7. Review the Data Profile Preview to verify the data profile match criteria.
STEP 5 | Test a Data Profile to verify it accurately detects the sensitive data you configured it to
detect.
STEP 6 | In Data Profiles, search for the data profile you created to verify it was successfully created.
STEP 7 | Modify a DLP Rule on Strata Cloud Manager to Attach the data profile to a Security policy
rule.
The DLP Rule defines the type of traffic to inspect, the impacted file types, action, log severity,
and more for the data profile match criteria. Enterprise DLP automatically creates a DLP rule
with an identical name as the data profile from which it was created.
STEP 2 | Edit the data filtering settings on Panorama to configure the minimum and maximum data
size limits and the actions the firewall takes when uploading files to the DLP cloud service.
• If you select Advanced, you can create expressions by dragging and dropping data patterns,
Confidence levels, Operators, and Occurrence values into the field in the center of the
page.
Specify the values in the order that they’re shown in the following example (data pattern,
Confidence, and Operator or Occurrence).
If the data profile has both Primary and Secondary Patterns, changing the data profile
Action on Panorama deletes all Secondary Pattern match criteria.
STEP 10 | Specify the file types the DLP cloud service takes action against.
• DLP plugin 4.0.0 and earlier releases
Select the File Type. By default, any is selected and inspects all supported file types.
• DLP plugin 4.0.1 and later releases
1. Select File Types.
2. Select the Scan Type to create a file type include or exclude list.
• Include—DLP cloud service inspects only the file types you add to the File Type Array.
• Exclude—DLP cloud service inspects all supported file types except for those added
to the File Type Array.
3. Click Modify to add the file types to the File Type Array and click OK.
STEP 12 | Set the Log Severity recorded for files that match this rule.
You can select critical, high, medium, low, or informational. The default severity is
informational.
STEP 14 | (Best Practices for File Based Inspection) Create a File Blocking profile and create a Block
Rule to block the file types you don't explicitly forwarded to Enterprise DLP.
Palo Alto Networks recommends creating this File Blocking profile to ensure sensitive data
can't be exfiltrated in file types Enterprise DLP doesn't support.
The Commit and Push command isn’t recommended for Enterprise DLP configuration
changes. Using the Commit and Push command requires the additional and
unnecessary overheard of manually selecting the impacted templates and managed
firewalls in the Push Scope Selection.
You must always include the temporary __dlp administrator when performing a
partial configuration push. This is required to keep Panorama and Enterprise DLP in
sync.
For example, you have an admin Panorama admin user who is allowed to commit
and push configuration changes. The admin user made changes to the Enterprise
DLP configuration and only wants to commit and push these changes to your
NGFW. In this case, the admin user is required to also select the __dlp user in the
partial commit and push operations.
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
3. Commit.
4. Select Commit > Push to Devices.
5. Select Push Changes Made By and then click the current Panorama admin user to select
additional admins to include in the partial push.
In this example, the admin user is currently logged in and performing the push
operation. The admin user must click admin and then select the __dlp user. If there are
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
STEP 2 | Edit the data filtering settings on Panorama to configure the minimum and maximum data
size limits and the actions the firewall takes when uploading non-file data to the DLP cloud
service.
Palo Alto Networks recommends verifying you Enable Non File DLP after you install
Panorama plugin for Enterprise DLP 3.0.1.
STEP 4 | (Optional) Create a custom application filter or application group to define predefined or
custom application traffic you want to exclude from inspection.
The application filter and application group must be Shared to be used in the data filtering
profile application exclusion list. Data filtering profiles for non-file traffic inspection support
either both custom application filters and application groups. You aren’t required to add both.
• Create a Custom Application Filter
• Create an Application Group
STEP 5 | (Optional) Create a custom URL category to define URL traffic you want to exclude from
inspection.
The URL category must be Shared to be used in the data filtering profile URL exclusion list.
To include the custom URL category in the URL exclusion list of a data filtering profile,
adding the custom URL category to a URL Filtering profile isn’t required.
STEP 8 | (Optional) Configure the data filtering profile to scan File Based traffic.
Data filtering profiles support scanning both file based and non-file based traffic. Select Yes
to scan for both file based and non-file based traffic. Select No to only scan for non-file based
traffic. Configuring the data filtering profile not to scan for file based traffic has no impact on
scanning non-file based traffic.
STEP 9 | Configure the data filtering profile to scan Non-File Based traffic.
Select Yes to scan for non-file based traffic.
• If you select Advanced, you can create expressions by dragging and dropping data patterns,
Confidence levels, Operators, and Occurrence values into the field in the center of the
page.
Specify the values in the order that they’re shown in the following screenshot (data pattern,
Confidence, and Operator or Occurrence).
If the data profile has both Primary and Secondary Patterns, changing the data profile
Action on Panorama deletes all Secondary Pattern match criteria.
STEP 13 | (Optional) Configure the URL category list to exclude URL traffic from inspection.
The URL category list can only be configured when Non-File Based traffic inspection is
enabled.
1. Select URL Category List Excluded From Non-File.
2. Add a new URL category list.
3. Select a predefined URL category, custom URL category or EDL.
STEP 14 | Configure the application exclusion list to exclude application traffic from inspection.
The application list can only be configured when Non-File Based traffic inspection is enabled.
At least one application list or application group is required to create a data filtering profile for
inspecting non-file traffic.
1. Select Application List Excluded From Non-File.
2. Add an application filter or application group.
If you didn’t create a custom application filter or application group, you must add the
DLP App Exclusion Filter.
STEP 15 | For the Direction, only Upload is supported for inspection of non-file based traffic.
STEP 16 | Set the Log Severity recorded for files that match this rule.
You can select critical, high, medium, low, or informational. The default severity is
informational.
STEP 19 | Commit and push the new configuration to your managed firewalls.
The Commit and Push command isn’t recommended for Enterprise DLP configuration
changes. Using the Commit and Push command requires the additional and
unnecessary overheard of manually selecting the impacted templates and managed
firewalls in the Push Scope Selection.
You must always include the temporary __dlp administrator when performing a
partial configuration push. This is required to keep Panorama and the DLP cloud
service in sync.
For example, you have an admin Panorama admin user who is allowed to commit
and push configuration changes. The admin user made changes to the Enterprise
DLP configuration and only wants to commit and push these changes to managed
firewalls. In this case, the admin user is required to also select the __dlp user in
the partial commit and push operations.
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
3. Commit.
4. Select Commit > Push to Devices.
5. Select Push Changes Made By and then click the current Panorama admin user to select
additional admins to include in the partial push.
In this example, the admin user is currently logged in and performing the push
operation. The admin user must click admin and then select the __dlp user. If there are
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
Advanced data profiles are data profiles that can any combination of predefined, custom regex,
or file property data pattern and advanced detection methods such EDM data sets and custom
document types. Enterprise DLP synchronizes advanced data profiles betweenPanorama and
Strata Cloud Manager.
When you create a data profile using predefined data patterns, be sure to consider the detection
type used by the predefined data patterns because the detection type determines how Enterprise
DLP arrives at a verdict for scanned files.
Updating an advanced data profile to include only data patterns isn’t supported if
the advanced data profile includes at least one data pattern and advanced detection
method when it was initially created. However, updating a data profile that includes data
patterns and advanced detection methods to only include advanced detection methods is
supported.
Create a Classic Data Profile to create a data profile containing only predefined or
custom data patterns.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Data Profiles and Add Data Profile
> Advanced Data Profile.
You can also create a new data profile by copying an existing data profile. This allows you
to quickly modify an existing data profile with additional match criteria while preserving the
original data profile from which the new data profile was copied.
Data profiles created by copying an existing data profile are appended with Copy -
<name_of_original_data_profile>. This name can be edited as needed.
Adding an EDM data set to a copied data profile is supported only if the original data
profile had an EDM data set to begin with. Adding an EDM data set to a data profile
that doesn’t already have an EDM data set isn’t supported.
Data pattern match criteria for traffic that you want to allow must be added to the
Primary Rule. Data pattern match criteria for traffic that you want to block can be
added to either Primary Rule or Secondary Rule.
Select Add > Dictionary and define the data dictionary match criteria.
• Dictionary—Select a custom or predefined data pattern.
• Occurrence Condition—Specify the occurrences condition required to trigger a
Security policy rule action.
• Any—Security policy rule action triggered if Enterprise DLP detects at least one
instance of matched traffic.
• Less than or equal to—Security policy rule action triggered if Enterprise DLP
detects instances of matched traffic, with the maximum being the specified
Count.
• More than or equal to—Security policy rule action triggered if Enterprise DLP
detects instances of matched traffic, with a minimum being the specified Count.
• Between (inclusive)—Security policy rule action triggered if Enterprise DLP
detects any number of instances of matched traffic between the specific Count
range.
• Count—Specify the number of instances of matched traffic required to trigger a
Security policy rule action. Range is 1 - 500.
For example, to match a pattern that appears three or more times in a file,
select More than or equal to as the Occurrence Condition and specify 3 as the
Threshold.
• Confidence—Specify the confidence level required for a Security policy rule action
to be taken (High or Low).
• Unique Occurrences—Check (enable) to detect only unique instances of traffic
matches. Only unique occurrences of traffic matches are counted toward the
specified Count.
This setting is disabled by default. Keep Unique Occurrences disabled if you want
all instances of traffic matches to count toward the specified Count.
• Custom Document Types
Select Add > Document Types and define the custom document type match criteria.
• Document Type—Select a predefined or custom document type you uploaded to
Enterprise DLP.
• Overlapping Score Condition—Specify the custom document overlapping score
required to trigger a Security policy rule action.
• Greater Than or Equal To—Security policy rule triggered if Enterprise DLP
detects an instance of matched traffic with the specified minimum overlapping
score.
• Between (Inclusive)—Security policy rule action triggered if Enterprise DLP
detects an instance of matched traffic with an overlapping score between the
specified min and max overlapping scores.
• EDM
Select Add > EDM Dataset and define the EDM match criteria.
• EDM Dataset—Select an EDM data set uploaded to the DLP cloud service.
When you select Any (OR), the maximum Count setting is one less than
the total number of fields included in the Primary Field or Secondary
Field.
• Select the Primary Fields values.
The list of available values is populated from the selected EDM data set. You must
select at least one primary field value.
You’re required to add at least one column where the column values occurs up
to 12 times in the selected EDM data set for the Primary Field. For example,
if the EDM data set contains columns for first name, last name, social security
number, and credit card number, add social security number and credit card in the
primary field.
• Group
Select Add > Group to nest and group additional match criteria so you can more
accurately define your compliance rules.
When you click add a new Group, the new match criteria group is nested under
the most recently added data pattern or EDM data set. You can’t nest a new match
criteria group between existing data patterns or EDM data sets. If multiple data
patterns or EDM data sets are added, you must remove the data patterns or EDM
data sets that follow the data pattern or EDM data set for which you want to add the
nested match criteria. For example, you added EDM_Dataset1, Data_Pattern2,
and EDM_Dataset3 to the Primary Rule. If you wanted to added nested match
criteria to Data_Pattern2, you must first remove EDM_Dataset3 from the Primary
Rule.
You can select the same data pattern or EDM data set or a different data pattern
EDM data set to more accurately define your compliance rules. Nesting match criteria
is supported only when the data profile includes an EDM data set. Enterprise DLP
supports up to three level of additional nesting groups for each data pattern or EDM
data set. You can nest additional data patterns or EDM data sets under a data pattern
or EDM data set added to the Primary or Secondary Rule.
Nested match criteria support the AND, OR, and NOT operators. Refer to the
descriptions above to configure the nested match criteria.
Data pattern match criteria added to the Secondary Rule block all traffic that meets
the match criteria for the data patterns by default and can’t be modified. If you want
to allow traffic that matches a data pattern match criteria, add it to the Primary Rule.
STEP 5 | Review the Data Profile Preview to verify the data profile match criteria.
STEP 7 | Test a Data Profile to verify it accurately detects the sensitive data you configured it to
detect.
STEP 8 | In Data Profiles, search for the data profile you created to verify it was successfully created.
STEP 9 | Modify a DLP Rule on Strata Cloud Manager to Attach the data profile to a Security policy
rule.
The DLP Rule defines the type of traffic to inspect, the impacted file types, action, log severity,
and more for the data profile match criteria. Enterprise DLP automatically creates a DLP rule
with an identical name as the data profile from which it was created.
Enterprise Data Loss Prevention (E-DLP) supports creating a single data profile that contains
multiple nested data profiles. Creating a single data profile that contains multiple nested data
profiles allows you to consolidate the match criteria to prevent exfiltration of sensitive data to
a single data profile that you can associate with a single Security policy rule. This allows you to
simplify the management of sensitive data leaving your network and reduces the need to manage
multiple Security policy rules and data profiles. Enterprise DLP synchronizes nested data profiles
between Panorama and Strata Cloud Manager
When you create a data profile that contains predefined data profiles and patterns, be sure to
consider the detection types used by the predefined data patterns because the detection type
determines how Enterprise DLP arrives at a verdict for scanned files.
• Enterprise DLP supports updating a nested data profile only from Strata Cloud
Manager.
• Enterprise DLP does not support adding a nested data profile to another nested data
profile.
• Enterprise DLP supports adding a classic or advanced data profiles that have only a
Primary Rule configured. Enterprise DLP does not support adding data profiles that
include both Primary and Secondary Rules to a nested data profile.
• Enterprise DLP supports adding a data profile that includes an advanced detection
method to an existing nested data profile if you did not include one when you
originally created the data profile.
• (SaaS Security) Enterprise DLP supports adding a nested data profile to SaaS Security
Inline policy recommendations and Internet Access policy rules only.
Enterprise DLP does not support adding a nested data profile to data asset policy
rules in Data Security.
STEP 2 | (Optional) Create your classic or advanced data profiles on Strata Cloud Manager.
You can create a data profile that contains multiple data profiles using both predefined data
profiles and custom data profiles you create.
STEP 3 | Select Manage > Configuration > Data Loss Prevention > Data Profiles and Add Data
Profiles > Nested Data Profiles.
You can also create a new data profile by copying an existing data profile that already contains
multiple data profiles. This allows you to quickly modify an existing data profile with additional
data profile match criteria while preserving the original data profile from which the new data
profile was copied.
Enterprise DLP appends the name of copied a data profile with Copy -
<name_of_original_data_profile>.
STEP 8 | Test a Data Profile to verify it accurately detects the sensitive data you configured it to
detect.
If the data profile has both Primary and Secondary Patterns, changing the data
profile Action on Panorama deletes all Secondary Pattern match criteria.
STEP 10 | Modify a DLP Rule on Strata Cloud Manager to attach the data profile to a Security policy
rule.
The DLP Rule defines the type of traffic to inspect, the impacted file types, action, log severity,
and more for the data profile match criteria. Enterprise DLP automatically creates a DLP rule
with an identical name as the data profile from which it was created.
You can edit and modify an existing custom Enterprise Data Loss Prevention (E-DLP) data profile
at any time. Enterprise DLP synchronizes any changes you make to an existing data profile
between Panorama and Strata Cloud Manager.
If you update a data profile to include a predefined data pattern, be sure to consider the
detection types used by the predefined data patterns because the detection type determines
how Enterprise DLP arrives at a verdict for scanned files. For example, when you create a data
profile that includes three machine learning (ML)-based data patterns and seven regex-based data
patterns, Enterprise DLP will return verdicts based on the seven regex-based patterns whenever
the scanned file exceeds 1 MB.
Advanced data profiles and nested data profiles can only be modified from Strata Cloud
Manager.
Any changes to the data profile match criteria made on Strata Cloud Manager are
synchronized to Panorama but don’t display in the Panorama web interface. Security
policy rules using a data profile updated on Strata Cloud Manager inspect traffic using the
new or modified match criteria.
(Panorama only) Updating the data profile Name is supported but you must manually
update the existing Security policy rules (Policies > Security to reassociate the renamed
data filtering profile. Commits on Panorama fail if you do not reassociate the renamed
data filtering profile with the Security policy rule after the updated data profile name is
synchronized to Panorama.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Data Profiles and navigate to the
data profile you want to modify.
Modifying an advanced data profile to only include data patterns isn’t supported
if the advanced data profile included both data patterns and advanced detection
methods when it was initially created.
Enterprise DLP includes predefined document templates that were converted
from ML-based data patterns. Palo Alto Networks recommends modifying the
match criteria in the event your existing data profile references the list ML-based
data patterns that were converted.
• See Create a Nested Data Profile for details on configuring a single data profile that
contains multiple data profiles.
Adding an advanced data profile to an existing nested data profile if one wasn’t
included when the nested data profile was originally created is supported.
STEP 5 | Test a Data Profile to verify it accurately detects the sensitive data you configured it to
detect.
Panorama
STEP 2 | Select Objects > DLP > Data Filtering Profiles and specify the Device Group.
If the data profile has both Primary and Secondary Patterns, changing the
data filtering profile Action on Panorama deletes all Secondary Pattern
match criteria.
• Specify a File Type.
Leave the file type as any to match any of the supported file types.
• Set the Log Severity recorded for files that match this data filtering profile.
STEP 6 | Commit and push the new configuration to your managed firewalls.
The Commit and Push command isn’t recommended for Enterprise DLP configuration
changes. Using the Commit and Push command requires the additional and
unnecessary overheard of manually selecting the impacted templates and managed
firewalls in the Push Scope Selection.
You must always include the temporary __dlp administrator when performing a
partial configuration push. This is required to keep Panorama and the DLP cloud
service in sync.
For example, you have an admin Panorama admin user who is allowed to commit
and push configuration changes. The admin user made changes to the Enterprise
DLP configuration and only wants to commit and push these changes to managed
firewalls. In this case, the admin user is required to also select the __dlp user in
the partial commit and push operations.
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
3. Commit.
4. Select Commit > Push to Devices.
5. Select Push Changes Made By and then click the current Panorama admin user to select
additional admins to include in the partial push.
In this example, the admin user is currently logged in and performing the push
operation. The admin user must click admin and then select the __dlp user. If there are
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
Test the efficacy of your Enterprise Data Loss Prevention (E-DLP) data profiles before adding
them to your Security policy rule and pushing to your production NGFW and Prisma Access
tenants. This allows you to validate your data profiles against a file containing known sensitive
data to ensure accurate detection by Enterprise DLP. You can run a test on a data profile you're
currently configuring or on an existing data profile. The data profile test results show a high-level
summary of the type of data profile you're testing, the number of instances of High, Medium, and
Low confidence detections, and snippets of the sensitive data detected.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Create a data profile to add your predefined or custom data patterns, or edit an existing data
profile.
If you have an existing data profile you want to test, expand the Actions menu and
click Test.
STEP 3 | Click Test Run before you save the data profile to test the traffic match criteria and validate
the data profile detects the expected sensitive data.
STEP 4 | In the Detection Results, drag and drop the file you want to test or Browse File to select and
upload the file.
You can upload one file at a time. The maximum file size is 1 MB. Review the list of supported
file types for a list of file types you can upload to Enterprise DLP to test your data profile.
Enterprise DLP displays Invalid file upload if you upload an unsupported file type and
File size too large if you upload a supported file type larger than 1 MB.
Enterprise DLP begins testing the successfully uploaded file against the data profile.
2. Partial Test Result—Enterprise DLP successfully detected some but not all sensitive
match criteria configured in the data profile. A partial test result can mean:
• Match criteria in at least one, but not all, data patterns added to the data profile isn't
configured correctly to detect the sensitive data in the uploaded test file.
• Test file uploaded to Enterprise DLP does not contain sensitive data that matches at
least one, but not all, data pattern match criteria in your data profile.
• Primary and Secondary Rules in the data profile are not configured correctly. For
example, Enterprise DLP does not generate a DLP incident if you configured the
Occurrences for one of the data patterns in the Primary Rule to Less than or equal
to 10 but there are more than 10 instances of sensitive data for each associated data
pattern.
In the example below you can see that Enterprise DLP did not detect any sensitive data
in the test file that matched the Credit Card Number data pattern, but did detect
sensitive data that matches the Credit Card CVV and National Id - US Social
Security Number - SSN data patterns. In this case, you should modify the number
of occurrences required
Re-Upload File to test a different file against the data profile or exit the Test Data Profile
page to review and modify your data pattern and data profile configurations before
retesting.
STEP 6 | Exit the data profile test screen after you verified the data profile detects the intended
sensitive data.
When managing your Enterprise Data Loss Prevention (E-DLP) data filtering profiles across
your Panorama™ management server and Strata Cloud Manager, configuration drift might
occur because the Enterprise DLP plugin's local configuration only syncs with Strata Cloud
Manager when you commit Enterprise DLP configuration changes on Panorama. This can lead to
configurations commit failures or for data filtering profiles to be silently overwritten, which can
cause security disruptions and protection gaps.
To resolve data filtering profile synchronization conflicts, you must install Enterprise DLP plugin
5.0.0 or later release. Review the Compatibility Matrix to learn more about the plugin versions
supported on each PAN-OS release.
If you decide to ignore any data filtering profile conflict errors, be aware that Enterprise
DLP synchronizes data patterns and data profiles changes on Panorama with Strata Cloud
Manager every time you commit configuration changes on Panorama.
This might in result in Enterprise DLP overwriting the correct configuration on Strata
Cloud Manager with the incorrect configuration from Panorama.
STEP 3 | A banner displays at the top of the data filtering profile list when Enterprise DLP detects
a synchronization conflict between the Enterprise DLP plugin installed on Panorama
and the data profiles on Strata Cloud Manager. This banner displays the total number of
synchronization conflicts detected.
Click the Resolve Conflicts link to continue.
STEP 4 | Select a data filtering profile with conflicts to review. You can review one data filtering
profile at a time.
STEP 5 | Review the Local Changes on Panorama and the Remote Changes on Strata Cloud Manager
and decide which configuration you want to keep.
Use the Legend to identify the conflicts between the data filtering profile on Panorama and
the data profile on Strata Cloud Manager.
• Apply Local—Enterprise DLP preserves the local configuration on Panorama. Enterprise
DLP synchronizes the data filtering profile configuration you preserved on Panorama
with Strata Cloud Manager after you commit and push your Enterprise DLP configuration
changes.
• Apply Cloud—Enterprise DLP applies the data profile configuration detected on Strata
Cloud Manager to the data filtering profile on Panorama. Enterprise DLP synchronizes the
data filtering profile configuration applied from Strata Cloud Manager to the data filtering
profile on Panorama after you commit and push your Enterprise DLP configuration changes.
STEP 6 | When prompted, Confirm you want to apply the changes from the local data filtering profile
on Panorama or from the data profile on Strata Cloud Manager.
The Commit and Push command isn’t recommended for Enterprise DLP configuration
changes. Using the Commit and Push command requires the additional and
unnecessary overheard of manually selecting the impacted templates and managed
firewalls in the Push Scope Selection.
You must always include the temporary __dlp administrator when performing a
partial configuration push. This is required to keep Panorama and Enterprise DLP in
sync.
For example, you have an admin Panorama admin user who is allowed to commit
and push configuration changes. The admin user made changes to the Enterprise
DLP configuration and only wants to commit and push these changes to your
NGFW. In this case, the admin user is required to also select the __dlp user in the
partial commit and push operations.
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
3. Commit.
4. Select Commit > Push to Devices.
5. Select Push Changes Made By and then click the current Panorama admin user to select
additional admins to include in the partial push.
In this example, the admin user is currently logged in and performing the push
operation. The admin user must click admin and then select the __dlp user. If there are
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
After you successfully install the Enterprise Data Loss Prevention (E-DLP) plugin on Panorama,
existing data patterns and filtering profiles are no longer displayed but you can still reference
them in your Security policy rules. If you have existing data filtering patterns and profiles
configured that you need to edit after installing the Enterprise DLP plugin, you can display them
again in your Panorama web interface.
Existing data patterns and data filtering profiles aren’t hidden if you’re using Enterprise
DLP for Prisma Access (Managed by Panorama).
Panorama returns a pass message to confirm the existing data patterns and filtering
profiles are now displayed.
Enter the following command to disable the displaying of existing data patterns
and filtering profiles.
STEP 2 | (Optional) Enable existing data patterns and filtering profiles on the managed firewall if you
have any Security policy rules configured locally on the firewall.
1. Log in to the firewall CLI.
2. Enable the existing data patterns and filtering profiles.
The firewall returns a pass message to confirm the existing data patterns and filtering
profiles are now displayed.
Enter the following command to disable the displaying of existing data patterns
and filtering profiles.
STEP 5 | Select Policies > Security and select the Device Group to modify your Security policy rules
as needed.
STEP 6 | Commit and push the new configuration to your managed firewalls.
The Commit and Push command isn’t recommended for Enterprise DLP configuration
changes. Using the Commit and Push command requires the additional and
unnecessary overheard of manually selecting the impacted templates and managed
firewalls in the Push Scope Selection.
You must always include the temporary __dlp administrator when performing a
partial configuration push. This is required to keep Panorama and the DLP cloud
service in sync.
For example, you have an admin Panorama admin user who is allowed to commit
and push configuration changes. The admin user made changes to the Enterprise
DLP configuration and only wants to commit and push these changes to managed
firewalls. In this case, the admin user is required to also select the __dlp user in
the partial commit and push operations.
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
3. Commit.
4. Select Commit > Push to Devices.
5. Select Push Changes Made By and then click the current Panorama admin user to select
additional admins to include in the partial push.
In this example, the admin user is currently logged in and performing the push
operation. The admin user must click admin and then select the __dlp user. If there are
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
Configure a DLP rule to define the type of traffic to inspect, the impacted file types, action,
and log severity for the data profile match criteria. Enterprise Data Loss Prevention (E-DLP)
automatically creates a DLP rule when you create a new data profile. After you configure the data
filtering profile, you must create a Profile Group containing the data filtering profile and attached
it to a Security policy rule so the NGFW or Prisma Access tenant can enforce your data security
standards.
STEP 1 | Log in to Strata Cloud Manager.
STEP 3 | Select Manage > Configuration > Data Loss Prevention > DLP Rules and in the Actions
column, Edit the DLP rule.
The DLP rule has an identical name as the data profile from which it was automatically created.
or Prisma Access tenant forwards all other file types to Enterprise DLP but Enterprise
DLP inspects and renders verdicts only on supported file types.
3. Specify one or more supported file types to include in the match criteria.
All supported file types are included in the match criteria by default.
4. Specify the File Direction (Upload, Download, or Both).
The default file direction is Upload. File direction support is dependent on the app.
Review the list of supported apps to learn which file directions Enterprise DLP supports.
• Non-File Based
1. Enable DLP rule match criteria for non-file based traffic.
2. Select the URL Category List Exclusions to exclude forwarding traffic from one or more
specific URLs to Enterprise DLP.
You can use a predefined URL category or create a custom URL category in the Global
Configuration Scope. You can select multiple URL categories to exclude traffic from non-
file inspection.
3. Select the Application List Exclusion to exclude forwarding traffic from one or more
specific apps to Enterprise DLP.
You can use a predefined application filter or create a custom application filter in the
Global Configuration Scope. You can select multiple application filters to exclude app
traffic from non-file inspection.
Enterprise DLP requires at least one Application Filter if you enable exclusions
for non-file based traffic. Palo Alto Networks recommends adding the predefined
DLP App Exclusion application filter if you don't have a custom or
predefined application filter you want to add.
STEP 7 | (Best Practices for File Based Inspection) Create a File Blocking profile and create a Block
Rule to block the file types you don't explicitly forwarded to Enterprise DLP.
Palo Alto Networks recommends creating this File Blocking profile to ensure sensitive data
can't be exfiltrated in file types Enterprise DLP doesn't support.
STEP 8 | Create a Shared Profile Group for the Enterprise DLP data filtering profile.
1. Select Manage > Configuration > NGFW and Prisma Access > Security Services >
Profile Groups and Add Profile Group.
2. Enter a descriptive Name for the Profile Group.
3. (Best Practices for File Based Inspection) For the File Blocking Profile, select the File
Blocking profile you created in the previous step.
4. For the Data Loss Prevention Profile, select the Enterprise DLP data profile.
5. Add any other additional profiles as needed.
6. Save the profile group.
STEP 9 | Create a Security policy rule and attached the Profile Group.
1. Select Manage > Configuration > NGFW and Prisma Access > Security Services >
Security Policy and Add Rule.
You can also update an existing Security policy to attach a Profile Group for Enterprise
DLP filtering.
2. Configure the Security policy as needed.
3. Navigate to the Action and Advanced Inspection section, and select the Profile Group
you created in the previous step.
4. Save the Security policy.
A SaaS policy rule recommendation is required to leverage the Enterprise Data Loss Prevention
(E-DLP) data profile in SaaS Security. In order to scan for and render a verdict on sensitive data
you for which you want to prevent exfiltration, you must assign the data profile to the SaaS
Security policy rule recommendation.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Create data patterns and a data profile to define the match criteria for sensitive data you
want to detect.
STEP 3 | Select Manage > Configuration > Security Services > SaaS Security > Discovered Apps >
Policy Recommendations and Add Policy.
In some instances, Enterprise Data Loss Prevention (E-DLP) may incorrectly detect and take
action on network traffic that it should not have. This is called a false positive detection and
they can cause productivity impacts to individual employees and Enterprise DLP administrators
alike. False positive detections are commonly caused by traffic match criteria in your data patterns
that are too generalized or may be instances where the Enterprise DLP machine learning (ML)
models need to be manually trained. Review the recommendations below to help reduce the
chance of false positive detections.
STEP 1 | Log in to the management platform where you are managing Enterprise DLP.
• Log in to Strata Cloud Manager
• Log in to the Panorama web interface
regex so only the sensitive data you want to prevent leaving your organization's network
is detected and blocked.
2. Add proximity keywords to your custom data pattern.
Proximity keywords help improve overall Enterprise DLP detection accuracy and reduce
false positives. Proximity keywords impact the detection confidence level, which reflects
how confident Enterprise DLP is when detecting matched traffic. Enterprise DLP
determines the match confidence level by inspecting the distance of the regex to the
proximity keywords you added.
3. Use the File Property configuration settings to add specific file property patterns on
which to match.
If you use classification labels or embed tags in documents to include more information
for audit and tracking purposes, you can create a file property data pattern to match on
the metadata or attributes that are part of the custom or extended properties in the file.
Regardless whether you use an automated classification mechanism, such as Titus, or
whether require users to add a tag, you can specify a name-value pair on which to match
on a custom or extended property embedded in the file. This allows you to narrow down
the likelihood of false positives by requiring Enterprise DLP to inspect and take action
only on documents that contain the specified name-value-pair.
For Panorama, this means modifying or creating a new data pattern. For Strata Cloud
Manager, this means creating a file property data pattern.
STEP 3 | Use advanced detection tools to create specific and narrow match criteria for your data
profiles.
• ML-Based Data Patterns—Use predefined regex data patterns enhanced with machine
learning (ML) or ML-based data patterns to increase detection accuracy and reduce false
positive detections.
• Exact Data Matching (EDM)—EDM is used to monitor and prevent exfiltration of sensitive
and personally identifiable information (PII) such as social security numbers, Medical Record
Numbers, bank account numbers, and credit card numbers, in a structured data source such
as databases, directory servers, or structured data files with high accuracy.
With EDM, you can reduce false positive detections by uploading data sets with the specific
PII data you want to prevent exfiltration of and use them as match criteria in data profiles.
• Custom Document Types—Enterprise DLP supports the upload and detection of custom
documents containing intellectual property for which you want to prevent exfiltration. This
tool uses ML-based detection models to detect and prevent exfiltration of sensitive data
contained in documents unique to your organization.
With custom document types, you can reduce false positive detections for file-based
traffic by narrowing down the possible file-based detections to just those unique to your
organization. For example, be sure to set a high Overlapping Score Condition threshold
when you create an advanced data profile to detect custom documents. This narrows down
the possible traffic matches by requiring a high degree of overlap between the scanned file
and the custom document type.
• Data Dictionaries—Data dictionaries are a collection of one or more proximity keywords
or phrases that you want to detect and prevent exfilitration. A data dictionary is added as
a match criteria alongside the other supported match criteria in advanced and nested data
profiles to increase the Enterprise Data Loss Prevention (E-DLP) detection accuracy
STEP 4 | Contact Palo Alto Networks Support to help investigate why false positive detections
continue to occur.
Only contact Palo Alto Networks Support if you have implemented the above
recommendations and continue to experience false positive detections. Palo Alto Networks
Support team members will work with your administrators to review your data patterns and
data profiles to help identify what can be further improved.
In some instances, they may go back to review your data patterns and data profiles to see if
any further modifications can be made to narrow the match criteria scope.
STEP 5 | (Predefined Data Patterns and Profiles only) Report a False Positive Detection to Palo Alto
Networks.
Report false positive detections to Palo Alto Networks to improve Enterprise DLP detection
accuracy for yourself and other Enterprise DLP users. You can report snippets of false positive
detections for high confidence traffic matches against predefined regular expression (regex) or
machine learning (ML) data patterns.
All selected DLP incident snippets are shared with Palo Alto Networks when you
submit a false positive report. The selected snippets are stored and accessible by
Palo Alto Networks for up to 90 days to allow Palo Alto Networks to investigate and
improve Enterprise DLP detection accuracy.
Exact Data Matching (EDM) for Enterprise Data Loss Prevention (E-DLP) is an advanced detection
tool to monitor and protect sensitive data from exfiltration. Use EDM to detect sensitive and
personally identifiable information (PII) such as social security numbers, Medical Record Numbers,
bank account numbers, and credit card numbers, in a structured data source such as databases,
directory servers, or structured data files, with high accuracy.
To use EDM, Enterprise DLP relies on the encrypted hash of the sensitive data you upload to
Enterprise DLP. Enterprise DLP indexes the encrypted hash of uploaded EDM data sets. To
prevent the exfiltration of sensitive data, Enterprise DLP uses the indexed hash data set in the
Security policy rule for matching outbound traffic.
By default, EDM data set values must be within 100 characters in order for Enterprise DLP to
successfully detect sensitive data in inspected traffic. Contact Palo Alto Networks Customer
Support to increase the maximum proximity characters to detect sensitive data.
For example, you upload an EDM data set that contains the following data:
In this case, Enterprise DLP detects sensitive data in inspected traffic if Smith and 22334455 are
within 100 characters of each other.
The Exact Data Matching (EDM) CLI app supports CSV and TSV as source files for an encrypted
EDM data set upload to Enterprise Data Loss Prevention (E-DLP). Before you upload an
encrypted EDM data set to Enterprise DLP, review the supported CSV file, TSV file, and data type
formatting.
Enterprise DLP uses an Exact Match for values that don't follow the supported data type format
below or data types that have no unique formatting requirements. If a data type follows the
supported format, Enterprise DLP can match other instances of the data type in the scanned
file. For example, if you configure an EDM filtering profile to block files that contains the social
security number 456-12-7890, Enterprise DLP also matches instances of social security
numbers that are formatted as 456 12 7890 and 456.12.7890. However, if the EDM filtering
profile is configured to block files containing the social security number 456127890, only files
containing an exact match to this social security number are blocked.
When preparing an EDM data set for upload, considering the following:
Contact Palo Alto Networks Customer Support to increase the maximum number of
cells supported for your Enterprise DLP tenant.
By request, Enterprise DLP can support up to 1 billion cells per EDM data set and
up to 2 billion cells per Enterprise DLP tenant across all EDM data sets uploaded to
Enterprise DLP.
• The supported file encoding schemes are UTF-8, UTF-16, ISO-8859-1, and US-ASCII.
• The EDM CLI app removes all punctuation from data contained in the EDM data set.
The EDM CLI app supports the following data type formats for EDM data sets.
DD.MM.YYYY • 02.08.2020
• 02 Aug 2020
DD,MM,YYYY
• 2 August, 2020
DD MM YYYY
• 2 Aug, 2020
• MM-DD-YYYY
• 02 August 2020
MM/DD/YYYY
• 2. August 2020
MM.DD.YYYY • August 2, 2020
MM,DD,YYYY • Aug 2, 2020
MM DD YYYY • Sunday, August 2, 2020
• YYYY-MM-DD • Sunday, August 02, 2020
YYYY/MM/DD • Sunday, 2 August, 2020
YYYY.MM.DD • Sunday 02 August 2020
The Exact Data Matching (EDM) CLI app is a secure CLI tool used to upload hash encrypted EDM
data sets to Enterprise Data Loss Prevention (E-DLP). The EDM CLI app accepts a source file
in CSV or TSV format. The EDM CLI app then generates an encrypted hash EDM data set with
AES-256 encryption of the source file and saves it as a zip file that you can upload to Enterprise
DLP. The EDM CLI app applies a one-way hash to each field in the CSV or TSV file that is then
encoded in Base64. After securing the file, the EDM CLI app generates a zip file containing the
secured data set.
The EDM CLI app is supported on Microsoft Windows and Linux operating systems such as
Ubuntu, Debian, and CentOS.
The EDM CLI app is downloaded from Strata Cloud Manager and includes the following:
• README.TXT—Quick overview of the EDM CLI app functionality, including descriptions of
data types and column values.
• edm-secure-cli-<version>.jar—The executable Java app.
• config.properties—Configuration file you can prepopulate to upload a file to Enterprise DLP.
• upload_config.properties—Configuration file for the connectivity settings to connect to
Enterprise DLP.
• lib—Directory containing all the dependency libraries required by the EDM Secure CLI app.
• log4j2.xml—Configuration files for debugging and logging.
• sample_dataset.csv—Sample CSV file you can use as a template for upload to Enterprise DLP.
• (Windows) edm-secure-cli.bat—Windows batch file used to create and upload an EDM data set
to Enterprise DLP.
(Linux) edm-secure-cli.sh—Bash script used to create and upload an EDM data set to Enterprise
DLP.
STEP 1 | Review the setup prerequisites for Enterprise DLP before you set up the EDM CLI app.
Allow the required FQDNs and IP addresses listed here to successfully upload EDM data sets
and forward traffic to Enterprise DLP for inspection.
STEP 2 | Deploy the device you will use to upload EDM data sets to Enterprise DLP.
You can upload EDM data sets to Enterprise DLP using any physical or virtual device running a
Windows or Linux operating system.
If you plan to deploy a dedicated virtual machine to upload EDM data sets to
Enterprise DLP, Palo Alto Networks recommends you allocate a minimum of four CPUs
and 8 GB memory to the virtual machine.
It might take up to 24 hours for Palo Alto Networks to enable EDM functionality.
Continue to the next step after Palo Alto Networks enabled EDM. You can verify you
enabled EDM when you have the ability to download the EDM CLI app to your local
device.
If you use an older unsupported version of the CLI, the CLI will display an
error message: Please use the latest version of cli tool.
Latest version: <latest-version>.
STEP 6 | (Optional) Create a new folder for EDM on your local device.
The EDM CLI app generates secured versions of all EDM data sets uploaded to Enterprise DLP
and logs for EDM CLI app activity. As a best practice, create a folder just for the EDM CLI app
to contain all EDM-specific files to a single folder.
Refer to the documentation for Microsoft Windows or your specific Linux OS for more
information on creating a new folder.
STEP 8 | Verify the extracted .zip file contains all the required EDM CLI app files.
STEP 10 | (Linux only) Make the EDM CLI app script readable, writable, and executable.
1. Navigate to the directory where you extracted the EDM CLI app .zip contents.
In this example, we extracted the package-edm-secure-cli-<version>-
<platform>.zip contents to the EDM directory.
2. Make the EDM CLI app script readable, writable, and executable.
To configure connectivity to Enterprise Data Loss Prevention (E-DLP), you must create an
access token and then configure the upload_config.properties file included with
the EDM CLI app. The access token you create is how Enterprise DLP authenticates you
and understands which DLP user is uploading an EDM data set to Enterprise DLP. If you
use a proxy server to connect to the internet, you must enter the proxy server details in the
upload_config.properties file as well to successfully upload an EDM data set.
STEP 1 | Access the Common Services Identity and & Access settings and add a Service Account to
generate the Client ID and Client Secret.
If you already have a Service Account created, you can Reset Client Secret to recover
a lost Client Secret.
• Enterprise DLP uses the Client ID and Client Secret to authenticate and connect
the EDM CLI app.
When you create the Service Account, the Client ID and Client Secret are displayed
in the Client Credentials. You can manually copy the Client Credentials or Download CSV
File to download the Client Credentials in plaintext locally to your device.
• You must assign a role to the service account to upload EDM data sets to Enterprise DLP.
EDM data set uploads fail if the service account does not have a role assigned with write
access privileges to Enterprise DLP.
You can assign any predefined role on Strata Cloud Manager or a predefined or custom role
specific to the Enterprise DLP app on Strata Cloud Manager.
If you're creating a service account only for EDM data set uploads, Palo Alto
Networks recommends assigning the DLP Policy Administrator role for the
Enterprise DLP app. The service account uploading EDM data sets to Enterprise
DLP requires write privileges to successfully upload.
Download EDM CLI app version 3.0 or later version to upload an EDM data set to a
TSG-supported tenant.
Download EDM CLI app version 3.5 or later to create an encrypted EDM data set in
an air-gapped environment.
STEP 3 | On the local device where you downloaded the EDM CLI app, navigate to and open the
upload configuration file.
The EDM CLI app bundles the upload configuration file with the package-edm-secure-
cli-<version>-<platform>.zip file contents you extracted when you set up the EDM
CLI app.
The name of the upload configuration file for Linux and Windows versions of the EDM CLI
display as:
• Linux—upload_config.properties
• Windows—upload_config
STEP 4 | Configure the upload configuration file to enable connectivity to Enterprise DLP.
• EDM CLI App Version 3.0
1. In the have_access_token_refresh_token field, enter no.
2. Add the client_id and client_secret.
3. (Proxy server only) Configure the proxy server settings.
Skip this step if you don't require a proxy server for the local device to connect to the
internet.
• Specify whether the local device uploading the EDM data set to Enterprise DLP
requires a proxy server to the connect to the internet.
If you don't require a proxy server, enter no (default).
If you require a proxy server, enter yes.
• Enter the proxy_host_name and proxy_port_number.
• Enter the proxy_user_name and proxy_password.
4. Enter the dataset_name for the EDM data set you want to upload. Enterprise DLP
uses the data set name entered here in Strata Cloud Manager for the uploaded EDM
data set.
5. Save the changes to the upload configuration file.
STEP 5 | (Air-gapped Environments only) Create the environment.properties file to instruct the
EDM CLI app to skip checking for a connection to Enterprise DLP.
1. In the same folder as your other EDM CLI app config files, create the following new
configuration file with the exact file name provided below.
environment.properties
STEP 6 | Create and upload your EDM data sets to Enterprise DLP.
• Upload an Encrypted EDM Data Set to Enterprise DLP Using a Configuration File
• Create and Upload an Encrypted EDM Data to Enterprise DLP in Interactive Mode
You can use the Exact Data Matching (EDM) CLI app using a configuration file to create and
upload an encrypted EDM data set as two individual jobs or create and upload an encrypted EDM
data set in a single job.
The EDM CLI App first hashes the data set using the SHA256 hash function when you initiate an
EDM data set upload. The EDM CLI App then encrypts the EDM data set using AES Symmetric
encryption before beginning the EDM data set upload to the Enterprise DLP EDM data set
storage bucket. The raw data in your EDM data sets never leave your organization's network,
and Enterprise DLP does not store or have access to the raw EDM data set data. Enterprise DLP
stores only hashed and encrypted EDM data set data in the EDM data set storage bucket.
• Create an Encrypted EDM Data Set Using a Configuration File
• Upload an Encrypted EDM Data Set to Enterprise DLP
• Create and Upload an Encrypted EDM Data Set Using a Configuration File
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Create an encrypted hash Exact Data Matching (EDM) data set using a configuration file included
with the EDM CLI app. The configuration file allows you to configure the file parameters for
upload ahead of time rather than manually entering each parameter at the time of creation. You
can also quickly update an existing EDM data set on Enterprise DLP when you configure the
config.properties and upload_config.properties files.
STEP 1 | Set Up the EDM CLI App.
STEP 3 | Review the Supported EDM Data Set Formats and prepare the EDM data set you want to
create.
8. Map your columns using the supported Data Types Value to accurately map each
column in your EDM data set to a specific Data Type.
Refer to the README.txt file packaged with the EDM CLI app for the table to map your
EDM data set columns to the correct Data Type value.
When you create an advanced data profile on Strata Cloud Manager, you’re
required to add at least one column where the column values occurs up to 12
times in the selected EDM data set for the Primary Field.
When mapping your columns to a specific Data Type, be sure to include at
least one column with up to 12 occurrences across the entire EDM data set.
Otherwise, Enterprise DLP is unable to match traffic against the EDM data
profile you create using this EDM data set.
• Linux
Entering this command creates a secured copy of the EDM data set in the package-
edm-secure-cli-<version>-<platform> directory.
3. Verify that the EDM data set uploaded successfully to Enterprise DLP.
The EDM CLI app displays a progress bar and success message to notify you whether the
upload is successful.
STEP 7 | Verify that the EDM CLI app successfully created the encrypted EDM data set.
The EDM CLI app only supports the upload of the encrypted EDM data sets it creates to the
DLP cloud service.
The EDM CLI app creates a secured copy of the EDM data set in the package-edm-secure-
cli-<version>-<platform> directory. In the directory, the EDM CLI app creates a new
folder with the name of the EDM data set appended with the date and time it was created.
Inside this folder is the encrypted output.zip file containing your EDM data set that is
uploaded to the DLP cloud service.
STEP 8 | (Air-gapped Environments only) Transfer the encrypted EDM data set created in the
previous step to an internet-connected device.
Enterprise DLP requires an internet connection to upload an EDM data set. If you generated
the encrypted EDM data set on an air-gapped device, you must first transfer it to an internet-
connected device before you can upload the EDM data set to Enterprise DLP.
You can transfer the entire folder containing the encrypted EDM data set or transfer just the
encrypted EDM data set .zip file containing within.
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Upload encrypted Exact Data Matching (EDM) data sets to the Enterprise Data Loss Prevention
(E-DLP) cloud service using the EDM CLI app. The EDM CLI app supports a single EDM data set
upload at a time.
STEP 1 | Create and encrypted EDM data set.
• Create an Encrypted EDM Data Set Using a Configuration File
• Create an Encrypted EDM Data Set in Interactive mode
Enter n when prompted to deny uploading to the DLP cloud service to create the encrypted
EDM data set.
STEP 2 | Configure EDM CLI App Connectivity to Enterprise DLP if not already configured.
If you’ve already configured the upload_config.properties file, navigate to
the package-edm-secure-cli-<version>-<platform> directory where the
upload_config.properties is located to modify the dataset_name value for the
encrypted EDM data set you want to upload.
STEP 3 | Obtain the path for the encrypted EDM data set you created.
In the package-edm-secure-cli-<version>-<platform> directory, open the folder
containing the EDM data set and right-click the output.zip file to view the Properties. Copy
the file Location.
STEP 5 | Upload the encrypted EDM data set to the DLP cloud service.
• Windows
• Linux
STEP 6 | Verify that the EDM data set uploaded successfully to Enterprise DLP.
The EDM CLI app displays a progress bar and success message to notify you whether the
upload is successful.
During the upload process, the EDM CLI app connects to Enterprise DLP to verify that
you created the output.zipfile using a supported EDM CLI app version. The upload
to Enterprise DLP fails if you created the output.zip file using an unsupported EDM
CLI app version.
example, a 4GB EDM data set upload typically takes about 30 minutes to display on Strata
Cloud Manager and be usable in an advanced data profile.
1. Log in to Strata Cloud Manager
2. Select Manage > Configuration > Data Loss Prevention > Detection Methods > Exact
Data Matching.
3. The EDM data set upload is complete when the Indexing Status column displays
Complete.
Create and Upload an Encrypted EDM Data Set Using a Configuration File
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Create and upload an encrypted hash Exact Data Matching (EDM) data set using a configuration
file included with the EDM CLI app. The configuration file allows you to configure the upload
parameters for upload ahead of time rather than manually entering each parameter at the time
of upload. You can also quickly update an existing EDM data set on Enterprise DLP when you
configure the config.properties and upload_config.properties files.
STEP 1 | Set Up the EDM CLI App.
STEP 3 | Review the Supported EDM Data Set Formats and prepare the EDM data set for upload to
Enterprise DLP.
8. Map your columns using the supported Data Types Value to accurately map each
column in your EDM data set to a specific Data Type.
Refer to the README.txt file packaged with the EDM CLI app for the table to map your
EDM data set columns to the correct Data Type value.
When you create an advanced data profile on Strata Cloud Manager, you’re
required to add at least one column where the column values occurs up to 12
times in the selected EDM data set for the Primary Field.
When mapping your columns to a specific Data Type, be sure to include at
least one column with up to 12 occurrences across the entire EDM data set.
Otherwise, Enterprise DLP is unable to match traffic against the EDM data
profile you create using this EDM data set.
• Linux
The EDM CLI app creates a secured copy of the EDM data set and the EDM data set
begins uploading to Enterprise DLP.
3. Verify that the EDM data set uploaded successfully to Enterprise DLP.
The EDM CLI app displays a progress bar and success message to notify you whether the
upload is successful.
During the upload process, the EDM CLI app connects to Enterprise DLP to
verify that you created the output.zipfile using a supported EDM CLI app
version. The upload to Enterprise DLP fails if you created the output.zip file
using an unsupported EDM CLI app version.
example, a 4GB EDM data set upload typically takes about 30 minutes to display on Strata
Cloud Manager and be usable in an advanced data profile.
1. Log in to Strata Cloud Manager.
2. Select Manage > Configuration > Data Loss Prevention > Detection Methods > Exact
Data Matching.
3. The EDM data set upload is complete when the Indexing Status column displays
Complete.
Upload an encrypted hash Exact Data Matching (EDM) data set to Enterprise DLP using the EDM
CLI app in Interactive mode to successfully create an EDM filtering profile. In Interactive Mode,
you must specify the EDM data set path for upload and configure the upload parameters directly
through the EDM CLI app.
The EDM CLI App first hashes the data set using the SHA256 hash function when you initiate an
EDM data set upload. The EDM CLI App then encrypts the EDM data set using AES Symmetric
encryption before beginning the EDM data set upload to the Enterprise DLP EDM data set
storage bucket. The raw data in your EDM data sets never leave your organization's network,
and Enterprise DLP does not store or have access to the raw EDM data set data. Enterprise DLP
stores only hashed and encrypted EDM data set data in the EDM data set storage bucket.
STEP 1 | Access the Common Services Identity and & Access settings and add a Service Account to
generate the Client ID and Client Secret.
If you already have a Service Account created, you can Reset Client Secret to recover
a lost Client Secret.
Enterprise DLP uses the Client ID and Client Secret to authenticate and connect the
EDM CLI app to Enterprise DLP.
When you create the Service Account, the Client ID and Client Secret are displayed in
the Client Credentials. You can manually copy the Client Credentials or Download CSV File to
download the Client Credentials in plaintext locally to your device
STEP 3 | Review the Supported EDM Data Set Formats and prepare the EDM data set for upload to
Enterprise DLP.
STEP 4 | Enter Interactive mode in the EDM CLI app to begin the EDM data set upload.
1. Open the terminal and navigate to the package-edm-secure-cli-<version>-
<platform> directory where the EDM CLI app is located.
2. Enter Interactive mode in the EDM CLI app.
• Windows
• Linux
Entering this command begins the interactive upload process for EDM data sets to
Enterprise DLP.
STEP 5 | Enter the path of the EDM data set for upload.
STEP 6 | Enter the delimiter used to specify boundaries between values in the EDM data set.
Enterprise DLP supports the “,” and “tab (t) delimiters for CSV or TSV files. The EDM CLI app
uses the delimiter “,” by default. The EDM data set might only use one delimiter.
STEP 8 | Enter the error threshold percentage for the EDM data set.
The EDM CLI app does not create an encrypted version of the EDM data set if it encounters
errors exceeding the specified error threshold percentage.
STEP 9 | Specify whether the EDM data set has a header row.
STEP 10 | Specify whether to allow uploads of EDM data sets that include empty or blank cells.
Enter true to allow rows that include empty or blank cells in an EDM data set.
Enter false to reject rows that include empty or blank cells in an EDM data set.
STEP 11 | Specify whether the EDM CLI app should abort the EDM data set upload if the EDM data set
includes more than the maximum number of cells supported.
Enter true to upload the maximum number of data set cells supported.
Enter false to abort EDM CLI app if the EDM data set has more than the maximum number
of data set cells supported.
STEP 13 | Map your columns using the supported Data Types Value to accurately map each column in
your EDM data set to a specific Data Type.
The EMD CLI app presents a table with each Data Type Name and the corresponding Data
Type Value. You can also view this table in the README.txt file packaged with the EDM CLI
app.
When you create an advanced data profile on Strata Cloud Manager, you’re required
to add at least one column where the column values occurs up to 12 times in the
selected EDM data set for the Primary Field.
When mapping your columns to a specific Data Type, be sure to include at least
one column with up to 12 occurrences across the entire EDM data set. Otherwise,
Enterprise DLP is unable to match traffic against the EDM data profile you create
using this EDM data set.
STEP 14 | Specify whether to upload the EDM data set to Enterprise DLP. Enter y to continue
uploading the EDM data set or n to upload the EDM data set later.
Entering n creates a secured copy of the EDM data set in the package-edm-
secure-cli-<version>-<platform> directory for you to review.
You can skip the remaining steps below and Upload an Encrypted EDM Data Set to
Enterprise DLP later.
STEP 15 | Enter y to create a new EDM data set and enter the data set name.
If you enter n and are uploading to Enterprise DLP, you’re still prompted to enter an
EDM data set name. This updates the existing EDM data set you previously uploaded
to Enterprise DLP.
STEP 16 | Specify the authentication mechanism used to upload the EDM data set to Enterprise DLP.
1. When prompted about whether you have access and refresh token, enter n.
Enterprise DLP requires you end the Client ID and Client Secret to upload EDM
data sets.
2. Enter the Client ID and Client Secret.
STEP 17 | (Proxy server only) When prompted, enter y if the local device from which you’re uploading
requires a proxy server to connect to the internet.
You’re required to provide the following information for your proxy server.
• Proxy hostname
• Proxy port number
• Proxy username
• Proxy password
STEP 18 | Enter Y or y to confirm the EDM data set upload configuration is correct and begin uploading
to Enterprise DLP.
The EDM CLI app creates a secured copy of the EDM data set in the package-edm-secure-
cli-<version>-<platform>. In the directory, the EDM CLI app creates a new folder
with the name of the EDM data set you appended with the date and time the EDM CLI app
created it. This folder contains the encrypted output.zip file of your EDM data set that you
uploaded to Enterprise DLP.
The EDM CLI app displays a progress bar and success message to notify you whether the
upload is successful.
During the upload process, the EDM CLI app connects to Enterprise DLP to verify that
you created the output.zipfile using a supported EDM CLI app version. The upload
to Enterprise DLP fails if you created the output.zip file using an unsupported EDM
CLI app version.
example, a 4GB EDM data set upload typically takes about 30 minutes to display on Strata
Cloud Manager and be usable in an advanced data profile.
1. Log in to Strata Cloud Manager.
2. Select Manage > Configuration > Data Loss Prevention > Detection Methods > Exact
Data Matching.
3. The EDM data set upload is complete when the Indexing Status column displays
Complete.
Update an existing Exact Data Match (EDM) data set you already uploaded to Enterprise
DLP. To quickly update an existing EDM data set on Enterprise DLP, configure the
upload_config.properties and config.properties files. To update an existing EDM
data set, you must upload the entire encrypted EDM data set to Enterprise DLP. Updating an
existing data set on Enterprise DLP overwrites the existing data set with the same data set name.
If you prefer using Interactive mode to upload an EDM data set to Enterprise DLP, see Create and
Upload an Encrypted EDM Data to Enterprise DLP in Interactive Mode for more information. You
must still go through the Interactive mode upload process, but you must enter n when prompted
whether to create a new EDM data set on Enterprise DLP.
STEP 1 | On the local device where you downloaded the EDM CLI app, navigate to and open the
upload_config.properties file.
The EDM CLI app bundles the upload_config.properties file in the package-edm-
secure-cli-<version>-<platform>.zip file you extracted when you set up the EDM
CLI app.
• Linux
Entering this command creates a secured copy of the EDM data set specified in the
config.properties file and begins uploading to Enterprise DLP.
3. Verify that you successfully uploaded the EDM data set to Enterprise DLP.
The EDM CLI app displays a progress bar and success message to notify you whether
you successfully uploaded the EDM data set or if the upload failed.
Integrate Enterprise Data Loss Prevention (E-DLP) with Cortex XSOAR to use Enterprise DLP End
User Alerting, granting your team members the ability to self-service temporary exemptions for
file uploads that match your Enterprise DLP data profiles.
• About Enterprise DLP End User Alerting with Cortex XSOAR
• Set Up Enterprise DLP End User Alerting with Cortex XSOAR
• Respond to Blocked Traffic Using Enterprise DLP End User Alerting with Cortex XSOAR
• View the Enterprise DLP End User Alerting with Cortex XSOAR Response History
Enterprise Data Loss Prevention (E-DLP) End User Alerting with Cortex XSOAR allows your team
members to understand why a file upload was blocked by Enterprise DLP and enables self-service
temporary exemptions for file uploads that match your Enterprise DLP data profiles. Enterprise
DLP End User Alerting with Cortex XSOAR provides an audit trail to better understand the upload
and response history for every file scanned by the DLP cloud service. Additionally, enabling End
User Alerting with Cortex XSOAR prevents malware triggered uploads because an affirmative
action is required to request an exemption.
Enterprise DLP End User Alerting with Cortex XSOAR requires integration with the Enterprise
DLP application. You can view responses to file uploads that match your data filtering profiles
and data profiles for supported apps only. For some applications, End User Alerting with Cortex
XSOAR requires IP mapping to email addresses to furnishing exemption queries to your team
members. After you successfully integrate Enterprise DLP with Cortex XSOAR and configure
the exemption duration, the team member who uploads a matched file is presented with an
automated message to confirm if the file includes sensitive data that triggers a block verdict from
the DLP cloud service. If the team member responds that the file does contain sensitive data,
they’re given the option request a temporary exception for the specific file.
If the team member responds that the file doesn’t contain sensitive information, the DLP
cloud service flags the file as a false positive. However, Enterprise DLP continues to block
the file upload.
The Enterprise DLP cloud service preserves the response history for all scanned files after
End User Alerting with Cortex XSOAR is enabled. For example, your team member uploads
file_A.pdf that matches a data profile match criteria. The team member is prompted to
confirm if the file contains sensitive information, to which they answer Yes and request an
exemption. A few days later, the team member uploads file_A.pdf again. This time they’re
only prompted to request an exemption because the DLP cloud service is already aware of the file
response history.
Integrate Enterprise Data Loss Prevention (E-DLP) with Cortex XSOAR to use the Enterprise DLP
End User Alerting.
(Slack) To set up Enterprise Data Loss Prevention (E-DLP) End User Alerting with Cortex XSOAR
and set up automatic Slack alerts, you need to integrate your preferred IP address directory
service to map IP addresses to emails to allow for automatic messages to be sent on Slack. After
integration, you must enable Slack, email send integration, and Enterprise DLP with Cortex
XSOAR. This chain of integration allows the DLP cloud service to automate sending Slack
messages to team members who upload a file that matches your data profiles.
(Microsoft Teams) To set up Enterprise Data Loss Prevention (E-DLP) End User Alerting with
Cortex XSOAR and set up automatic Microsoft Teams alerts, you need to set up integration with
Microsoft Teams and Enterprise DLP with Cortex XSOAR. This is integration allows the DLP cloud
service to automate sending Microsoft Teams messages to team members who upload a file that
matches your data profiles.
(Email) To set up Enterprise Data Loss Prevention (E-DLP) End User Alerting with Cortex XSOAR
and set up automatic email alerts, you need to integrate your preferred IP address directory
service and Enterprise DLP with Cortex XSOAR. This is integration allows the DLP cloud service
to automate sending email messages to team members who upload a file that matches your data
profiles.
After you successfully integrate Slack, Microsoft Teams, or your Email provider and Enterprise
DLP with Cortex XSOAR, you need to enable End User Alerting with Cortex XSOAR functionality
on Strata Cloud Manager and configure the End User Alerting settings as needed.
• Slack
• Microsoft Teams
• Email
Slack
STEP 1 | Integrate your preferred IP address directory service using one of the following procedures.
• Integrate AWS - Identity and Access Management
• Integrate MSGraphAzure Users
• Integrate Okta v2
• Integrate PingOne
• Integrate SailPoint IdentityIQ
• Integrate SailPoint IdentityNow
If you already have a Service Account created, you can Reset Client Secret to
recover a lost Client Secret.
STEP 6 | Configure the DLP Incident Feedback Loop Cortex XSOAR playbook
1. In Dashboard & Reports, select Playbooks.
2. Select DLP Incident Feedback Loops > Playbook Triggered.
3. Configure the Cortex XSOAR playbook.
• For ApprovalTarget, enter Manager to send an exemption request to the sender's
manager. This information is pulled from your preferred IP address directory service.
• For the UserMessageApp, verify Slack is displayed.
• For the ApproverMessageApp, enter Slack.
• (Optional) For the DenyMessage, enter a custom response when a file extension is
denied by the sender's manager,
4. Save.
STEP 8 | Configure the End User Alerting with Cortex XSOAR exemption settings.
1. Select Manage > Configuration > Data Loss Prevention > Settings > Alerts >
Configuration and configure the Exemption Duration.
The file that prompted the End User Alerting with Cortex XSOAR notification that was
exempted can be uploaded for the duration of the exemption duration. The default is 12
hours.
2. Select Manage > Configuration > Data Loss Prevention > Settings > Alerts >
Configuration and configure whether to Include Snippets in Message.
You can select Off (default) to not include a snippet of the sensitive data or On to
include a snippet of the sensitive data in the automated message on Slack.
Microsoft Teams
STEP 1 | Set up the prerequisites needed to begin integrating Microsoft Teams with Cortex XSOAR.
1. Integrate referred IP address directory service using one of the following procedures.
• Integrate AWS - Identity and Access Management
• Integrate MSGraphAzure Users
• Integrate Okta v2
• Integrate PingOne
• Integrate SailPoint IdentityIQ
• Integrate SailPoint IdentityNow
2. Create the Demisto Bot in Microsoft Teams.
3. Grant the Demisto Bot Permissions in Microsoft Graph.
4. Configure Microsoft Teams on Cortex XSOAR.
5. Add the Demisto Bot to a Team.
If you already have a Service Account created, you can Reset Client Secret to
recover a lost Client Secret.
If Data Loss Prevention is not displayed, hover your mouse over the field to display
the list of available incident types to search for and select Data Loss Prevention.
4. Add the Access Token and Refresh Token you created in the previous step.
5. Check (enable) Long running instance.
6. (Optional) Modify the automated Slack Bot Message.
7. Test to confirm Cortex XSOAR has successfully integrated with Enterprise DLP.
A Success is displayed when Cortex XSOAR successfully integrates with Enterprise
DLP.
STEP 5 | Configure the DLP Incident Feedback Loop Cortex XSOAR playbook
1. In Dashboard & Reports, select Playbooks.
2. Select DLP Incident Feedback Loops > Playbook Triggered.
3. Configure the Cortex XSOAR playbook.
• For ApprovalTarget, enter Manager to send an exemption request to the sender's
manager. This information is pulled from your preferred IP address directory service.
• For the UserMessageApp, verify Microsoft Teams is displayed.
• For the ApproverMessageApp, enter Microsoft Teams.
• (Optional) For the DenyMessage, enter a custom response when a file extension is
denied by the sender's manager,
4. Save.
STEP 7 | Configure the End User Alerting with Cortex XSOAR exemption settings.
1. Select Manage > Configuration > Data Loss Prevention > Settings > Alerts >
Configuration and configure the Exemption Duration.
The file that prompted the End User Alerting with Cortex XSOAR notification that was
exempted can be uploaded for the duration of the exemption duration. The default is 12
hours.
2. Select Manage > Configuration > Data Loss Prevention > Settings > Alerts >
Configuration and configure whether to Include Snippets in Message.
You can select Off (default) to not include a snippet of the sensitive data or On to
include a snippet of the sensitive data in the automated message on Microsoft Teams.
STEP 1 | Integrate referred IP address directory service using one of the following procedures.
• Integrate AWS - Identity and Access Management
• Integrate MSGraphAzure Users
• Integrate Okta v2
• Integrate PingOne
• Integrate SailPoint IdentityIQ
• Integrate SailPoint IdentityNow
If you already have a Service Account created, you can Reset Client Secret to
recover a lost Client Secret.
If Data Loss Prevention is not displayed, hover your mouse over the field to display
the list of available incident types to search for and select Data Loss Prevention.
4. Add the Access Token and Refresh Token you created in the previous step.
5. Check (enable) Long running instance.
6. (Optional) Modify the automated Slack Bot Message.
7. Test to confirm Cortex XSOAR has successfully integrated with Enterprise DLP.
A Success is displayed when Cortex XSOAR successfully integrates with Enterprise
DLP.
STEP 4 | Configure the DLP Incident Feedback Loop Cortex XSOAR playbook
1. In Dashboard & Reports, select Playbooks.
2. Select DLP Incident Feedback Loops > Playbook Triggered.
3. Configure the Cortex XSOAR playbook.
• For ApprovalTarget, enter Manager to send an exemption request to the sender's
manager. This information is pulled from your preferred IP address directory service.
• For the UserMessageApp, verify Email is displayed.
• For the ApproverMessageApp, enter Email.
• (Optional) For the DenyMessage, enter a custom response when a file extension is
denied by the sender's manager,
4. Save.
STEP 6 | Configure the End User Alerting with Cortex XSOAR exemption settings.
1. Select Manage > Configuration > Data Loss Prevention > Settings > Alerts >
Configuration and configure the Exemption Duration.
The file that prompted the End User Alerting with Cortex XSOAR notification that was
exempted can be uploaded for the duration of the exemption duration. The default is 12
hours.
2. Select Manage > Configuration > Data Loss Prevention > Settings > Alerts >
Configuration and configure whether to Include Snippets in Message.
You can select Off (default) to not include a snippet of the sensitive data or On to
include a snippet of the sensitive data in the automated message on Microsoft Teams.
After you Set Up Enterprise DLP End User Alerting with Cortex XSOAR and a file upload matches
your data profile, the team member who uploaded the file is automatically alerted on Slack to
confirm whether the file they uploaded contains sensitive information.
The DLP cloud service maintains a response history for all files that trigger End User Alerting with
Cortex XSOAR based on your response.
• Confirmed Sensitive - End user confirmed that Yes,, the file contains sensitive data but
No, the end user didn’t request an exemption.
For all future uploads of the file, the file upload remains blocked and end users aren’t prompted
to request for an exemption.
• Exception Requested - End user confirmed that Yes, the file contains sensitive data and
Yes, the end user requested an exemption.
For all future uploads of the file, end users aren’t prompted to confirm the file contains
sensitive data but are prompted to request for an exemption.
• Confirmed False Positive - End user confirmed that No, the file doesn’t contain
sensitive data.
For all future uploads of the file, the file uploads remain blocked and end users aren’t prompted
to confirm if the file contains sensitive data.
This procedure assumes you have already created a data profile and have successfully set up
Enterprise DLP End User Alerting with Cortex XSOAR.
STEP 1 | Upload a file containing sensitive data that matches a data profile.
STEP 2 | On Slack, the Enterprise DLP Bot sends an automated message to the team member who
uploaded the file containing sensitive data.
Select Yes to confirm that the uploaded file containing sensitive data and to request an
exemption.
Select No to confirm that the uploaded files doesn’t contain sensitive data and flag the file as
a false positive. If you select No, the file remains as blocked for any future upload of the
same file. You will receive confirmation for the Enterprise DLP Bot that your response was
successfully received.
STEP 3 | If you selected Yes and the file contains sensitive information, select Yes when prompted to
request a temporary exemption for the uploaded file.
Select No if you don’t want to request a temporary exemption for the file. The file upload
remains blocked.
Skip this step if you selected No in the previous step and the file doesn’t contain sensitive data.
STEP 4 | The Enterprise DLP Bot confirms that the exemption was granted.
You can now reupload the file as needed for the length of the Exemption Duration.
View the Enterprise DLP End User Alerting with Cortex XSOAR
Response History
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
The Enterprise Data Loss Prevention (E-DLP) End User Alerting with Cortex XSOAR response
history provides an audit trail for administrators to understand which end user uploaded a file
containing sensitive data and how they responded to the Enterprise DLP Bot on Slack.
The possible response statuses are:
• Pending Response - The automated Enterprise DLP Bot message was sent and is pending a
response.
• Confirmed Sensitive - End user confirmed that Yes, the file contains sensitive data but
No, the end user didn’t request an exemption.
For all future uploads of the file, the file upload remains blocked and end users aren’t prompted
to request for an exemption.
• Exception Requested - End user confirmed that Yes, the file contains sensitive data and
Yes, the end user requested an exemption.
For all future uploads of the file, end users aren’t prompted to confirm the file contains
sensitive data but are prompted to request for an exemption.
• Confirmed False Positive - End user confirmed that No, the file doesn’t contain
sensitive data.
For all future uploads of the file, the file uploads remain blocked and end users aren’t prompted
to confirm if the file contains sensitive data.
STEP 1 | Log in based on the platform on which you’re using Enterprise DLP.
• Panorama (Next-Gen Firewalls) and Prisma Access (Managed by Panorama) - Log in to the
DLP app on the hub.
If you don’t already have access to the DLP app on the hub, see the hub Getting Started
Guide. Only Superusers can access the hub.
• Strata Cloud Manager - Log in to Strata Cloud Manager.
STEP 3 | In the Incidents section, view the Response Status for all file uploads.
You can also Add New Filter to filter Enterprise DLP Incidents based on the Response
Status.
STEP 4 | Click on the File name to view the detailed Response History for that specific file.
The detailed response history includes the team member who uploaded the file and how they
responded to the Enterprise DLP Bot.
Use Enterprise Data Loss Prevention (E-DLP) to inspect contextual chat messages for chat-based
applications to identify and alert administrators when passwords are shared.
• About Inspection of Contextual Secrets
• Contextual Chat Examples
• Configure SaaS Security to Inspect for Contextual Secrets
Use Enterprise Data Loss Prevention (E-DLP) to inspection contextual chat messages to monitor
sharing of sensitive passwords over chat-based applications. Enterprise DLP uses contextual
messages to understand instances where a password might have been shared. When Enterprise
DLP detects that a password was shared, a DLP Incident is generated that displays a snippet of
the response containing the password.
the contextual message was already associated with the first response message and the second
threaded response exceeds the 60-minute time limit.
The contextual message, and password shared in response to a contextual message, must be in
text format for Enterprise DLP to detect and generate a DLP Incident. Enterprise DLP can’t detect
if a password was shared in a response to a contextual message if:
• The contextual message is a text or image attachment
• The response to the contextual message is a text or image attachment
The table below shows various examples of combinations of contextual statements formats
that would trigger inspection Enterprise Data Loss Prevention (E-DLP), as well as examples of
passwords with varying complexity that would be blocked by Enterprise DLP.
Can you please share Virus DB credentials Alex, username is your email address and
with Alex? passwd is pA$$w0rd!23
what were the credentials for the Google username - <user> and passwd - gQxHD4&%
Cloud accounts?
To configure SaaS Security to inspect for contextual secrets, you must leverage an Enterprise
Data Loss Prevention (E-DLP) data profile containing data pattern match criteria that looks for
passwords and credentials. After the data profile is enabled, it must be associated with a policy
rule recommendation.
STEP 3 | Select Manage > Configuration > SaaS Security > Settings > Data Profiles and verify that the
predefined Secrets and Credentials data profile is enabled.
(Optional) Instead of using the predefined data profile, you can create a data profile
and add the predefined ML-based Application Credential data pattern. Adding
a custom data pattern with regex match criteria to a custom data profile is not
supported for inspection for contextual secrets.
Use Enterprise Data Loss Prevention (E-DLP) to safeguard against GPT language model data
leakages.
• How Enterprise DLP Safeguards Against ChatGPT Data Leakage
• Create a Security Policy Rule for ChatGPT
Learn more about using Enterprise Data Loss Prevention (E-DLP) in your Security policy rules to
prevent data exfiltration to ChatGPT.
With the rise of generative Artificial Intelligence (AI), new Natural Language Processing and
Generation (NPL/NLG) interface-based apps have seen unprecedented adoption. ChatGPT is a
popular generative pre-trained transformer (GPT) language model application and presents an
ever increasing risk of exfiltration of sensitive data. Palo Alto Networks maintains its commitment
to a holistic approach on data security. Enterprise DLP offers immediate prevention of sensitive
data exfiltration to AI apps like ChatGPT.
Next-Generation CASB
• Use the Discovered Apps (Discovered Apps > Applications) to discover traffic to ChatGPT.
• Add Filter to narrow down the Category to Artificial Intelligence applications and Tag as
Unknown.
This filter allows you to narrow down all traffic to uncategorised AI applications on your
network. Uncategorised applications display as unknown but can be manually recategorized
as sanctioned, unsanctioned, or tolerated once the initial discovery is completed
based on your organization's risk posture.
• Alternatively, you can search for ChatGPT in the Search Application Name search
bar.
Use Enterprise Data Loss Prevention (E-DLP)to prevent exfiltration of sensitive data to ChatGPT.
in a new or existing Security policy rule.
(SaaS Security only) If you would rather block access to ChatGPT on your network, you can
do so from the SaaS Security Applications dashboard (Manage > Configuration > Security
Services > SaaS Application Management > Discovered Apps > Applications). Using the SaaS
Security Application dashboard to Block Access allows you to quickly generate a policy rule
recommendation, rather than manually creating one on your own.
(Strata Cloud Manager and SaaS Security) Support for non-file based HTTP/2 traffic
inspection is required to successfully prevent exfiltration to ChatGPT. Your Strata Cloud
Manager tenant must be running Software Version 10.2.3 or later release.
(Panorama) Support for non-file based HTTP/2 traffic inspection is required to
successfully prevent exfiltration to ChatGPT. You must upgrade Panorama and all
managed firewalls to PAN-OS 10.2.3 or later release. Additionally, you must upgrade the
Panorama plugin for Enterprise DLP to 3.0.2 or later release.
STEP 3 | Select Manage > Configuration > NGFW and Prisma Access > Security Services >
Decryption and create the decryption profile and policy rule required to enable Enterprise
DLP on Strata Cloud Manager.
Do not enable Strip ALPN in the decryption profile. Enterprise DLP cannot inspect
egress traffic to ChatGPT if you remove application-layer protocol negotiation (ALPN)
headers from decrypted traffic.
STEP 6 | Select Manage > Configuration > Data Loss Prevention > DLP Rules and in the Actions
column, Edit the DLP rule.
1. Enable Non-File Based Match Criteria.
DLP rules configured for non-file detection are required to prevent exfiltration of
sensitive data to ChatGPT. You can further modify the DLP rule to enforce your
organization’s data security standards. The DLP rule has an identical name as the data
profile from which it was automatically created.
You can keep File Based Matched Criteria enabled or disable as needed. Enabling this
setting has no impact on detection of egress traffic to ChatGPT as long as Non-File
Based Match Criteria is enabled.
STEP 7 | Create a Shared Profile Group for the Enterprise DLP data filtering profile.
1. Select Manage > Configuration > NGFW and Prisma Access > Security Services >
Profile Groups and Add Profile Group.
2. Enter a descriptive Name for the Profile Group.
3. For the Data Loss Prevention Profile, select the Enterprise DLP data profile.
4. Add any other additional profiles as needed.
5. Save the profile group.
Alternatively, you can create or add ChatGPT to an Internet Access policy rule. You
can skip this step if you create a Internet Access policy rule for ChatGPT.
1. Select Manage > Configuration > Security Services > Security Policy and Add Rule.
You can also update an existing Security policy to attach a Profile Group for Enterprise
DLP filtering.
2. In the Applications, Services, and URLs section, Add Applications to search for and select
openai-chatgpt.
3. Navigate to the Action and Advanced Inspection section, and select the Profile Group
you created in the previous step.
The Action you specify in the data profile determines whether egress traffic to
ChatGPT is blocked. The Security policy rule Action does not impact whether
matched traffic is blocked.
For example, you configured the data filtering profile to Block matching egress
traffic but configure the Security policy rule Action to Allow. In this scenario, the
matching egress traffic to ChatGPT is blocked.
5. Save the Security policy.
SaaS Security
STEP 3 | Select Manage > Configuration > NGFW and Prisma Access > Security Services >
Decryption and create the decryption profile and policy rule required to enable Enterprise
DLP on Strata Cloud Manager.
Do not enable Strip ALPN in the decryption profile. Enterprise DLP cannot inspect
egress traffic to ChatGPT if you remove application-layer protocol negotiation (ALPN)
headers from decrypted traffic.
STEP 6 | Select Manage > Configuration > Data Loss Prevention > DLP Rules and in the Actions
column, Edit the DLP rule.
1. Enable Non-File Based Match Criteria.
DLP rules configured for non-file detection are required to prevent exfiltration of
sensitive data to ChatGPT. You can further modify the DLP rule to enforce your
organization’s data security standards. The DLP rule has an identical name as the data
profile from which it was automatically created.
You can keep File Based Matched Criteria enabled or disable as needed. Enabling this
setting has no impact on detection of egress traffic to ChatGPT as long as Non-File
Based Match Criteria is enabled.
STEP 7 | Select Manage > Configuration > SaaS Security > Discovered Apps > Policy
Recommendations to create a Security policy rule recommendation.
A SaaS policy rule recommendation is required to leverage the Enterprise Data Loss
Prevention (E-DLP) data profile in SaaS Security.
1. In the Select Applications section, search for and select ChatGPT.
2. In the Data Profile section, search for and select the data profile you enabled in the
previous step.
3. Configure the policy rule recommendation as needed.
4. Save.
Panorama
STEP 1 | Upgrade Panorama, managed firewalls, and the Enterprise DLP plugin to the minimum
required versions.
1. Upgrade Panorama to PAN-OS 10.2.3 or later release.
2. Upgrade the Enterprise DLP plugin to 3.0.2 or later release.
3. Upgrade managed firewalls to PAN-OS 10.2.3 or later release.
STEP 3 | Create the decryption policy rule required for Enterprise DLP.
1. Select Objects > Decryption > Decryption Profile and specify the Device Group.
Add a new decryption profile. The default decryption profile configuration is all that is
required for Enterprise DLP to inspect traffic.
Do not enable Strip ALPN in the decryption profile. Enterprise DLP cannot
inspect egress traffic to ChatGPT if you remove application-layer protocol
negotiation (ALPN) headers from decrypted traffic.
2. Select Policies > Decryption and specify the Device Group.
Add a new decryption policy rule. Select Options and assign the decryption profile.
1. For the Action, select Decrypt.
2. Select the Decryption Profile you created.
3. Click OK.
STEP 5 | Create a data profile on Panorama or Strata Cloud Manager, or use an existing data profile.
The Action you specify in the data filtering profile determines whether egress
traffic to ChatGPT is blocked. The Security policy rule Action does not impact
whether matched traffic is blocked.
For example, if you configured the data filtering profile to Block matching egress
traffic but configure the Security policy rule Action to Allow, the matching
egress traffic to ChatGPT will be blocked.
7. Click OK.
STEP 7 | Commit and push the new configuration to your managed firewalls to complete the
Enterprise DLP plugin installation.
This step is required for Enterprise DLP data filtering profile names to appear in Data Filtering
logs.
The Commit and Push command isn’t recommended for Enterprise DLP configuration
changes. Using the Commit and Push command requires the additional and
unnecessary overheard of manually selecting the impacted templates and managed
firewalls in the Push Scope Selection.
You must always include the temporary __dlp administrator when performing a
partial configuration push. This is required to keep Panorama and the DLP cloud
service in sync.
For example, you have an admin Panorama admin user who is allowed to commit
and push configuration changes. The admin user made changes to the Enterprise
DLP configuration and only wants to commit and push these changes to managed
firewalls. In this case, the admin user is required to also select the __dlp user in
the partial commit and push operations.
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
3. Commit.
4. Select Commit > Push to Devices.
5. Select Push Changes Made By and then click the current Panorama admin user to select
additional admins to include in the partial push.
In this example, the admin user is currently logged in and performing the push
operation. The admin user must click admin and then select the __dlp user. If there are
additional configuration changes made by other Panorama admins they can be selected
here as well.
Click OK to continue.
Upload your custom documents that contain intellectual property or sensitive information
to Enterprise Data Loss Prevention (E-DLP) to create custom document types. Your custom
document types are used as match criteria in advanced data profile to detect and prevent
exfiltration.
• About Custom Document Types
• Upload a Custom Document Type
• Test a Custom Document Type
Enterprise Data Loss Prevention (E-DLP) supports upload and detection of custom documents
containing intellectual property for which you want to prevent exfiltration. You can upload a
custom document type to Enterprise DLP, or used a predefined document type, to classify and
detect standardized documents and prevent exfiltration of sensitive data. You use the uploaded
custom document types in data profiles as match criteria. Additionally, you can use custom
document types along with predefined Machine Learning-based data patterns to apply additional
ML-based detection algorithms complimented by confidential or sensitive data specific to your
organization.
Enterprise DLP uses Indexed Document Matching and Trainable Classifiers to fingerprint and
index uploaded custom documents to scan for and detect documents that completely or partially
match what you have already uploaded.
• Indexed Document Matching (IDM)—Used to fingerprint documents and create a document
type for documents commonly used by your organization. Uploading multiple documents
allows you to create a custom document repository that you can use in a data profile.
• Trainable Classifiers—Supervised machine learning model that analyzes document types for
classifications. As you upload more custom documents as types, Enterprise DLP is able to
continuously train the ML model to accurately detect sensitive data matches to inspect for and
prevent exfiltration (Positive Training Documents) and those to ignore (Negative Training Set).
The upload of set of custom documents using Trainable Classifiers is referred to as a custom
document model.
Using IDM and Trainable Classifiers for detection of sensitive data is powerful enables Enterprise
DLP to continuously improve its detection capabilities by indexing unstructured text in your
documents.
• IDM Examples
• Examples of different types of custom documents where IDM can be successfully applied
are:
• Standardized forms or documents specific to your business or organization
• Patent documents
• Specific business agreements
• Specific intellectual property documents
• Examples of different types of custom documents where IDM is less successful because
they are too generic or not specific to your organization
• Generic whitepapers
• Generic datasheets
• Image or graphic-heavy documents with little text.
• Trainable Classifier Examples
• Examples of different types of custom Positive Training Documents:
• Proprietary product source code
• Proprietary product formulas
• Prerelease earnings, sales estimates, or accounting documents
• Confidential marketing plans
• Patient medical records
• Customer purchasing documents and patterns
• Confidential legal documents, and Merger & Acquisition documents
• Proprietary manufacturing methods
• Examples of different types of custom Negative Training Documents:
• Proprietary code from open source projects
• Non-proprietary product information
• Details of published annual accounts
• Published marketing collateral and advertising copy
• Healthcare documents
• Publicly available consumer data
• Publicly available materials and press releases
• Industry standards and research
For example, your organization both buys and sells software. You want to only detect instances
of sensitive customer data contained in invoices for software that you sell. In this case, you can
upload a copy of your organization's invoice as a custom document types for fingerprinting.
However, custom document types will be less effective if you wanted to detect receipts for
software your organization purchases. This is because there is too much variance in format
between the various software vendors your organization purchases from. Greater document
variance results in less accurate detection of matched traffic.
Upload a custom document to Enterprise Data Loss Prevention (E-DLP) using Indexed Document
Matching (IDM) or Trainable Classifiers to create a custom document type or model. Enterprise
DLP uses custom documents types and models to classify and detect your standardized
documents and prevent exfiltration of sensitive data.
Custom document uploads using Trainable Classifiers allows you to specify two different training
documents types with a single custom document model. Enterprise DLP supports up to 10 unique
custom document models for a single Next-Generation CASB for Prisma Access and NGFW or
Next-Generation CASB for Prisma Access and NGFW (CASB-X) tenant.
• Positive Training Documents—Custom documents containing sensitive data that you want
Enterprise DLP to inspect for and prevent exfiltration.
• Negative Training Documents—Custom documents that you don’t want Enterprise DLP to
inspect for. Enterprise DLP ignores sensitive data in these document types added to this
training set.
Enterprise DLP will inspect for and prevent exfilitration of sensitive data in the event there is
overlap between documents in the positive and negative training documents.
(Trainable Classifiers only) You must add at least one positive and one negative training
document to successfully test and upload custom document types.
You can't delete a custom document type after you add a custom document type to an advanced
data profile. You need to remove the custom document type from the data profile to delete it
from Enterprise DLP.
• IDM
• Trainable Classifiers
IDM
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Document Types.
STEP 5 | In Document Types, verify that your custom document successfully uploaded to Enterprise
DLP.
To quickly find the document, you can search for the custom document Name. After you have
located the custom document, confirm the Status is Completed.
Trainable Classifiers
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Document Types.
STEP 5 | In Document Types, verify that your custom document successfully uploaded to Enterprise
DLP.
To quickly find the document, you can search for the custom document Name. After you have
located the custom document, confirm the Status is Completed.
Run a test for your custom document types to verify that Enterprise Data Loss Prevention (E-DLP)
can successfully detect a custom document before they leave your network.
STEP 1 | Log in to Strata Cloud Manager.
STEP 3 | Select Manage > Configuration > Data Loss Prevention > Document Types.
STEP 4 | Search for the custom document type you want to test and expend the Actions to Test the
custom document type.
STEP 5 | Browse Files and select the documents you want to test against the custom document type.
You can test up to five documents at once. Document must be one of the file types supported
by Enterprise DLP.
Enterprise DLP displays the Overlapping Score for each of the documents you tested. The
overlapping score represents how much content in the tested document matches the custom
document type. A score of 0 represents no commonalities between the test document and
the custom document type. A score of 100 represents a near-total match between the test
document and the custom document type.
Email DLP
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Enterprise DLP prevents exfiltration of emails containing sensitive information with AI/ML
powered data detections. For example, Enterprise DLP can prevent exfiltration of sensitive data
over an outbound email sent from a salesperson within your organization to their personal email.
• How Does Email DLP Work?
• Onboard Microsoft Exchange Online
• Onboard Gmail
• Add an Email DLP Policy Rule
• Review Email DLP Incidents
• Why Are Emails Not Being Blocked?
To prevent sensitive data exfiltration, Enterprise Data Loss Prevention (E-DLP) needs to perform
inline inspection of all outbound emails. To do this, Enterprise DLP uses an inbound and outbound
connector to transport outbound emails to and from Enterprise DLP for inspection and verdict
rendering. You must also create email transport rules to specify the actions Microsoft Exchange or
Gmail take based on the verdicts rendered by Enterprise DLP.
Enterprise DLP adds an email header to the email after inspection to indicate that Enterprise DLP
has already inspected the email. If Enterprise DLP renders a Block or Quarantine verdict for
inspected email, an email header to indicate the verdict is added as well. Emails that are already
inspected are not transported to Enterprise DLP a second time and Microsoft Exchange or Gmail
take action based on the existing email headers.
After Enterprise DLP inspects an email, it's returned back to Microsoft Exchange or Gmail for
further action based on the rendered verdict.
The email flow for inline inspection of emails using Enterprise DLP is as follows:
1. An email is sent from within your organization to a recipient outside your organization.
The outbound email can be sent from a desktop mail client, a web-based mail client, or a
mobile device.
2. The email transport rule instructs Microsoft Exchange or Gmail to forward the outbound email
to Enterprise DLP for inspection.
3. Enterprise DLP inspects the email subject line, body, and attachments against your Email DLP
policies and renders a verdict.
Enterprise DLP adds email headers to mark that it's been inspected and what verdict was
rendered.
Enterprise DLP does not support inspection of document links contained in either the
email subject or body.
4. The email is returned back to Microsoft Exchange or Gmail.
5. Microsoft Exchange or Gmail takes action based on their respective transport rules.
6. Microsoft Exchange or Gmail send the allowed email to the intended recipient if allowed.
An email is allowed if Enterprise DLP did not detect any sensitive data or if the email was
quarantined and approved.
What Microsoft Exchange Online Licenses Are Required for Email DLP?
Email DLP supports any Microsoft Exchange Online license, including Microsoft 365 Defender,
Microsoft 365, and Office 365 E5 licenses for inline inspection of outbound emails using
Enterprise DLP.
The type of Microsoft Exchange Online license you have active determines the supported Email
DLP functionality available to your Microsoft Exchange Online deployment.
Enterprise DLP does not support the MSDN license for Email DLP. MSDN does not
support the use of inbound connectors to route emails, which Enterprise DLP requires to
forward outbound emails back to Microsoft Exchange after inspection.
You must onboard the Microsoft Exchange Online to prevent sensitive data exfiltration contained
in outbound emails using Enterprise Data Loss Prevention (E-DLP).
• Connect Microsoft Exchange and Enterprise DLP
• Create Microsoft Exchange Connectors
• Create Microsoft Exchange Transport Rules
• Create an Email DLP Sender Alert Policy
• Obtain Your Microsoft Exchange Domain and Relay Host
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Connect Microsoft Exchange to Enterprise Data Loss Prevention (E-DLP) through SaaS Security
on Strata Cloud Manager to complete the onboarding.
Before you begin connecting Microsoft Exchange to Enterprise DLP, ensure that the admin
performing the connection has at least Email Administrator access for Microsoft
Exchange. Microsoft Exchange requires this minimum access privilege to allow Enterprise
DLP API access to Microsoft Exchange.
STEP 1 | Contact your email domain provider to update your SPF record to add the required
Enterprise DLP service IP addresses.
Add the IP addresses for the region where you host your email domain. You can update your
SPF record with multiple regional IP addresses if you have email domains hosted in multiple
regions.
• APAC
35.186.151.226 and 34.87.43.120
• Australia
35.197.179.113 and 35.244.122.65
• Europe
34.141.90.172 and 34.107.47.119
• India
34.93.185.212 and 35.200.159.173
• Japan
34.84.8.170 and 35.221.111.27
• United Kingdom
34.105.128.121 and 34.89.40.221
• United States
34.168.197.200 and 34.83.143.116
STEP 2 | (Best Practices) Confirm that Active Directory is properly configured so that email senders
have a manager to approve or reject quarantined emails.
Microsoft Exchange Active Directory is required to assign a manager to a sender. You can
create a transport rule to quarantine and send the email for approval by the sender's manager.
To successfully quarantine a sender's email if sensitive data is detected by Enterprise DLP, a
sender must have a manager assigned.
If you did not assign a manager to a user, then Microsoft Exchange sends the quarantined
email to the intended recipient. Microsoft Exchange requires that you assign a user a manager
to approve or reject the email.
STEP 3 | (Best Practices) Save Evidence for Investigative Analysis with Enterprise DLP.
Palo Alto Networks recommends configuring evidence storage so you can download emails for
investigative analysis when your review Email DLP incidents.
STEP 5 | Create the Microsoft Exchange connectors and transport rules, and create the Email DLP
Policy.
Palo Alto Networks recommends setting up all connectors, transport rules, and Email DLP
policy rules to ensure enforcement begins as soon as you successfully connect Microsoft
Exchange Online to Enterprise DLP.
• Create a Microsoft Exchange Outbound Connector
The outbound connector controls the flow of emails forwarded from Microsoft Exchange to
Enterprise DLP.
• Create a Microsoft Exchange Inbound Connector
The inbound connector controls the flow of emails forwarded to Enterprise DLP back to
Microsoft Exchange.
• Create Microsoft Exchange Transport Rules
Transport rules allow Microsoft Exchange to forward emails to Enterprise DLP and specify
the actions Microsoft Exchange takes based on the hosted quarantine, admin approval,
manager approval, encrypt, or block transport rules verdicts rendered by Enterprise DLP.
• Add a Enterprise DLP Email Policy
The DLP email policy specifies the incident severity and the action Enterprise DLP takes
when matching traffic is inspected and sensitive data is detected.
STEP 8 | Select Manage > Configuration > SaaS Security > Settings > Apps Onboarding.
STEP 11 | In the Setup Connectors and Rules page, click Continue to Next Section since you
have already configured the outbound connector, inbound connector, and transport rules.
STEP 12 | In the Configure Smart Host page, add the email domains and relay hosts.
Enterprise DLP requires adding one or more email domains and relay hosts to ensure
Enterprise DLP can successfully forward inspect emails back to Microsoft Exchange.
1. Enter an Email Domain and its corresponding Relay Host you obtained in the previous
step.
Obtain Your Microsoft Exchange Domain and Relay Host if you don't have the Microsoft
Exchange email domain and relay host immediately available.
2. (Optional) Add any additional email domains and relay hosts as needed.
3. Connect.
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
To prevents sensitive data exfiltration contained in outbound emails using Enterprise Data
Loss Prevention (E-DLP), you must create outbound and inbound Microsoft Exchange Online
connector to control the flow of emails forwarded from Microsoft Exchange Online to Enterprise
DLP. The outbound connector controls the flow of outbound emails from Microsoft Exchange
to Enterprise DLP for inspection and verdict rendering. The inbound connector to return emails
forwarded to Enterprise DLP back to Microsoft Exchange and instruct Microsoft Exchange to take
action based on the transport rule.
• Outbound Connector
• Inbound Connector
• Proofpoint Server Connector
Create a Microsoft Exchange Outbound Connector
STEP 2 | Select Mail flow > Connectors and Add a connector to launch the Microsoft Exchange
Connector wizard.
STEP 5 | To specify when the connector should be used, select Only when I have a transport rule set
up that redirects messages to this connector and click Next.
Using the connector only when a transport rule exists enables fine-grained control of what
action to take when an email contains sensitive data. By selecting this option, Microsoft
Exchange enforces action on emails based on the action specified in the Enterprise DLP data
profile.
STEP 6 | To configure the route settings for emails, check (enable) Route email through these smart
hosts to add the following smart host Fully Qualified Domain Name (FQDN) and click Next.
The FQDN specifies the region where emails are forwarded to Enterprise DLP for inspection
and verdict rendering. This also generates and displays Email DLP incidents in the specified
region. All processes and data related to Email DLP occur and are stored in this region.
• APAC
mail.asia-southeast1.email.dlp.paloaltonetworks.com
• Australia
mail.australia-southeast1.email.dlp.paloaltonetworks.com
• Europe
mail.europe-west3.email.dlp.paloaltonetworks.com
• India
mail.asia-south1.email.dlp.paloaltonetworks.com
• Japan
mail.asia-northeast1.email.dlp.paloaltonetworks.com
• United Kingdom
mail.europe-west2.email.dlp.paloaltonetworks.com
• United States
mail.us-west1.email.dlp.paloaltonetworks.com
mail.asia-southeast1.email.dlp.paloaltonetworks.com
• Australia
mail.australia-southeast1.email.dlp.paloaltonetworks.com
• Europe
mail.europe-west3.email.dlp.paloaltonetworks.com
• India
mail.asia-south1.email.dlp.paloaltonetworks.com
• Japan
mail.asia-northeast1.email.dlp.paloaltonetworks.com
• United Kingdom
mail.europe-west2.email.dlp.paloaltonetworks.com
• United States
mail.us-west1.email.dlp.paloaltonetworks.com
4. Click Next.
It's expected that the following errors occur when adding the validation email.
• Validation failed error is displayed.
• The Send test email validation test status displays Failed.
These don't prevent you from creating the outbound connector and don't impact
email forwarding to Enterprise DLP.
4. Click Done.
5. When prompted to confirm whether to proceed without successful validation, click Yes,
proceed.
STEP 10 | Back in the Connectors page, verify the outbound connector is displayed and that the
Status is On.
STEP 11 | Create the Microsoft Exchange inbound connector if not already created.
Enterprise DLP requires the inbound connector to return emails forwarded to Enterprise DLP
for inspection back to Microsoft Exchange.
Skip this step if you have already created the inbound connector.
STEP 2 | Select Mail flow > Connectors and Add a connector to launch the Microsoft Exchange
Connector wizard.
STEP 5 | Specify the authentication IP addresses that Microsoft Exchange uses to verify Enterprise
DLP.
Enterprise DLP requires the authentication IP addresses to forward emails back to Microsoft
Exchange.
1. Select By verifying that the IP address of the sending server matches one of the
following IP address, which belong to your partner organization.
2. Add the following to IP addresses.
Add the IP addresses for the region where you host your email domain. You can add
multiple regional IP addresses if you have email domains hosted in multiple regions.
• APAC
35.186.151.226 and 34.87.43.120
• Australia
35.197.179.113 and 35.244.122.65
• Europe
34.141.90.172 and 34.107.47.119
• India
34.93.185.212 and 35.200.159.173
• Japan
34.84.8.170 and 35.221.111.27
• United Kingdom
34.105.128.121 and 34.89.40.221
• United States
34.168.197.200 and 34.83.143.116
STEP 7 | Back in the Connectors page, verify the inbound connector is displayed and that the Status
displays On.
STEP 8 | Create the Microsoft Exchange outbound connector if not already created.
Enterprise DLP requires the outbound connector to control the flow of emails forwarded from
Microsoft Exchange Online to Enterprise DLP for inline inspection.
Skip this step if you have already created the outbound connector.
STEP 1 | Prepare your Proofpoint server to encrypt emails inspected by Enterprise DLP.
1. Enable DKIM signing for your Proofpoint server.
When enabling DKIM signing, you must also select Enabled for the domain.
Additionally, keep a record of your DKIM public key. This is required when updating your
domain host records.
2. Contact your email domain provider to update your SPF record.
• Add your Proofpoint IP address to your SPF record.
Enterprise DLP requires this to forward emails to Proofpoint for encryption. Skip this
step if you have already updated your SPF record with your Proofpoint IP address.
• Add the DKIM public key to your domain host records.
STEP 3 | Select Mail flow > Connectors and Add a connector to launch the Microsoft Exchange
connector wizard.
STEP 6 | To specify when the connector should be used, select Only when I have a transport rule set
up that redirects messages to this connector and click Next.
STEP 7 | To configure the route settings for your Proofpoint server, check (enable) Route email
through these smart hosts to add the Proofpoint server smart host Fully Qualified Domain
Name (FQDN) and click Next.
4. Click Done.
5. When prompted to confirm whether to proceed without successful validation, click Yes,
proceed.
STEP 11 | Back in the Connectors page, verify that you successfully created the outbound connector
and that the Status displays On.
STEP 12 | Create the Microsoft Exchange outbound and inbound connectors if not already created.
Enterprise DLP requires the outbound connector to control the flow of emails forwarded from
Microsoft Exchange Online to Enterprise DLP for inline inspection and requires the inbound
connector to return emails forwarded to Enterprise DLP for inspection back to Microsoft
Exchange.
Skip this step if you have already created the outbound and inbound connectors.
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Create Microsoft Exchange email transport rules to forward emails from Microsoft Exchange to
the Enterprise Data Loss Prevention (E-DLP) cloud service for inspection to prevent exfiltration
of sensitive data. Additionally, you must create transport rules to specify the actions Microsoft
Exchange takes based on the verdicts rendered by Enterprise DLP. The following transport rules
are required:
• Email Transport
Required to forward all outbound emails from Microsoft Exchange to the Enterprise Data Loss
Prevention (E-DLP) cloud service for inline email inspection and verdict rendering. The email
transport rule is required in all cases regardless of the verdict Enterprise DLP renders.
Enterprise DLP adds x-panw-inspected: true to the email header for all inspected emails.
If an outbound email already includes this header, it will not be forwarded to Enterprise DLP
again. Instead, Microsoft Exchange will take the action specified in the hosted quarantine,
admin approval, manager approval, encrypt, or block transport rules based on the verdict
already rendered by Enterprise DLP.
• Hosted Quarantine
Instructs Microsoft Exchange to quarantine and forward the email to the spam quarantine
mailbox hosted by Microsoft Exchange when Enterprise Data Loss Prevention (E-DLP) cloud
service returns a Quarantine verdict for an email that contains sensitive data.
Enterprise DLP adds x-panw-action: quarantine to the email header for inspected
emails. The email is transported back to Microsoft Exchange and forwarded to the hosted
quarantine spam inbox so an email administrator can review the email contents and decide
whether to approve or block the email. Any future emails with this header already included will
not be forwarded to Enterprise DLP again. Instead, Microsoft Exchange will take the action
specified in the quarantine transport rule.
• Admin Approval
Instructs Microsoft Exchange to forward the email to the specified email administrator when
Enterprise Data Loss Prevention (E-DLP) cloud service returns a Forward email for
approval admin verdict for an email that contains sensitive data.
Enterprise DLP adds x-panw-action: fwd_to_admin to the email header for inspected
emails. The email is transported back to Microsoft Exchange so an email administrator can
review the email contents and decide whether to approve or block the email. Any future emails
with this header already included will not be forwarded to Enterprise DLP again. Instead,
Microsoft Exchange will take the action specified in the transport rule.
• Manager Approval
Instructs Microsoft Exchange to forward the email to the sender's manager when Enterprise
Data Loss Prevention (E-DLP) cloud service returns a Forward email for approval by
end user's manager verdict for an email that contains sensitive data.
Enterprise DLP adds x-panw-action: fwd_to_manager to the email header for inspected
emails. The email is transported back to Microsoft Exchange so a manager can review the email
contents and decide whether to approve or block the email. Any future emails with this header
already included will not be forwarded to Enterprise DLP again. Instead, Microsoft Exchange
will take the action specified in the transport rule.
• Encrypt
Instructs Microsoft Exchange on the action to take when Enterprise DLP returns a Encrypt
verdict for an email that contains sensitive data.
Enterprise DLP adds x-panw-action: encrypt to the email header for inspected emails.
The email is either transported back to Microsoft Exchange or to your Proofpoint server for
encryption based on the encryption settings you configure in the transport rule. Any future
emails with this header already included will not be forwarded to Enterprise DLP again. Instead,
Microsoft Exchange will take the action specified in the encrypt transport rule.
Forwarding an email to both Microsoft Exchange and your Proofpoint server for encryption is
not supported.
• Block
Instructs Microsoft Exchange on the action to take when Enterprise DLP returns a Block
verdict for an email that contains sensitive data.
Enterprise DLP adds x-panw-action: block to the email header for all inspected emails.
Any future emails with this header already included will not be forwarded to Enterprise DLP
for inspection. Instead, Microsoft Exchange takes the action specified in the Block transport
rule.
• Email Transport
• Hosted Quarantine
• Admin Approval
• Manager Approval
• Encrypt
• Proofpoint Encrypt
• Block
Create a Microsoft Exchange Email Transport Rule
STEP 3 | Select Mail flow > Rules > Add a rule > Create a new rule to create a new email transport
rule.
3. Specify Microsoft Exchange Connector you created as the transport target for email
inspection.
1. For Do the following, select redirect the message to.
2. For the transport target, select the following connector. When prompted, select the
outbound connector.
Click Save to continue.
4. Add an exception for emails that exceed the maximum message size supported by
Enterprise DLP.
Enterprise DLP supports inspection of email messages up to 20 MB in size. Larger email
messages are not supported and should not be forwarded to Enterprise DLP.
1. In the s Except If field, select The message.
2. Select size is greater than or equal to. When prompted, enter the following
maximum-supported message size KB:
20480
5. Add an exception for emails that were already inspected by Enterprise DLP.
1. In the Except if condition, click the add symbol ( ) to add a new Or condition.
2. Select the The message headers condition.
3. For the Or condition action, select matches any of these words.
4. Click Enter text to set the message header to x-panw-inspected.
STEP 6 | Review the email transport rule configuration and click Finish.
Click Done when prompted that the email transport rule was successfully created. You are
redirected back to the Microsoft Exchange Rules page.
Microsoft supports email approvals on the web browser-based Microsoft Exchange only.
Approving or rejecting emails on the Microsoft Exchange mobile application or desktop
client is not supported.
STEP 3 | Select Mail flow > Rules > Add a rule > Create a new rule to create a new email transport
rule.
x-panw-action
quarantine
3. Specify the action Microsoft Exchange takes when an email header includes the
quarantine header added by Enterprise DLP.
1. For Do the following, select Redirect the message to.
2. Select hosted quarantine.
STEP 6 | Review the quarantine transport rule configuration and click Finish.
Click Done when prompted that the quarantine transport rule was successfully created. You
are redirected back to the Microsoft Exchange Rules page.
STEP 8 | An email administrator must review and approve or reject quarantined emails forwarded to
the hosted quarantine mailbox.
Microsoft supports email approvals on the web browser-based Microsoft Exchange only.
Approving or rejecting emails on the Microsoft Exchange mobile application or desktop
client is not supported.
STEP 3 | Select Mail flow > Rules > Add a rule > Create a new rule to create a new email transport
rule.
x-panw-action
fwd_to_admin
3. Specify the action Microsoft Exchange takes when an email header includes the header
added by Enterprise DLP.
1. For Do the following, select Forward the message for approval.
2. Select to these people.
STEP 3 | Select Mail flow > Rules > Add a rule > Create a new rule to create a new email transport
rule.
x-panw-action
fwd_to_manager
3. Specify the action Microsoft Exchange takes when an email header includes the header
added by Enterprise DLP.
STEP 3 | Select Mail flow > Rules > Add a rule > Create a new rule to create a new email transport
rule.
x-panw-action
encrypt
3. Specify the action Microsoft Exchange takes when an email header includes the encrypt
header added by Enterprise DLP.
1. For Do the following, select Modify the message security.
2. Select Apply Office 365 Message Encryption and rights protection.
3. Select the RMS template you want to use for outbound email encryption and Save.
STEP 6 | Review the encrypt transport rule configuration and click Finish.
Click Done when prompted that the encrypt transport rule was successfully created. You are
redirected back to the Microsoft Exchange Rules page.
STEP 3 | Select Mail flow > Rules > Add a rule > Create a new rule to create a new email transport
rule.
x-panw-action
encrypt
3. Specify the action Microsoft Exchange takes when an email header includes the encrypt
header added by Enterprise DLP.
1. For Do the following, select Redirect the message to.
2. Select the following connector.
3. Select the Proofpoint connector and Save.
4. Click the Add Action icon (+) to add an additional rule condition.
5. Instruct Microsoft Exchange to further modify the email header.
1. For Do the following, select Modify the message properties.
2. Select set a message header.
3. Click Enter Text. When promoted, enter the following.
x-proofpointencryptdesktop
4. Click Enter words. When prompted, enter the following and Add:
encrypt
STEP 6 | Review the encrypt transport rule configuration and click Finish.
Click Done when prompted that the encrypt transport rule was successfully created. You are
redirected back to the Microsoft Exchange Rules page.
STEP 3 | Select Mail flow > Rules > Add a rule > Create a new rule to create a new email transport
rule.
x-panw-action
block
3. Specify the action Microsoft Exchange takes when an email header includes the Block
header added by Enterprise DLP.
1. For Do the following, select Block the message.
2. Select reject the message and include an explanation. When prompted, enter the
explanation for why the email was blocked.
This is the response members of your organization receive when an outbound email is
blocked.
Click Save to continue.
STEP 6 | Review the Block transport rule configuration and click Finish.
Click Done when prompted that the Block transport rule was successfully created. You are
redirected back to the Microsoft Exchange Rules page.
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Create an Email DLP sender alert policy on Microsoft Exchange Online to send an email alert
when a sender's email is sent to hosted quarantine for review.
STEP 1 | Log in to the Microsoft Exchange Online Compliance portal.
STEP 2 | Select Policies > Data loss prevention > Policies and Create policy.
STEP 5 | For the Assign admin units, leave the default Full directory and click Next.
STEP 6 | When you Choose location to apply the policy, verify that the Exchange email
Status is On.
Set the Status to Off for all other locations and click Next.
STEP 7 | To Define policy settings, select Create or customize advanced DLP rules and click
Next.
You are redirected to the Customize advanced DLP rules to a sender alert policy rules
for the hosted quarantine transport rule.
STEP 8 | Create the Email DLP sender alert policy rule when an email is sent to hosted quarantine.
1. Create rule.
2. Enter a Name and Description.
3. In Conditions, select Add condition > Header contains words or phrases.
4. In the Enter header name field, enter x-panw-action.
5. In the Enter words and then click 'Add' field, enter quarantine.
6. Add.
STEP 9 | For the Policy mode, select Turn it on right away and click Next.
STEP 10 | Review the Email DLP sender alert policy and Submit.
Click Done when prompted that the new policy was successfully created.
STEP 11 | Back in the Policies, verify that the Email DLP sender alert policy is displayed and that the
Status is On.
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
You must obtain your Microsoft Exchange domain and relay host to connect Microsoft Exchange
and Enterprise Data Loss Prevention (E-DLP) for inline inspection and prevention of sensitive data
exfiltration contained in outbound emails.
STEP 1 | Log in to the Microsoft Office 365 Admin Portal.
STEP 3 | Make note of the Microsoft Exchange domains lists in the Domain name list.
Enterprise DLP supports inline inspection of emails from multiple domains if you use multiple
Microsoft Exchange domains make sure to make note of all email domains for which you want
inline inspection of emails.
STEP 4 | Obtain the relay host for the Microsoft Exchange domain.
Repeat this step for all Microsoft Exchange domains you want to connect to Enterprise DLP.
1. Click the Microsoft Exchange domain.
2. Select DNS records.
3. In the Microsoft Exchange section, locate the MX record.
The Value column for the MX record lists the relay host for the domain. An example of
a relay host is shown below.
The MX record displays a 0 before the relay host. This character is not required
to connect Microsoft Exchange to Enterprise DLP.
Onboard Gmail
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
You must onboard Gmail to prevent sensitive data exfiltration contained in outbound emails using
Enterprise Data Loss Prevention (E-DLP).
• Connect Gmail and Enterprise DLP
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Connect Gmail to Enterprise Data Loss Prevention (E-DLP) through SaaS Security on Strata Cloud
Manager to complete the onboarding.
STEP 1 | Contact your email domain provider to update your SPF record to add the required
Enterprise DLP service IP addresses.
Add the IP addresses for the region where your email domain is hosted. You can update your
SPF record with multiple regional IP addresses if you have email domains hosted in multiple
regions.
• APAC
35.186.151.226 and 34.87.43.120
• Australia
35.197.179.113 and 35.244.122.65
• Europe
34.141.90.172 and 34.107.47.119
• India
34.93.185.212 and 35.200.159.173
• Japan
34.84.8.170 and 35.221.111.27
• United Kingdom
34.105.128.121 and 34.89.40.221
• United States
34.168.197.200 and 34.83.143.116
STEP 3 | Add an SMTP relay service entry to forward outbound emails to Enterprise DLP.
1. Select Apps > Google Workspace > Gmail > Routing.
2. For the SMTP relay service, Add Another Rule.
3. In the Description, enter a descriptive name for the Enterprise DLP SMTP relay service.
4. For Allowed Senders, verify Only addresses in my domains is selected.
5. For Authentication, check (enable) Only accept mail from the specified IP addresses.
6. Add a new SMTP relay service
7. In the Enter IP address/range field, enter the required IP addresses for the region where
you host your email domain. You can add multiple sets of IP addresses if needed.
• APAC
35.186.151.226 and 34.87.43.120
• Australia
35.197.179.113 and 35.244.122.65
• Europe
34.141.90.172 and 34.107.47.119
• India
34.93.185.212 and 35.200.159.173
• Japan
34.84.8.170 and 35.221.111.27
• United Kingdom
34.105.128.121 and 34.89.40.221
• United States
34.168.197.200 and 34.83.143.116
8. Verify that the SMTP relay service is Enabled.
9. Save.
10. Repeat this step to add both the required Enterprise DLP SMTP relay service IP
addresses for the region where you host your email domain.
11. For Encryption, check (enable) Require TLS Encryption.
12. Save.
STEP 4 | Configure Gmail to allow the download of emails for investigative analysis when you review
Email DLP incidents.
1. Log in to the Google Workspace Marketplace.
2. Download the Email DLP app for your region.
You can only download the Email DLP app for the region from which you're currently
accessing the Google Workspace Marketplace.
For example, if you access the Google Workspace Marketplace from California, click the
United States link below to download the Email DLP app.
• APAC
• Australia
• Europe
• India
• Japan
• United Kingdom
• United States
3. Click Admin Install.
4. You're prompted with a confirmation that you're about to install the Email DLP by
Palo Alto Networks app. Click Continue.
5. Select for which users you want to install the Email DLP app.
• Everyone at your organization—Select this option if you want to be able to download
emails for everybody in your organization who generates an Email DLP incident.
• Certain groups or organizational units—Select this option if you want to be able to
download emails for specific user groups and organizational units when they generate
an Email DLP incident.
For example, you have user groups Group1, Group2, and Group3 where your
CEO and other executives are part of Group3. You don't want to give your security
administrators the ability to download emails sent by the CEO and other executives.
In this case, you would select the Certain groups or organizational units option and
add Group1 and Group2 but not Group3.
6. Agree to the app Terms and Conditions.
7. (Certain groups or organizational units) Select the user groups and organizational you
want to install the app for.
8. Click Finish.
9. A notification is displayed notifying you the Email DLP by Palo Alto Networks
app successfully installed.
10. Click Done.
11. Enter Email DLP in the search bar and select the Email DLP app for your region. Verify
that the app tile displays Installed
STEP 6 | Create the Gmail transport rules, and create the Email DLP Policy.
Palo Alto Networks recommends setting Email DLP Host, transport rules, and Email DLP policy
rules to ensure enforcements begins as soon as you successfully connect Gmail to Enterprise
DLP.
• Set Up the Email DLP Host
Setting up a routing to the Email DLP Host allows Gmail to forward emails to Enterprise
DLP and for inspection and verdict rendering to prevent exfiltration of sensitive data.
• Create Gmail Transport Rules
Transport rules instruct Gmail to forward emails to Enterprise DLP and establish the actions
Gmail takes based on verdicts rendered by Enterprise DLP.
A transport rule isn't required for emails that match your Email DLP policy where
you set the action to Monitor. In this case, the x-panw-action - monitor
email header is added, a DLP incident is created, and the email continues to its
intended recipient.
• Add a Enterprise DLP Email Policy
The DLP email policy specifies the incident severity and the action Enterprise DLP takes
when matching traffic is inspected and sensitive data is detected.
STEP 8 | Select Manage > Configuration > SaaS Security > Settings > Apps Onboarding.
STEP 11 | In the Setup Connectors and Rules page, add the email domains and relay hosts.
Enterprise DLP requires you add one or more email domains and the Gmail Relay Host to
ensure Gmail successfully forwards emails inspected by Enterprise DLP to the Gmail Relay
Host.
1. Enter an Email Domain.
The Gmail Relay Host is always smtp-relay.gmail.com. The Port is always 587. This
fields are automatically populated by default.
2. (Optional) Add any additional email domains as needed.
3. Connect.
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Enterprise Data Loss Prevention (E-DLP) requires you set up routing from Gmail to the Enterprise
DLP Email DLP Host to allow Gmail to forward emails to Enterprise DLP for inspection and verdict
rendering to prevent exfiltration of sensitive data.
STEP 1 | Log in to the Google Admin portal.
STEP 2 | In the Dashboard, select Apps > Google Workspace > Gmail > Hosts and Add Route.
mail.asia-southeast1.email.dlp.paloaltonetworks.com
• Australia
mail.australia-southeast1.email.dlp.paloaltonetworks.com
• Europe
mail.europe-west3.email.dlp.paloaltonetworks.com
• India
mail.asia-south1.email.dlp.paloaltonetworks.com
• Japan
mail.asia-northeast1.email.dlp.paloaltonetworks.com
• United Kingdom
mail.europe-west2.email.dlp.paloaltonetworks.com
• United States
mail.us-west1.email.dlp.paloaltonetworks.com
4. For the Options, enable the following settings if not already enabled.
• Require mail to be transmitted via a secure (TLS) connection
• Require CA signed certificate
• Validate certificate hostname
5. Test TLS connection to verify Gmail can successfully connect to Enterprise DLP.
6. Save.
STEP 4 | Back in the Hosts page, verify that you successfully created the Email DLP host.
Email DLP does not require a transport rule for emails that match your Email DLP
policy when you configure the action to Monitor. In this case, Enterprise DLP adds
x-panw-action - monitor to the email header, creates a DLP incident, and
sends the email continues to the intended recipient.
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Set up routing to your Proofpoint server to encrypt emails inspected by Enterprise Data Loss
Prevention (E-DLP) that match your encryption Email DLP policy rule.
STEP 1 | Prepare your Proofpoint server to encrypt emails inspected by Enterprise DLP.
1. Enable DKIM signing for your Proofpoint server.
When enabling DKIM signing, you must also select Enabled for the domain.
Additionally, keep a record of your DKIM public key. This is required when updating your
domain host records.
2. Contact your email domain provider to update your SPF record.
• Add your Proofpoint IP address to your SPF record.
This is required to forward emails to Proofpoint for encryption. Skip this step if you
have already updated your SPF record with your Proofpoint IP address.
• Add the DKIM public key to your domain host records.
STEP 3 | In the Dashboard, select Apps > Google Workspace > Gmail > Hosts and Add Route.
STEP 5 | Back in the Hosts page, verify that the Proofpoint server route is displayed.
A transport rule isn't required for emails that match your Email DLP policy where
the action is set to Monitor. In this case, Enterprise DLP adds x-panw-action -
monitor to the email header, a DLP incident is created, and the email continues to
its intended recipient.
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Transport rules instruct Gmail to forward emails to Enterprise Data Loss Prevention (E-DLP) and
establish the actions Gmail takes based on the quarantine,or block verdicts rendered by Enterprise
DLP.
Create Gmail transport rules to forward emails from Gmail to the Enterprise DLP cloud service for
inspection to prevent exfiltration of sensitive data. Additionally, you must create transport rules to
specify the actions Gmail takes based on the verdicts rendered by Enterprise DLP. The following
transport rules are required:
• Email Transport
Required to forward all outbound emails from Gmail to the Enterprise DLP cloud service for
inline email inspection and verdict rendering. The email transport rule is required in all cases
regardless of the verdict Enterprise DLP renders.
Enterprise DLP adds x-panw-inspected: true to the email header for all inspected emails.
If an outbound email already includes this header, it will not be forwarded to Enterprise DLP
again. Instead, Gmail takes the action specified in the quarantine, or block transport rules based
on the verdict already rendered by Enterprise DLP.
• Quarantine
Instructs Gmail to quarantine and forward the email to the spam quarantine mailbox hosted
by Gmail when Enterprise DLP cloud service returns a Quarantine verdict for an email that
contains sensitive data. An email administrator must review and take action on quarantined
emails after Enterprise DLP inspection.
Enterprise DLP adds x-panw-action: quarantine to the email header for inspected
emails if Enterprise DLP renders a Quarantine verdict. The email is transported back to Gmail
and forwarded to the hosted quarantine spam inbox so an email administrator can review the
email contents and decide whether to approve or block the email. Any future emails with this
header already included will not be forwarded to Enterprise DLP again. Instead, Gmail will take
the action specified in the quarantine transport rule.
• Block
Instructs Gmail on the action to take when Enterprise DLP cloud service returns a Block
verdict for an email that contains sensitive data.
Enterprise DLP adds x-panw-action: block to the email header for all inspected emails.
Any future emails with this header already included will not be forwarded to Enterprise DLP
for inspection. Instead, Gmail takes the action specified in the Block transport rule.
• Encrypt
Instructs Gmail on the action to take when Enterprise DLP cloud service returns a Encrypt
verdict for an email that contains sensitive data.
Enterprise DLP adds x-panw-action: encrypt to the email header for all inspected emails.
Any future emails with this header already included will not be forwarded to Enterprise DLP
for inspection. Instead, Gmail takes the action specified in the Encrypt transport rule.
A transport rule isn't required for emails that match your Email DLP policy where
the action is set to Monitor. In this case, Enterprise DLP adds x-panw-action -
monitor to the email header, a DLP incident is created, and the email continues to its
intended recipient.
• Email Transport
• Quarantine
• Block
• Encrypt
Create a Gmail Email Transport Rule
STEP 2 | In the Dashboard, select Apps > Google Workspace > Gmail > Compliance.
3. Configure email forwarding to Enterprise DLP for emails that have not been inspected.
1. In the Add experiences that describe the content you want to
search for in each message section, select If ALL of the following match the
message.
2. Add a condition to forward emails that haven't been inspected by Enterprise DLP.
• In the Add setting page, select Advanced content match.
• For the Location, select Full Headers.
• For the Match type, select Not contains text.
• For the Content, enter x-panw-inspected.
Click Save to continue.
3. Add a condition to forward emails to Enterprise DLP when the sender is blank or
empty.
• In the Add setting page, select Advanced content match.
• For the Location, select Any envelope sender.
• For the Match type, select Not matches regex.
• For the Regexp, enter ^$.
Click Save to continue.
4. Save.
4. Configure the action Gmail takes for emails that have already been inspected by
Enterprise DLP, and the encryption settings.
1. In the If the above expressions match, do the following section,
enable Change Route.
2. Select the Email DLP Host you created.
3. For the Encryption (onward delivery only), select Require secure transport
(TLS).
6. Save.
STEP 5 | Verify that the email transport rule was successfully added and that the Status is Enabled.
STEP 2 | In the Dashboard, select Apps > Google Workspace > Gmail > Compliance.
3. Configure email forwarding to Enterprise DLP for emails that have not been inspected.
1. In the Add experiences that describe the content you want to
search for in each message section, select If ANY of the following match the
message.
2. Add.
3. In the Add setting page, select Advanced content match.
4. For the Location, select Full Headers.
5. For the Match type, select Starts with.
6. For the Content, enter x-panw-action: quarantine.
7. Save.
4. Configure the action Gmail takes for emails that need to be quarantined.
1. In the If the above expressions match, do the following section,
select Quarantine message.
2. In the Move the message to the following quarantine, select the Gmail
quarantine inbox you want to forward emails that need to be reviewed by an email
administrator.
3. Enable Notify sender when email is quarantined (onward delivery only).
6. Save.
STEP 5 | Verify that the email transport rule was successfully added and that the Status is Enabled.
STEP 6 | An email administrator must review and allow or reject quarantined emails forwarded to the
quarantine mailbox.
Due to a Gmail limitation, SaaS Security generates two Email DLP logs (Manage >
Configuration > SaaS Security > Data Security > Logs > Email DLP Logs) when a
quarantined email is allowed. The first Email DLP log describes the initial outbound
email blocked by Email DLP. The second Email DLP log describes the allowed outbound
email that is sent back to Enterprise DLP to add x-panw-inspected: true and
x-panw-action: monitor to the email header before it continues on its path to
the intended recipient.
STEP 2 | In the Dashboard, select Apps > Google Workspace > Gmail > Compliance.
3. Configure email forwarding to Enterprise DLP for emails that have not been inspected.
1. In the Add experiences that describe the content you want to
search for in each message section, select If ANY of the following match the
message.
2. Add.
3. In the Add setting page, select Advanced content match.
4. For the Location, select Full Headers.
5. For the Match type, select Starts with.
6. For the Content, enter x-panw-action: block.
7. Save.
4. Configure the action Gmail takes for emails that are blocked.
1. In the If the above expressions match, do the following section,
select Reject message.
2. (Optional) Enter a customized rejection notice when an email is blocked.
6. Save.
STEP 5 | Verify that the email transport rule was successfully added and that the Status is Enabled.
STEP 2 | In the Dashboard, select Apps > Google Workspace > Gmail > Compliance.
3. Configure email forwarding to Enterprise DLP for emails that have not been inspected.
1. In the Add experiences that describe the content you want to
search for in each message section, select If ANY of the following match the
message.
2. Add.
3. In the Add setting page, select Advanced content match.
4. For the Location, select Full Headers.
5. For the Match type, select Contains text.
6. For the Content, enter x-panw-action: encrypt.
7. Save.
Save to continue.
5. Configure the route to forward emails to your Proofpoint server for encryption.
1. In the Route section, select Change route.
2. Select the Proofpoint server route you created.
6. Save.
STEP 5 | Verify that the email transport rule was successfully added and that the Status is Enabled.
Add and configure an Enterprise Data Loss Prevention (E-DLP) email policy rule so Enterprise
DLP to prevent sensitive data exfiltration contained in outbound emails. The Email DLP policy
rule specifies the incident severity and the action Enterprise DLP takes when matching traffic is
inspected and sensitive data is detected.
Enterprise DLP supports inspection and detection of documents containing sensitive data
that are attached to an email. Enterprise DLP does not support inspection of document
links.
STEP 2 | (Optional) Create custom data patterns and data profiles to specify custom match criteria.
Skip this step if you want to use the predefined Enterprise DLP data profiles available by
default.
1. Create custom data patterns and custom document types as needed.
2. Create a data profile.
STEP 3 | Select Manage > Configuration > SaaS Security > Data Security > Policies > Email DLP
Policies and Add Policy.
STEP 4 | Configure the Basic Information of the Email DLP policy rule.
1. Enter a descriptive Name.
2. Specify the Evaluation Priority of the Email DLP policy rule.
This Evaluation Priority determines the order Email DLP policy rules are evaluated.
Select whether the new Email DLP policy rule goes before or after an existing Email DLP
policy rule.
1. For the Email Application, select Microsoft Exchange or Gmail.
2. Select the Enterprise DLP incident severity for when Enterprise DLP detects matching
traffic.
3. Select the DLP Data Profile to associate with the Email DLP policy rule.
The DLP data profile you select is used as the traffic match criteria that Enterprise DLP
evaluates inspected traffic against. The data profile can be either a predefined data
profile or a custom data profile.
4. Verify that Enable Policy is toggled on.
This setting is enabled by default when you add a new Email DLP policy rule.
is inspected by Enterprise DLP and evaluated against the data profile you selected in the
previous step.
For example, you configure the Email DLP policy rule conditions to inspect for the
yourcompany.com Sender Email Domain and gmail.com Recipient Email Domain only.
For Enterprise DLP to take action, the email sender domain and recipient email domain must
match what you have configured. In this instance, Enterprise DLP does not take action if the
Recipient Email Domain is yahoo.com.
1. Configure the email sender conditions.
To configure the email sender conditions, you must specify whether the conditions are
inclusive or exclusive of the specified email domains, user groups, or specific senders.
• Sender Email Domain
• Is one of—Email DLP matches and forwards outbound emails to Enterprise DLP for
email addresses associated with selected email domains only.
Email DLP does not match and forward outbound emails to Enterprise DLP if sent
from an email address that's not associated with a selected email domain.
• Is not one of—Email DLP matches and forwards outbound emails to Enterprise
DLP for all email addresses except for those associated with selected email
domains.
Email DLP does not match and forward outbound emails to Enterprise DLP if sent
from an email address associated with a selected email domain.
• Sender User Group
The sender user groups are derived from Cloud Identity Engine (CIE) that you set up
when you that you connected Microsoft Exchange or Gmail.
• Is one of—Email DLP matches and forwards outbound emails to Enterprise DLP for
email addresses associated with selected user groups only.
Email DLP does not match and forward outbound emails to Enterprise DLP if sent
from an email address not associated with a selected user group.
• Is not one of—Email DLP matches and forwards outbound emails to Enterprise
DLP for all email addresses except for the email addresses associated with selected
user groups.
Email DLP does not match and forward outbound emails to Enterprise DLP if sent
from an email address associated with a selected user group.
• Sender User
The sender user addresses are derived from Cloud Identity Engine (CIE) that you set
up when you that you connected Microsoft Exchange or Gmail.
Click add ( ) to include additional sender email addresses.
• Is one of—Email DLP matches and forwards outbound emails to Enterprise DLP for
only selected sender email addresses.
Email DLP does not match and forward outbound emails to Enterprise DLP if sent
from a sender email address that's not selected.
• Is not one of—Email DLP matches and forwards outbound emails to Enterprise
DLP for all sender email addresses except for the sender email addresses you
selected.
Email DLP does not match and forward outbound emails to Enterprise DLP if sent
from a selected sender email address.
• Are all not one of—Email DLP policy rule matches and forwards outbound emails
to Enterprise DLP only if all the specified recipient email addresses are not
included in the outbound email.
Email DLP does not match and forward outbound emails to Enterprise DLP if any
of the recipient email addresses are included in the outbound email.
• Is not one of—Email DLP policy rule matches and forwards outbound emails to
Enterprise DLP for all email addresses except for the email addresses associated
with the selected user groups.
Email DLP does not match and forward outbound emails to Enterprise DLP if the
recipient email address is included in the outbound email.
3. Configure the email components Enterprise DLP needs to Evaluate.
Enterprise DLP can inspect and evaluate the Email Subject, Email Body, and Email
Attachment(s) as needed. You can select one, two, or all available evaluation criteria. At
least one evaluation criterion must be selected to save the Email DLP policy rule.
Review your Enterprise Data Loss Prevention (E-DLP) Email DLP incidents to understand which
outbound emails were inspected, review which were blocked, quarantined, or sent for approval,
and to download files inspected by Enterprise DLP.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > SaaS Security > Data Security > Incidents > Email DLP
Incidents.
STEP 4 | Click the Email DLP Policy to view a summary of the Email DLP policy rule the email
matched against.
• Basic Information—Email DLP policy rule priority, whether the rule is Enabled or Disabled,
the incident severity, and the email service provider.
• Conditions—Data profile associated with the Email DLP policy rule, the sender and recipient
information, and the email components the Email DLP policy rule is configured to evaluate.
• Response— Action configured in the Email DLP policy rule, the primary Incident Assignee
specified in the Email DLP policy rule, and the email address that notifications are sent to
when an Email DLP incident is generated against this Email DLP policy rule.
STEP 5 | Click the Email DLP incident Subject to view the Incident Details.
• The From and To fields display the email sender and recipient for the email that generated
the DLP incident.
• The Email content field allows you to download the email in .eml format.
To successfully download an email, you must have configured evidence storage before the
outbound email was inspected by Enterprise DLP. Emails of existing Email DLP incidents
cannot be downloaded if you configure evidence storage after the Email DLP incident
occurred.
• The Message ID can be used to create a message trace on Microsoft Exchange Online or
a custom Email Log Search on Gmail.
STEP 7 | (Quarantine only) If an outbound email was quarantined, an email administrator must review
and approve these emails before they can continue to their intended recipient.
• Microsoft Exchange
• Gmail
Due to a Gmail limitation, SaaS Security generates two Email DLP logs (Manage >
Configuration > SaaS Security > Data Security > Logs > Email DLP Logs) when a
quarantined email is allowed. The first Email DLP log describes the initial outbound
email blocked by Email DLP. The second Email DLP log describes the allowed
outbound email that is sent back to Enterprise DLP to add x-panw-inspected:
true and x-panw-action: monitor to the email header before it continues
on its path to the intended recipient.
Review your Email DLP and Enterprise Data Loss Prevention (E-DLP) configurations to help
you investigate why an email containing sensitive data wasn't blocked by Enterprise DLP. To
investigate, you will need to review the DLP logs, the connectors and transport rules, as well
as your data patterns, profiles, and Security policy rules to understand why one or more emails
containing sensitive data are not being blocked.
STEP 1 | Review your Email DLP logs to confirm that the email you believe contains sensitive data
really contained sensitive data.
If the email you want to investigate is listed here, it means that Email DLP configuration for
Microsoft Exchange or Gmail are configured correctly. An Email DLP incident and log indicate
that the email was forwarded to Enterprise DLP.
If you can't find the email you want to investigate, it might mean that something is wrong with
the Email DLP configurations for Microsoft Exchange or Gmail.
1. Review your Email DLP incidents to confirm the email was allowed to leave your
network.
Select Add Filter > Action and for the Action filter, select Monitored to quickly filter
for emails that were allowed to leave your network. If the email you are interested in
is listed, view the Incident Details to gather the email Created On date, Sender, and
Subject for the email. You can also download the email for your review.
Additionally, make note of the Policy the email matched against. As part of the
investigation, you need to review your Email DLP policy to ensure it is configured
correctly.
2. Select Manage > Configuration > SaaS Security > Data Security > Logs.
3. In the Email DLP Logs, click View Logs.
4. Locate the email you want to investigate using the Time Captures and Sender User
columns.
5. Review the Subject column for the email to understand whether sensitive data was
detected in the email.
6. Review the Status Note to gather additional information about the email.
• If the Email did not match with an Email DLP Policy or Email matched with a DLP
Profile in a policy and evaluation was completed are displayed, it might mean you
need to review and modify your data profile match criteria or Email DLP policy.
• If the Email DLP policy evaluation timed out is displayed, you might need to modify
the Max Latency and Action on Max Latency settings.
For example, if the Action on Max Latency is set to Allow, it means that Enterprise
DLP allowed the outbound email to leave your network even though the forwarded
email evaluation timed out.
STEP 2 | Review the Email DLP policy the email matched against to ensure it is configured correctly.
Important Email DLP configurations to verify are the email sender conditions, the sender
email domain, email recipient conditions, and recipient email domains to confirm that they are
defined correctly. If these are not configured correctly, Email DLP is unable to inspect for and
prevent exfiltration of outbound emails containing sensitive data.
Additionally, you can review the Recommendations for Security Policy Rules for more
information on recommendations and best practices for writing Security policy rules and
managing your policy rulebase.
STEP 3 | Review the data patterns and data profiles associated with your Email DLP policy.
For example, review your custom and file property data patterns to ensure the match criteria
defined in them are configured correctly to inspect for and block the correct sensitive data.
Incorrectly defined match criteria results in Enterprise DLP being unable to inspect for and
prevent exfiltration of outbound emails containing sensitive data.
If you are using predefined data patterns in your data profiles, you can add custom match
criteria like proximity keywords to increase detection accuracy.
STEP 4 | Review the Email DLP configuration for your email provider.
Microsoft Exchange Online or Gmail are unable to forward emails to Enterprise DLP if they are
incorrectly configured and are unable forward outbound emails for inspection. Additionally,
Email DLP is designed to inspect outbound emails only. Inspection of emails from within your
network is not supported.
When reviewing your Email DLP configurations, consider the following:
• Have you updated your SFP record to add the required Enterprise DLP service IP addresses
for Microsoft Exchange Online or Gmail?
This is required to successfully forward outbound emails to Enterprise DLP.
• (Microsoft Exchange Online only) Are your transport rules enabled?
In some cases, a newly created Microsoft Exchange transport rule might be disabled and
require you to manually enable it. All transport rules, especially the transport and block
rules, must be enabled to successfully forward outbound emails to Enterprise DLP and for
Microsoft Exchange to take action based on the verdict rendered.
• Is the transport rule for Microsoft Exchange Online or Gmail configured correctly?
If your email provider is unable to forward outbound emails to Enterprise DLP, then the
email continues to its intended recipient.
• Is the block transport rule for Microsoft Exchange Online or Gmail configured correctly?
For example, if there is a typo when you define the x-panw-action: block header that
your email provider should take a block action on then the email continues to its intended
recipient.
• (Microsoft Exchange Online only) Are managers assigned correctly in Active Directory
configured?
By default, Microsoft Exchange sends the outbound email to the target recipient if a
manager isn't correctly assigned for the sender when you create a transport rule for
manager approval.
Endpoint DLP
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Prisma Access (Managed by Strata Cloud Enterprise Data Loss Prevention (E-DLP)
Manager) license
Autonomous DEM 5.3.4 or later
Prisma Access Agent
One of the following Prisma Access
versions
• 10.2—Prisma Access 5.2
• 11.2—Prisma Access 5.1 or 5.2
Use Endpoint DLP to prevent exfiltration of sensitive data to peripheral devices such as USB
devices, printers, and network shares, or to control access to them. To prevent exfiltration of
sensitive data, files moved between a device and the connected peripheral device are sent to
Enterprise Data Loss Prevention (E-DLP) for inspection and verdict rendering.
• How Does Endpoint DLP Work?
• Add a Peripheral
• Create a Peripheral Group
• Create an Endpoint DLP Policy Rule
• Troubleshoot Endpoint DLP
Prisma Access (Managed by Strata Cloud Enterprise Data Loss Prevention (E-DLP)
Manager) license
Endpoint DLP enables your security administrators to control the use of peripheral devices by
allowing you to allow or block their use. To prevent exfiltration of sensitive data to peripheral
devices Endpoint DLP uses Enterprise Data Loss Prevention (E-DLP) advanced detection
methods, as well as custom data profiles to define custom traffic match criteria or predefined ML-
based and regex data profiles.
The Prisma Access Agent evaluates and enforces your Endpoint DLP policy rules when files are
moved between the endpoint and peripheral device. The Prisma Access Agent detects when
file movement between the endpoint and peripheral device occurs and evaluates the Endpoint
DLP policy rulebase. When necessary, Prisma Access Agent forwards the traffic to Enterprise
DLP for inspection and verdict rendering. Enterprise DLP then communicates the verdict to the
Prisma Access Agent which then takes the action configured in the Endpoint DLP policy rule.
Additionally, the Prisma Access Agent is also responsible for displaying the end user a notification
when they generate a DLP incident.
The following is an example of the process Enterprise DLP uses to inspect endpoints. This process
succeeds only if you installed the Prisma Access Agent and that you already configured your
Endpoint DLP policy rules.
1. A user in your organization connects a peripheral device to their laptop.
2. The user moves a file from their endpoint to the connected peripheral device.
3. The Prisma Access Agent registers that the user attempted to move a file from the endpoint to
the peripheral device and evaluates your Endpoint DLP policy rules.
• No Policy Rule Match—If there is no Endpoint DLP policy rule match identified, then the
agent allows the peripheral device to connect and the endpoint has full read and write
access privileges to the peripheral device.
• Peripheral Control Policy Rule—If you created a peripheral control policy rule to control
access, then the agent executes the allow or block action that you configured in the policy
rule.
For example, if the Endpoint DLP policy rule blocks the connection to the peripheral device,
then the agent revokes write privileges to the peripheral device. In this case, the endpoint
can't upload files to the peripheral device.
Alternatively, if the Endpoint DLP policy rule allows the connection to the peripheral device,
then the agent grants the endpoint write access privileges to the peripheral device. In this
case, the endpoint can upload files to the peripheral device.
• Data in Motion Policy Rule—The agent allows the connection to the peripheral device.
When the Prisma Access Agent detects file movement from the endpoint to a peripheral
device, it forwards the file to Enterprise DLP for inspection and verdict rendering. The agent
also forwards important file metadata, such as the fileSHA, which Enterprise DLP uses to
identify each forwarded file.
Enterprise DLP then sends the verdict to the Prisma Access Agent. If Enterprise DLP detects
sensitive data, the agent takes the Endpoint DLP policy rule action. When Enterprise DLP
detects forwarded files that were already inspected based on the fileSHA, then Enterprise
DLP returns the existing verdict to the agent. Enterprise DLP does not inspect the same file
twice.
4. The Prisma Access Agent executes the Endpoint DLP policy rule action that you configured in
either the Peripheral Control or Data in Motion policy rules.
5. Enterprise DLP generates a DLP incident when appropriate. Additionally, if you configured End
User Coaching, the Prisma Access Agent displays a notification on the endpoint to alert the
user.
Add a Peripheral
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Prisma Access (Managed by Strata Cloud Enterprise Data Loss Prevention (E-DLP)
Manager) license
Autonomous DEM 5.3.4 or later
Prisma Access Agent
Add a USB, printer, or network share peripheral device to Enterprise Data Loss Prevention (E-
DLP) for endpoint protection. Only one type of peripheral device can be added at a time.
Adding peripheral devices is required only if you want to allow or block access to specific
peripheral devices. If you want to allow or block access to all peripheral devices of any type, you
can create an Endpoint DLP policy rule configured for this purpose.
Peripheral devices added to Enterprise Data Loss Prevention (E-DLP) cannot be deleted.
• USB
• Network Share
• Printer
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Settings > Peripheral
Configuration.
STEP 5 | Configure the details for the USB peripheral you're adding.
To add a USB peripheral device to Enterprise DLP, you must enter the peripheral Name and
either the Serial Number, Vendor ID, or Product ID.
For example, you enter only the peripheral Name and Vendor ID, but not the Serial Number or
Product ID. This meets the minimum configuration requirements and you can successfully add
the peripheral.
Manufacturer and Model are optional and used to filter your USB peripherals.
• Name—Name of the USB. The Name is displayed in Strata Cloud Manager when managing
your Endpoint DLP configurations and in your Enterprise DLP incidents.
• (Optional) Manufacturer—Name of the company that manufactured the USB.
• (Optional) Model—Model of the USB peripheral.
• Serial Number—Unique identifier of the specific USB peripheral.
• Vendor ID—Unique number used to identify the manufacturer of the USB peripheral.
• Product ID—Unique number used to identify a specific USB product line.
• (Optional) Description—Description of the USB peripheral.
STEP 6 | Save.
STEP 7 | Create a Peripheral Group to group multiple USB peripheral devices and apply the same
security enforcement.
You must create peripheral groups to create an Endpoint DLP policy rule.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Settings > Peripheral
Configuration.
STEP 5 | Configure the details for the network share peripheral you're adding.
The network share peripheral Name and Server Name or IPv4 Address are required.
Server Name or IPv4 Address and the optional Directory Path are used to filter your Network
Share peripherals.
• Name—Name of the network share. The Name is displayed in Strata Cloud Manager when
managing your Endpoint DLP configurations and in your Enterprise DLP incidents.
• Server Name or IPv4 Address—Fully Qualified Domain Name (FQDN) or IPv4 address of
the network share.
• (Optional) Directory Path—Network directory path of the network share.
• (Optional) Description—Optional description of the network share peripheral.
STEP 6 | Save.
STEP 7 | (Optional) Create a Peripheral Group to group multiple network share peripheral devices and
apply the same security enforcement.
You must create peripheral groups to create an Endpoint DLP policy rule.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Settings > Peripheral
Configuration.
STEP 5 | Configure the details for the USB peripheral you are adding.
To add a printer peripheral device to Enterprise DLP, you must enter the peripheral Name and
select the printer Printer Type.
Printer Type is also used to filter your Printer peripherals.
• Name—Name of the printer. The Name is displayed in Strata Cloud Manager when
managing your Endpoint DLP configurations and in your Enterprise DLP incidents.
• Printer Type—Select the type of printer device you are adding. You can select USB Printer
or Network Printer.
• USB Printer—Printer peripheral device physically connected to the endpoint using a USB
cable.
• Network Printer—Printer peripheral device accessible to the endpoint through the
network.
• (Optional) Model—Model of the USB.
• USB Printer
To add a USB printer peripheral device, you must enter either the Serial Number, Vendor
ID, or Product ID.
For example, you enter only the peripheral Vendor ID, but not the Serial Number or
Product ID. This meets the minimum configuration requirements and you can successfully
add the peripheral.
• (Optional) Manufacturer—Name of the company that manufactured the USB printer.
• (Optional) Model—Model of the printer.
• Serial Number—Unique identifier of the specific USB printer.
• Vendor ID—Unique number used to identify the manufacturer of the USB printer.
• Product ID—Unique number used to identify a specific USB printer product line.
• Network Printer
The network printer peripheral Server Name or IPv4 Address is required.
• Server Name or IPv4 Address—Fully Qualified Domain Name (FQDN) or IPv4 address of
the network printer.
• (Optional) Directory Path—Network directory path of the network printer.
• (Optional) Description—Description of the USB peripheral.
STEP 6 | Save.
STEP 7 | (Optional) Create a Peripheral Group to group multiple printer peripheral devices and apply
the same security enforcement when you create your Endpoint DLP security policy rule. You
can group USB and network printers in the same peripheral group.
Create a peripheral device group to group multiple of the same peripheral devices types into a
single group. This allows you to apply Endpoint DLP policy rules to multiple peripheral devices
that have the same enforcement requirements. A peripheral device can be part of multiple
peripheral groups.
After you create and push a peripheral group configuration change, you can view your audit and
push logs to review your configuration change history and to verify the configuration change was
successfully pushed to the Prisma Access Agent.
• USB
• Network Share
• Printer
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Settings > Peripheral
Configuration.
STEP 7 | Save.
STEP 8 | Push your new peripheral group configuration to the Prisma Access Agent.
1. Select Endpoint DLP Policy > Push Policies and Push Policies.
2. (Optional) Enter a Description for the Endpoint DLP policy push.
3. Review the Push Policies scope to understand the changes included the Endpoint DLP
configuration push.
4. Push.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Settings > Peripheral
Configuration.
STEP 7 | Save.
STEP 8 | Push your new peripheral group configuration to the Prisma Access Agent.
1. Select Endpoint DLP Policy > Push Policies and Push Policies.
2. (Optional) Enter a Description for the Endpoint DLP policy push.
3. Review the Push Policies scope to understand the changes included the Endpoint DLP
configuration push.
4. Push.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Settings > Peripheral
Configuration.
STEP 7 | Save.
STEP 8 | Push your new peripheral group configuration to the Prisma Access Agent.
1. Select Endpoint DLP Policy > Push Policies and Push Policies.
2. (Optional) Enter a Description for the Endpoint DLP policy push.
3. Review the Push Policies scope to understand the changes included the Endpoint DLP
configuration push.
4. Push.
Prisma Access (Managed by Strata Cloud Enterprise Data Loss Prevention (E-DLP)
Manager) license
Autonomous DEM 5.3.4 or later
Prisma Access Agent
One of the following Prisma Access
versions
• 10.2—Prisma Access 5.2
• 11.2—Prisma Access 5.1 or 5.2
Enterprise Data Loss Prevention (E-DLP) supports creation of the following types of Endpoint
DLP policy rules.
• Peripheral Control—Policy rule to granularly control who in your organization can use
peripheral devices. You can block access to multiple user groups while excluding others.
• Data in Motion—Policy rule to inspect and block exfiltration of sensitive data moving between
an endpoint and a peripheral device. Traffic that matches your Endpoint DLP policy rule is
forwarded to Enterprise DLP inspection and verdict rendering.
Endpoint DLP policy rules are evaluated in a top-down priority. This means that in the event that
two policy rules in the rule hierarchy apply to the same users and peripherals, Enterprise DLP
takes the Response action based on the first policy rule that was matched.
After pushing your Endpoint DLP policy rule, you can view your audit and push logs to review
your configuration change history and to verify the configuration change was successfully pushed
to the Prisma Access Agent.
Palo Alto Networks recommends reviewing the Endpoint DLP policy rule example before you
create your Peripheral Control and Data in Motion policy rules. In this example, example, we
create two Endpoint DLP policy rules. The first is a Policy Control policy rule to block access to
USB peripheral devices for all users while excluding a specific user group for which you allow
access to USB peripherals. The second is a Data in Motion policy rule to prevent exfiltration of
sensitive data from the endpoint to the peripheral for those users associated with the excluded
user group using Enterprise DLP.
• Policy Rule Example
• Peripheral Control
• Data in Motion
STEP 3 | Configure the Enterprise DLP match criteria to define custom sensitive data that you want to
inspect for and block in your Data in Motion policy rule.
1. Create custom data patterns to define your match criteria.
Alternatively, you can use the predefined data patterns instead of creating custom data
patterns.
2. Create a data profile and add your data patterns.
Alternatively, you can use the predefined data profiles instead of creating custom data
profiles.
STEP 4 | Select Manage > Configuration > Data Loss Prevention > Endpoint DLP Policy and Add
Policy.
3. For the Peripherals, select Any to block connectivity to all USB peripheral devices.
Alternatively, you can Select specific USB peripheral devices to Include or Exclude.
• If you Include specific USB peripheral devices then endpoint connectivity to only
the specified USB peripheral devices is blocked. All other USB peripheral device
connectivity is allowed.
• If you Exclude specific USB peripheral devices then endpoint connectivity is blocked
for all but excluded USB peripheral devices.
In this example, Any is selected because we want to block endpoint connectivity for all
USB peripheral devices. This particular policy rule is specific to USB devices so None is
selected for Printers and Network Shares.
policy rule is specific to USB devices so None is selected for Printers and Network
Shares.
STEP 7 | Review your Endpoint DLP policy rulebase to verify your policy rules are enabled and
ordered correctly.
Review the Priority to ensure your policy rules are ordered correctly, the Users to confirm
your policy rules target the correct set of users, and the Peripherals to ensure the policy rules
apply to the intended peripheral device types.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Endpoint DLP Policy and Add
Policy.
STEP 4 | Configure the Scope to define which users can use peripheral devices.
For Enterprise DLP to take the configured Response action, both Users and Peripherals must
be matched.
1. Select the Users the policy rule applies to.
• Any Users & Groups
Create a peripheral control policy rule that applies to all users. Additionally, you can
Exclude one or more users from the peripheral control policy rule.
• Select Users & Groups
Create a peripheral control policy rule that applies to specific users and groups. You
can configure the policy rule to apply to either specific users or user groups, or to
both.
Include
• Select Users—Select one or more specific users to which the rule applies.
• Select Groups—Select one or more user groups to which the rule applies.
Exclude—Select one or more users to exclude from the peripheral control policy
group. You must select at least one user group in order to exclude one or more users.
2. Select the Peripherals you want to allow or block access to.
You can define user access to USB devices, printers, and network shares in a single
peripheral control policy rule. The access configuration for each type of peripheral
device are independent of each other and can be configured as needed. For example,
you can create a policy rule to block access to all USB devices, allow access to all
printers, and allow access to only specific network shares you selected.
• Any (default)—Policy rule applies all USB, printer, or network share peripherals
peripherals added to Enterprise DLP.
• Select— Policy Rule applies only to the selected peripheral devices or peripheral
groups.
• None—Policy rule doesn't apply to any USB, printer, or network share peripherals
added to Enterprise DLP.
3. Click Next to continue.
STEP 5 | Configure the Response to define the action Enterprise DLP takes when a user access a
blocked peripheral.
• Action—Action Enterprise DLP takes if a User accesses a Peripheral device defined in the
policy rule Scope.
• Alert—Enterprise DLP generates a DLP incident but allows the endpoint to access the
peripheral.
• Block—Enterprise DLP generates a DLP incident and blocks the endpoint from accessing
the peripheral.
• Incident Assignee—The administrator the Enterprise DLP incident is assigned to if one is
generated against the policy rule.
• Email Notifications—Add administrators to send email notifications when an incident is
generated against the policy rule.
Click Next to continue.
STEP 6 | Define the Evaluation Priority for the peripheral control policy rule in your Endpoint DLP
policy rulebase.
You can use the Priority Selection to quickly insert the peripheral control policy rule in the
appropriate location in your policy rulebase hierarchy.
click Next to continue.
STEP 7 | Review the policy rule Summary to verify its configured correctly and Save.
STEP 2 | Configure the Enterprise DLP match criteria to define custom sensitive data that you want to
inspect for and block.
1. Create custom data patterns to define your match criteria.
Alternatively, you can use the predefined data patterns instead of creating custom data
patterns.
2. Create a data profile and add your data patterns.
Alternatively, you can use the predefined data profiles instead of creating custom data
profiles.
STEP 3 | Select Manage > Configuration > Data Loss Prevention > Endpoint DLP Policy and Add
Policy.
STEP 5 | Configure the policy rule Classifiers to define the match criteria.
1. Select the Data Profile that contains the match criteria you want to inspect for and
block. You can select a predefined or custom data profile.
2. Select the File Types you want the Endpoint DLP policy rule to apply to.
You can select Any File Types (default) to inspect all supported file types moved
between an endpoint and the peripheral device.
STEP 6 | Configure the Scope to define which users and peripheral devices the policy rule applies to.
For Enterprise DLP to take the configured Response action, both Users and Peripherals must
be matched.
1. Select the Users the policy rule applies to.
• Any Users & Groups
Create a peripheral control policy rule that applies to all users. Additionally, you can
Exclude one or more users from the peripheral control policy rule.
• Select Users & Groups
Create a peripheral control policy rule that applies to specific users and groups. You
can configure the policy rule to apply to either specific users or user groups, or to
both.
Include
• Select Users—Select one or more specific users to which the rule applies.
• Select Groups—Select one or more user groups to which the rule applies.
Exclude—Select one or more users to exclude from the peripheral control policy
group. You must select at least one user group in order to exclude one or more users.
2. Select the Peripherals you want to inspect and block file movement to if sensitive data is
detected.
You can add USB devices, printers, and network shares in a single data in motion policy
rule. The list of included devices for each type of peripheral device are independent of
each other and can be configured as needed. For example, you can create a policy rule
that includes no USB devices, all printers, and only specific network shares you selected.
• Any (default)—Policy rule applies all USB, printer, or network share peripherals added
to Enterprise DLP.
• Select— Policy Rule applies only to the selected peripheral devices or peripheral
groups.
• None—Policy rule doesn't apply to any USB, printer, or network share peripherals
added to Enterprise DLP.
3. Click Next to continue.
STEP 7 | Configure the Response to define the action Enterprise DLP takes when sensitive data is
detected.
• Action—Action Enterprise DLP takes if a User accesses a Peripheral device defined in the
policy rule Scope.
• Alert—Enterprise DLP generates a DLP incident but allows file movement from the
endpoint to the peripheral.
• Block—Enterprise DLP generates a DLP incident and blocks file movement from the
endpoint to the peripheral.
• Incident Assignee—The administrator the Enterprise DLP incident is assigned to if one is
generated against the policy rule.
• Email Notifications—Add additional administrators to send email notifications when an
incident is generated against the policy rule.
Click Next to continue.
STEP 8 | Define the Evaluation Priority for the peripheral control policy rule in your Endpoint DLP
policy rulebase.
You can use the Priority Selection to quickly insert the peripheral control policy rule in the
appropriate location in your policy rulebase hierarchy.
click Next to continue.
STEP 9 | Review the policy rule Summary to verify its configured correctly and Save.
STEP 13 | (Block policy rule for USB and Network Share Peripherals on macOS only) The Prisma Access
Agent automatically moves a blocked file to the following local folder on the endpoint for
quarantine for 90 days when Endpoint DLP detects and blocks a file containing sensitive
data. The Prisma Access Agent automatically deletes the file from the endpoint after 90
days.
/Library/Application Support/PaloAltoNetworks/DLP/quarantine/
This applies to all file movement operations available on macOS. Navigate to the local folder
on the endpoint and move the file to a different folder on the endpoint to recover the file.
Prisma Access (Managed by Strata Cloud Enterprise Data Loss Prevention (E-DLP)
Manager) license
Autonomous DEM 5.3.4 or later
Prisma Access Agent
One of the following Prisma Access
versions
• 10.2—Prisma Access 5.2
• 11.2—Prisma Access 5.1 or 5.2
Use the troubleshooting steps below to triage and understand why some or all of your endpoints
are erroneously allowing file movement between the endpoint and a peripheral device when you
have Endpoint DLP configured to prevent exfiltration of sensitive data.
STEP 1 | Verify that the Endpoint DLP service is enabled on Prisma Access Agent installed on the
endpoint after setting up Endpoint DLP and pushing an Endpoint DLP policy rule.
1. Open the Command Line Interface (CLI) on the endpoint.
2. Navigate to the Prisma Access Agent folder.
• Microsoft Windows—/Program Files/Palo Alto Networks/Prisma
Access Agent
• macOS—/Applications/Prisma\ Access\ Agent.app/Contents/
Helpers/
3. Check the status of the Endpoint DLP service.
./PACli dlp status
The Endpoint DLP service is enabled if the command returns DLP Status: enabled.
STEP 3 | Review your Endpoint DLP incidents to confirm whether impacted endpoints are generating
DLP incidents as expected.
Enterprise Data Loss Prevention (E-DLP) creates a DLP incident every time the DLP Cloud
service detects sensitive data in forwarded traffic. Start by reviewing your Endpoint DLP
incidents if you know a DLP incident should have been generated. If you expected a DLP
incident to be generated, but none was, it might mean there is an issue with your Endpoint
DLP policy rulebase or an issue with the Prisma Access Agent.
For example, you have an Endpoint DLP policy rule configured to inspect for personally
identifiable information (PII). You know a user moved a file containing PII data from a specific
endpoint to a peripheral device. In this case, you expect Endpoint DLP to block the file move
and generate an incident. If Enterprise DLP does not create a DLP incident, then it warrants
further investigation to resolve.
To narrow down the list of DLP incidents you need to review, select Add Filter > Policy Type
and apply the Endpoint: Data in Motion and Endpoint: Peripheral Control filters to display
only Endpoint DLP incidents. You can also use the User-ID search option if you know the
User-ID of the endpoint you're troubleshooting.
STEP 5 | Check your Endpoint DLP audit and push logs to confirm the committed configuration
changes pushed to endpoints.
The audit the history of all configuration changes made across your entire Enterprise DLP
configuration. Push logs are specific to Endpoint DLP and track all configuration changes
pushes from Strata Cloud Manager to Prisma Access Agents installed on protected endpoints.
For example, you reviewed your audit logs and confirm that your Endpoint DLP admin made
configuration and policy rule changes. However, upon review of your push logs you discover
that the operation to push these changes from Strata Cloud Manager to all endpoints failed
with the message Endpoint DLP Policy/Configuration failed. This means that
even though your Endpoint DLP admin made the appropriate configuration changes, they
never made it down to the Prisma Access Agent.
If you're consistently seeing Endpoint DLP Policy/Configuration failed in your
push logs, it could mean there is an issue with one or more Prisma Access Agents that need
further investigation.
STEP 6 | Select Manage > Prisma Access Agent and verify that the Prisma Access Agent installed on
impacted endpoints are connected.
This is required to push Endpoint DLP configurations and policy rules from Strata Cloud
Manager. If the Prisma Access Agent isn't connected then it can't receive Endpoint DLP
configuration and policy rule changes or forward matched traffic to Enterprise DLP for
inspection and verdict rendering. Review the Prisma Access Agent documentation for
configuration details.
Confirm the Enterprise DLP and Endpoint DLP connectivity status. If the status is Disabled
then the Prisma Access Agent can't receive the Endpoint DLP configuration and policy rules
required to prevent exfiltration of sensitive data to peripheral devices.
• In the Device list, confirm that the Endpoint DLP Status is Enabled.
• Click the Hostname of an impacted endpoint and in the Endpoint DLP Information section
and confirm the DLP Status is Enabled.
If you verify that the Prisma Access Agent on impacted endpoints is connected and the Prisma
Access Agent configuration has no issues then you need to contact Palo Alto Networks for
additional support.
STEP 7 | Generate a Prisma Access Agent logs to submit to Palo Alto Networks Customer Support.
Select Manage > Prisma Access Agent Check the Prisma Access Agent Enterprise DLP logs.
1. Select Manage > Prisma Access Agent and click one of the impacted endpoints.
2. Select Actions > Generate Agent Logs. The logs download to your local device.
3. Repeat this step for all impacted endpoints.
4. Contact Palo Alto Networks Customer Support to submit a support ticket. Be sure to
include the Prisma Access Agent logs you downloaded.
Data Dictionaries
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Data dictionaries are a collection of one or more keywords or phrases that you want to detect
and prevent exfilitration. A data dictionary is added as a match criteria alongside the other
supported match criteria in advanced and nested data profiles to increase the Enterprise Data
Loss Prevention (E-DLP) detection accuracy.
You can add multiple data dictionaries to a single data profile. For example, you create an
advanced data profile with the OR condition and multiple match criteria Groups. You can add a
unique data dictionary for each match criteria group to ensure high detection accuracy for each
OR match criteria conditions.
Review the requirements to upload a data dictionary to Enterprise DLP:
• Up to 100 custom dictionaries are supported per tenant
• Only .csv and .txt file types are supported.
• Files up to 1 MB are supported.
• Maximum of 200 words per custom dictionary
• Maximum of 128 characters and minimum of 3 characters per word
• Files containing double byte characters, for example Chinese Japanese, and Korean, are
supported
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Detection Methods > Data
Dictionary and Add Custom Dictionary.
How you create your Security policy rules using Enterprise Data Loss Prevention (E-DLP) and
how you order those Security policy rules within your rulebase has significant impact on your
security outcomes. Review the recommendations and tips for creating a Security policy rule using
Enterprise DLP to prevent exflitration of sensitive data and strengthen your overall security
posture.
For both new and existing security administrators, review the Security Policy Best Practices.
Regardless of the Security product you use, Palo Alto Networks recommends you review and
implement these best practices when creating or updating your Security policy rulebase. These
best practices are designed to reduce your attack surface and help safeguard your network and
business assets.
Before you associate a data profile with a Security policy rule, review the recommendations to
reduce false positive detections.
False positive detections are commonly caused by traffic match criteria in your data patterns
that are too generalized or may be instances where the Enterprise DLP machine learning (ML)
models need to be manually trained. Create specific and narrow data pattern match criteria
to add to your data profiles to help reduce the likelihood of false positive detections. This can
help you triage and more easily implement changes when sensitive data isn't detected and
blocked.
Consider the traffic direction and whether you want a different security action taken
depending on whether the traffic is a download or an upload.
Review the supported apps to understand which applications support download inspection,
upload inspection, or both. You can create specific data profiles if you want to take different
security actions based on whether the traffic is a download or an upload.
• Panorama—Create a data profile for file-based or non-file based detections
• Strata Cloud Manager—Modify a DLP Rule on Strata Cloud Manager
Use the Enterprise Data Loss Prevention (E-DLP) Migrator to migrate your Symantec DLP policy
rules and convert them into SaaS Security Data Asset policy rules. This allows you to quickly
transition to Palo Alto Networks Enterprise DLP without the need to manually recreate all your
Data Asset policy rules designed to prevent exfiltration of sensitive data.
To migrate your existing Symantec DLP policy rules, you simply need to export them from
Symantec DLP and import them into the Enterprise DLP migration tool. The Enterprise DLP
migration tool then evaluates the imported Security policy rules to verify that they are compatible
with Enterprise DLP and SaaS Security. Enterprise DLP creates a data pattern and a classic data
profile with names identical to the migrated Symantec DLP policy rule as part of the migration to
capture the traffic match criteria.
If Enterprise DLP detects an incompatible Security policy rule traffic match criteria, you can
choose to delete the incompatible match criteria from the Symantec DLP policy rule before
the migration begins or choose to exclude that specific Symantec DLP policy from migration.
Enterprise DLP adds a successfully migrated Symantec DLP policy rule as a Disabled SaaS
Security Data Asset policy rule. You can then review the Data Asset policy rule, make changes if
needed, and enable the policy rule.
Enterprise DLP supports migration of Symantec DLP policy rules in .xml format and with one or
more of the following match criteria:
• Regular expressions—A customized expression that defines a specific text pattern to inspect
for and block.
• Keywords—Specific words specified to improve detection accuracy and reduce false positives.
Referred to as Proximity Keywords in Palo Alto Networks Enterprise DLP.
• Data Identifiers—The data match criteria added to a Symantec DLP policy rule Referred to as a
data pattern in Palo Alto Networks Enterprise DLP.
• Response Action—Enterprise DLP supports one Response Action per Symantec DLP policy
rule. Enterprise DLP applies the highest priority Response Action if it detects a Symantec DLP
policy rule with more than one Response Action.
The priority list of Symantec DLP Response Actions is:
1. Quarantine
2. Remove Collaboration Action and Remove Collaboration Link
In SaaS Security, the Change Sharing Action in a Data Asset policy rule allows you to
remove collaborators and links using one Data Asset policy rule.
3. Notify Owner
STEP 1 | Export your existing Symantec DLP policy rules in .xml format.
STEP 3 | Select Manage > Configuration > SaaS Security > Settings > All Settings > DLP Migration
Assistant.
STEP 4 | Upload the Symantec DLP policy rules to the Enterprise DLP Migrator.
1. Enter a descriptive Migration Name for the Symantec DLP policy rule migration.
2. In the Upload XML Files section, drag and drop the Symantec DLP policy rules files in
.xml format.
STEP 5 | Import the XML files you uploaded to the Enterprise DLP Migrator.
Enterprise DLP begins to import and analyze your uploaded policy rules to verify compatibility.
Continue to the next step once the import status reaches 100%.
You can also select multiple Partially Compatible policy rules to review. If you select
multiple policy rules, you must switch between them to address each policy rule
individually.
Enterprise DLP Migrator does not support turning an Incompatible policy rule into a
Compatible policy rule.
Below is an example of Partially Compatible Symantec DLP policy rules an admin might need
review before migration to Enterprise DLP.
1. Select one or more Partially Compatible policy rules you want to review.
2. Review Selected.
4. The policy rules now show that they are Compatible and Ready to Migrate.
STEP 9 | Enterprise DLP displays a summary of the successfully migrated policy rules.
Additionally, you can:
• Export PDF—Export a PDF file of the policy rules you migrated to Enterprise DLP. You
download the PDF to your local device.
• Migration History—Redirected to the view the history of all previous successful policy rule
migrations.
• View Policies—Redirected to view your migrated policy rules in the SaaS Security Data
Asset Policies to review and enable.
Click View Policies to continue to the next step.
If you manually navigated to the SaaS Security Data Asset Policies, you also
need to apply the Status: Disabled filter.
2. Click the Policy Name to review the traffic match criteria and verify Enterprise DLP
successfully migrated the policy rule.
The Data Asset policy rule name is the same as the Symantec DLP policy rule XML file
name you uploaded in the previous step. Enterprise DLP automatically populates the
following Data Asset policy rule settings:
• Description—Original Symantec DLP policy rule honored during migration and
applied to the new Data Asset policy rule to preserve any important information and
descriptions about the policy rule.
• Data Profile—Enterprise DLP enables the Data Pattern/Profile match criteria and
attaches the Data Profile created during the migration that contains all the traffic
match criteria to the Data Asset policy rule.
Classic data profiles support predefined, custom, and file property data
patterns only.
If you want to improve Enterprise DLP detection capabilities and accuracy
with advanced detection methods, you must recreate the data profile as an
advanced data profile or create a nested data profile. In either case, you
must reattach the new data profile to the Data Asset policy rule.
• Action—The SaaS Security equivalent of the Response Action from the Symantec DLP
policy rule.
You can edit the migrated Data Asset policy rule Policy Name or make any other
changes as needed from this page. Click Save if you made any changes or Cancel if you
reviewed the migrated policy rule match criteria and confirmed you don't need to make
any changes.
3. Expand the Action column and Enable the policy rule.
4. Apply the Status: Enabled filter and order your policy rule as needed.
Refer to the Recommendations for Security Policy Rules for more information on how to
order your policy rules in your policy rulebase.
5. Repeat this step for all migrated policy rules.
View the log details, snippets, and Insights for traffic that matches your Enterprise Data Loss
Prevention (E-DLP) data patterns or filtering profiles and check the health of Enterprise DLP cloud
service.
• Monitor DLP Status with the DLP Health and Telemetry App
• Enterprise DLP Incident Management
• View Enterprise DLP Log Details
• Manage Enterprise DLP Incidents
• View Enterprise DLP Audit Logs
• Reasons for Inspection Failure
• Save Evidence for Investigative Analysis with Enterprise DLP
• Data Risk
• End User Coaching
• Data Asset Explorer
• Report a False Positive Detection
317
Monitor Enterprise DLP
With an Enterprise Data Loss Prevention (E-DLP) license, you can access the DLP Health &
Telemetry app, which provides visibility into the health of the Enterprise DLP service. Enterprise
DLP service insights are available for any Palo Alto Networks product where you purchased an
Enterprise DLP license.
• Access the DLP Health and Telemetry Dashboard on Strata Cloud Manager
• Monitor DLP Service Status
STEP 2 | Select Manage > Configuration > Security Services > Data Loss Prevention > Health &
Telemetry.
STEP 2 | Observe the DLP Service Status and the Last Updated timestamp.
Status Description
Degraded Experience DLP services are up and running, but not operating at optimally.
An Enterprise Data Loss Prevention (E-DLP) Incident is generated when traffic matches your
Enterprise DLP data profiles for Prisma Access (Managed by Strata Cloud Manager) and SaaS
Security on Strata Cloud Manager. You can then filter and view the DLP Incident for the detected
traffic, such as matched data patterns, the source and destination of the traffic, the file and file
type. Additionally, the DLP Incident displays the specific data pattern that the traffic matched and
also displays the total number of unique and total occurrences of those data pattern matches.
You can then view this sensitive content called a snippet. A snippet is evidence or identifiable
information associated with a pattern match. For example, if you specified a data pattern of Credit
Card Number, the managed firewall returns the credit card number of the user as the snippet that
was matched. By default, the managed firewall returns snippets.
Strata Cloud Manager uses data masking to mask the data in the snippets. By default, the DLP
Incident displays the last four digits of the value in cleartext (partial masking). For example, a
DLP Incident displays a snippet of a credit card number as XXXX-XXXX-XXXX-1234. You can
also specify the data to be completely displayed in cleartext or to fully mask the data and hide all
values.
• Email DLP
• Endpoint DLP
STEP 2 | Select Manage > Configuration > Data Loss Prevention > DLP Incidents.
STEP 3 | Select a Scan Date and Region to filter the DLP Incidents.
Enterprise DLP Incidents are generated in the Region where the Public Cloud Server is located.
For Prisma Access (Managed by Strata Cloud Manager) and NGFW (Managed by Strata Cloud
Manager), Enterprise DLP automatically resolves to the closest Public Cloud Server to where
the inspected traffic originated.
When a new Public Cloud Server is introduced, Enterprise DLP automatically resolve to
it if it’s closer to where the inspected traffic originated.
This might mean that new DLP Incidents generated after the release of a new Public
Cloud Server are generated in a different Region.
STEP 4 | Review the DLP Incidents summary information to help focus your incident investigation.
These lists are updated hourly.
• Top Data Profiles to Investigate—Lists up to seven data profiles with the highest number of
incidents in descending order.
• Top Sources to Investigate—Lists up to seven source IP addresses and Fully Qualified
Domain Names (FQDN) with the highest number of incidents in descending order.
• Sensitive Files by Action—Lists the number of incidents based on the Action taken by
Enterprise DLP in descending order.
STEP 5 | Review the Incidents and click the File name to review detailed information for a specific
incident.
You can Add New Filter to filter the DLP incidents by Action, Channel, Data Profile or
Response Status to search for a specific incident you want to review.
STEP 6 | Review the Incident Details to review specific file upload details.
Make note of the Report ID for the DLP incident if you haven’t already done so. The Report ID
is used to view additional Traffic log details regarding the DLP incident.
• Info
The Info panel displays general information about the DLP incident.
• Channel/Source—The security endpoint using Enterprise DLP through which the
incident occurred.
• Incident ID—Unique ID for the DLP incident.
• Report ID—Unique ID used to view additional Traffic log details regarding the DLP
incident.
• Action—The action Enterprise DLP took on the traffic that matched your DLP rule.
• Data Profile—Data profile that traffic matched against that generated the incident.
• Assign To—Select an admin to review and manage the DLP incident.
• Status—Select the resolution status of the DLP incident.
• Priority—Specify the DLP incident priority. You can select P1, P2, P3, P4, or P5.
• Data
• Asset—Name of the file containing sensitive data that generated the incident. For non-
file inspection, the asset name is http-post-put.
• Type—File type for the file that generated the incident. For non-file inspection, the type
is non-file.
• Direction—Indicates whether the matched traffic was a Download or an Upload when
the incident occurred.
• Scan Date—Date and time the matched traffic was scanned and the DLP incident was
generated.
• User
User data requires integration with Cloud Identity Engine (CIE) to display. The User data
displayed correspond to Palo Alto Networks Attributes that correlate to specific directory
provider fields in CIE.
• User ID—ID of the user that generated the DLP incident.
The User ID field does not require CIE integration. However, the corresponding Palo Alto
Networks Attribute is User Principal Name.
• Role—Role of the user that generated the DLP incident.
Corresponding Palo Alto Networks Attribute is Title.
• Organization—Organization the user that generated the DLP incident is associated with.
Corresponding Palo Alto Networks Attribute is Department.
• Location—Location of the user that generated the DLP incident.
Corresponding Palo Alto Networks Attribute is Location.
• Manager—Manager of the user that generated the DLP incident.
STEP 7 | Review the Matches within Data Profiles to review snippets of matching traffic and the data
patterns that matched the traffic to better understand what data was detected.
For nested data profiles, Enterprise DLP displays the name of the nested data profile
and not the specific data profile containing the match criteria that matched inspected
traffic. For example, you create a DataProfile, with the nested profiles Profile1,
Profile2, and Profile3. Enterprise DLP inspects traffic that match Profile2
and blocks it. In this scenario, the Matches within Data Profile displays
DataProfile.
Additionally, you can filter the Matches within Data Profile for a nested
data profile to display traffic matches against specific associated data profiles.
STEP 8 | Review the file log to learn about the traffic data for the DLP incident.
1. Select Incidents & Alerts > Log Viewer.
2. From the Firewall drop-down, select File.
3. Filter to view the file log for the DLP incident using the Report ID.
Report ID = <report-id>
4. Review the file log to learn more about the traffic data for the DLP incident.
Panorama
STEP 1 | Log in to the Panorama web interface.
STEP 2 | Select Monitor > Logs > Data Filtering and Filter the data filtering logs by entering
( subtype eq dlp ).
STEP 3 | View more details about the file including file snippets.
1. Click to the left of the specific log entry for which you want to view more details.
2. Select DLP to view the pattern details.
3. Show Snippet to view a snippet of the data that matched the specific data pattern.
For nested data profiles, Enterprise DLP displays the name of the nested
data profile and not the specific data profile containing the match criteria
that matched inspected traffic. For example, you create a nested data profile
called DataProfile and you add Profile1, Profile2, and Profile3.
Enterprise DLP inspects traffic that matches Profile2 and blocks it. In
this scenario, the Data Profile Name in the DLP incident logs displays
DataProfile.
STEP 2 | Select Manage > Configuration > SaaS Security > Data Security > Logs.
Multiple DLP Incidents (Manage > Configuration > Data Loss Prevention > DLP
Incidents) can be generated for a single file move operation from the endpoint and
peripheral device. Some examples of when this may occur are:
• Extracting the file contents of a compressed file from the endpoint to a peripheral
device.
• An application that generates any artifact files when writing to a peripheral device. For
example, the Microsoft BITSAdmin tool generates multiple .tmp files when writing to a
peripheral device.
To prevent exfiltration of sensitive data, Enterprise DLP inspects every file associated with
the file move operation from the endpoint to the peripheral device. This ensures that all
impacted files are captured in your logs and analyzed. However, this may result in the
creation of unnecessary DLP Incidents.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > DLP Incidents.
STEP 3 | Select a Scan Date and Region to filter the DLP Incidents.
Enterprise DLP Incidents are generated in the Region where the Public Cloud Server is located.
For Prisma Access (Managed by Strata Cloud Manager)and NGFW (Managed by Strata Cloud
Manager), Enterprise DLP automatically resolves to the closest Public Cloud Server to where
the inspected traffic originated.
When a new Public Cloud Server is introduced, Enterprise DLP automatically resolve to
it if it’s closer to where the inspected traffic originated.
This might mean that new DLP Incidents generated after the release of a new Public
Cloud Server are generated in a different Region.
STEP 4 | Add Filter and select the Action to filter for the specific Endpoint DLP policy rule action you
want to investigate.
For example, select only Block if you wanted to investigate all Endpoint DLP incidents where
access to a peripheral device or file movement from the endpoint to the peripheral device was
blocked.
STEP 5 | Review the Incidents and click the Incident ID to review detailed information for a specific
incident.
STEP 6 | Review the Incident Details to review specific file upload details.
Make note of the Report ID for the DLP incident if you haven’t already done so. The Report ID
is used to view additional Traffic log details regarding the DLP incident.
• Info
The Info panel displays general information about the DLP incident.
• Channel/Source—The enforcement point using Enterprise DLP through which the
incident occurred. This field always displays Endpoint DLP.
• Incident ID—Unique ID for the DLP incident.
• Report ID—Unique ID used to view additional Traffic log details regarding the DLP
incident.
• Action—The action Enterprise DLP took on the traffic that matched your DLP rule.
• Data Profile—Data profile that traffic matched against that generated the incident.
A data profile is displayed for Data in Motion Endpoint DLP policy rules only. For
Peripheral Control Endpoint DLP policy rules, Not Found is displayed.
• Assign To—Select an admin to review and manage the DLP incident.
• Status—Select the resolution status of the DLP incident.
• Priority—Specify the DLP incident priority. You can select P1, P2, P3, P4, or P5.
• Data
• Asset—Name of the file containing sensitive data that generated the incident. For non-
file inspection, the asset name is http-post-put.
• Type—File type for the file that generated the incident. For non-file inspection, the type
is non-file.
• Direction—Indicates whether the matched traffic was a Download or an Upload when
the incident occurred.
• Scan Date—Date and time the matched traffic was scanned and the DLP incident was
generated.
• User
User data requires integration with Cloud Identity Engine (CIE) to display. The User data
displayed correspond to Palo Alto Networks Attributes that correlate to specific directory
provider fields in CIE.
• User ID—ID of the user that generated the DLP incident.
The User-ID field does not require CIE integration. However, the corresponding Palo
Alto Networks Attribute is User Principal Name.
• Role—Role of the user who generated the DLP incident.
Corresponding Palo Alto Networks Attribute is Title.
• Organization—Organization the user who generated the DLP incident is associated with.
Corresponding Palo Alto Networks Attribute is Department.
• Location—Location of the user who generated the DLP incident.
STEP 7 | (Data in Motion only) Review the Matches within Data Profiles to review snippets of
matching traffic and the data patterns that matched the traffic to better understand what
detected data.
For nested data profiles, Enterprise DLP displays the name of the nested data profile
and not the specific data profile containing the match criteria that matched inspected
traffic. For example, you create a DataProfile, with the nested profiles Profile1,
Profile2, and Profile3. Enterprise DLP inspects traffic that match Profile2
and blocks it. In this scenario, the Matches within Data Profile displays
DataProfile.
Additionally, you can filter the Matches within Data Profile for a nested
data profile to display traffic matches against specific associated data profiles.
STEP 8 | Review the file log to learn about the traffic data for the DLP incident.
1. Select Incidents & Alerts > Log Viewer.
2. From the Firewall drop-down, select File.
3. Filter to view the file log for the DLP incident using the Report ID.
Report ID = <report-id>
4. Review the file log to learn more about the traffic data for the DLP incident.
Manage your Enterprise Data Loss Prevention (E-DLP) incidents to investigate and resolve
incidents when traffic matches your Enterprise DLP data profiles.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > DLP Incidents.
STEP 4 | (Optional) Add New Filter to filter the Enterprise DLP incidents.
STEP 6 | Change Resolution as your team works to resolve the incident that triggered Enterprise DLP
enforcement.
You can select one of the predefined incident resolution statues or type a new resolution
status to Create Tag.
STEP 7 | For additional auditing and clarity for your team members, you can Edit Notes to provide
further details.
Save after you finish providing the additional information in your notes. The existing note is
overwritten if you save a new note.
Delete the note if no longer needed.
Review your Enterprise Data Loss Prevention (E-DLP) audit logs for a comprehensive history of
the changes that occurred across your Enterprise DLP security service.Enterprise DLP audit logs
maintain a history of when data patterns and data profiles are created, updated, or deleted.
For Endpoint DLP, you can view the audit logs to review the change history for your Endpoint
DLP configuration changes as you would for Enterprise DLP. Additionally, Push Logs reflect the
latest Endpoint DLP policy rule and setting changes that were pushed as well as the Push Log
history to review the history of when Endpoint DLP policy or rule configuration changes were
pushed, by who, and a summary of all the changes included in the push.
• Strata Cloud Manager
• Email DLP
• Push Logs (Endpoint DLP)
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Audit Log.
STEP 4 | Click View Details to see detailed information about a specific audit log.
You can view additional audit log details to better understand what changes in your Enterprise
DLP configuration. When you update an existing data pattern, data profile, or other Enterprise
DLP configuration object, Enterprise DLP highlights in red what the security admin deleted and
highlights in green what the security admin added or changed.
Some audit log data displayed when you View Details include:
• What was configured in a newly created data pattern or data profile.
• What was updated in an existing data pattern, data profile, or DLP Rule.
• When you create an advanced detection method like a custom document type and data
dictionary.
• When you add or update an Endpoint DLP peripheral device.
• When you add or update an Endpoint DLP policy rule.
STEP 2 | Select Manage > Configuration > SaaS Security > Settings > Monitor Actions Taken by SaaS
Security.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Audit Log > Push Logs.
successfully. For a failed push, the Event column displays Endpoint DLP Policy/
Configuration failed.
Click View Details to review detailed information about a specific Endpoint DLP policy rule
and configuration push.
STEP 4 | Review detailed information about a specific Endpoint DLP policy rule and configuration
push.
• Status—Status of the push operation; can be Success or Failure.
• Start Time—Date and time the push operation was initiated. Timestamp is in MM/DD/YY
hh:mm format.
• End Time—Date and time the push operation completed regardless of status. Timestamp is
in MM/DD/YY hh:mm format.
• Description—Description for the push operation added by the security administrator. This
field is blank if description was added when the push was initiated.
• Request ID—ID of the policy push operation from Strata Cloud Manager to Prisma Access
Agent installed on endpoint devices. The Request ID is used for troubleshooting in the
event you push Endpoint DLP changes but the Prisma Access Agent doesn't take the
expected Endpoint DLP policy rule action.
• Policies—List of new or modified Endpoint DLP policy rules included in the push.
• Peripherals—List of peripheral devices added to Endpoint DLP.
• Peripheral Groups—List of newly created or modified peripheral groups.
• Settings—List of Endpoint DLP data filtering and snippet setting changes.
In some cases, Enterprise Data Loss Prevention (E-DLP) is unable to inspect and render a verdict
on either file or non-file based traffic that match an Enterprise DLP data profile, and as a result
no DLP incident is generated. However, a log is generated if Enterprise DLP is unable to inspect
matched traffic.
• Strata Cloud Manager—View the File log (Incident & Alerts > Log Viewer)
Apply a Sub Type = dlp or Sub Type = dlp-non-file filter to narrow down the list of
file logs.
If the Reason for Data Filtering Action column isn’t displayed, expand the menu for any
displayed column to search for and check (enable) Reason for Data Filtering Action.
• Panorama™ management server—View the Data Filtering log (Monitor > Logs > Data
Filtering).
Apply a (subtype eq dlp) filter to narrow down the list of data filtering logs.
If the Reason for Action column isn’t displayed, expand the menu for any displayed column and
click Columns and check (enable) Reason for Action.
File logs display a Reason for Data Filtering Action and data filtering logs display a
Reason for Action column describing what data filtering action was taken by your security
endpoint. In this case, the reason why Enterprise DLP was unable to inspect the matched traffic is
described. Review the list of reasons why Enterprise DLP was unable to inspect matched traffic.
Scan Skipped: File Size > Limit Inspection skipped because the maximum file
size limit was exceeded.
To avoid this in the future, you can increase
the Max File Size.
Scan Skipped: Latency > Limit Inspection skipped because the maximum
latency limit was exceeded.
To avoid this in the future, you can increase
the Max Latency
Scan Skipped: Rate > Limit Inspection skipped because Enterprise DLP
received the maximum number of inspection
requests.
Scan Skipped: Profile not found Inspection skipped because NGFW or Prisma
Access tenant couldn't find the matched data
profile.
Review your Security policy rules to ensure
the associated data profile exists.
Scan Skipped: Scan req timeout Inspection was skipped because the
inspection request timed out.
Scan ERR: Rule1 invalid action Inspected traffic matched the Primary rule in
the data profile, but the Action is invalid. The
Action must be either Block or Alert.
Scan ERR: Rule2 invalid action Inspected traffic matched the Secondary rule
in the data profile, but the Action is invalid.
The Action must be either Block or Alert.
FW Skipped: Data Length > Limit NGFW or Prisma Access tenant did not
forward traffic to Enterprise DLP due to the
non-file traffic exceeding the Max Data Size
in the Non-File Based Settings.
To avoid this, you can increase the Max Data
Size for non-file traffic.
Connect an AWS storage bucket, Azure storage bucket, or SFTP server to Enterprise Data Loss
Prevention (E-DLP) to automatically store evidence of traffic scanned by the Enterprise DLP that
match your Enterprise DLP data profiles. After evidence is successfully stored, you can download
a file of the matched traffic for further investigation. Enterprise DLP supports setting up and
connecting only one storage bucket to automatically store evidence of scanned traffic. You can't
set up and connect multiple storage buckets to Enterprise DLP.
Enterprise DLP supports evidence storage for file based traffic, non-file based traffic, and Email
DLP.
• Set Up SFTP Storage to Save Evidence
• Set Up Cloud Storage on AWS to Save Evidence
• Set Up Cloud Storage on Microsoft Azure to Save Evidence
• Download Files for Evidence Analysis
To store your files scanned by the DLP cloud service, you must specify the SFTP server
connectivity information to successfully upload and write files to a target location on the SFTP
server. When the DLP cloud service uploads a file to your SFTP server, a reportId folder
is created by default. All files uploaded to your SFTP server by the DLP cloud service are
uploaded to the reportId folder within your folder path. Files uploaded to your SFTP server
are automatically named using the SFTP target folder location, default reportId folder, and
filename.
The following special characters in a file name are not supported and prevent Enterprise Data
Loss Prevention (E-DLP) from saving files to SFTP storage: '/ \ * ? <>'. If you have a file
name that includes one of these special characters, you must change the special character to an
underscore (_) so Enterprise DLP can save a copy of the file.
In case of connection issues to your SFTP server due to configuration error or change in settings
on the SFTP server, an email is automatically generated and sent to the admin that originally
connected Enterprise DLP to the SFTP server and to the user who last modified the storage
bucket connection settings. This email is sent out every 48 hours until the connection is restored.
Files that are scanned by the DLP cloud service while Enterprise DLP is disconnected from
your storage bucket can’t be stored and are lost. This means that all impacted files aren’t
available for download. However, all snippet data is preserved and can still be viewed on
Enterprise DLP on the hub.
File storage automatically resumes after the connection status is restored.
This procedure assumes you have already set up an SFTP server to save evidence for investigative
analysis.
STEP 1 | Review the setup prerequisites for Enterprise DLP and enable the required ports, full
qualified domain names (FQDN), and IP addresses on your network.
• You must allow all IP addresses for Evidence Storage in the region where the SFTP server
is deployed. This is gives Enterprise DLP access to your network in order to write to your
SFTP server.
• You must allow the IP or FQDN of the SFTP server on your network. The SFTP server
must be accessible on your network so Enterprise DLP can successfully write to your SFTP
server.
Access to evidence storage settings and files on Strata Cloud Manager is allowed only
for an account administrator or app administrator role with Enterprise DLP read and
write privileges. This is to ensure that only the appropriate users have access to report
data and evidence.
STEP 3 | Select Manage > Configuration > Data Loss Prevention > Settings > Sensitive Data and
select Configure Bucket > SFTP as the Public Cloud Storage Bucket.
STEP 5 | Input Bucket Details to configure the SFTP server connection settings.
1. Enter the Username of the SFTP server user used for secure file uploads.
The user is required to have read and write access to the SFTP server.
2. Enter the Private Key for the SFTP server.
This is required to authenticate the SSH connection to the SFTP server. The Private
Key must include both the BEGIN RSA PRIVATE KEY and END RSA PRIVATE KEY
prompts.
3. (Optional) Enter the public PGP Key to sign and encrypt files uploaded to the SFTP
server.
Pretty Good Privacy (PGP) is an encryption program providing privacy and
authentication for data communication, and used for signing, encrypting, and decrypting
files. The PGP Key must include both the BEGIN RSA PRIVATE KEY and END RSA
PRIVATE KEY prompts.
Path on your SFTP server. Connectivity between the DLP cloud service and your SFTP server
is successful if DLP cloud service successfully uploads the test file.
The Connection Status displays whether the initial connection test was successful. Continue to
the next step when the Bucket connected successfully.
Click Previous if the connection isn’t successful to modify the SFTP server and connection
settings as needed.
Amazon Web Services (AWS) users can configure an S3 storage bucket to automatically upload all
files that match an Enterprise Data Loss Prevention (E-DLP) data profile for Enterprise DLP.
To store your files scanned by the DLP cloud service, you must create an S3 storage bucket
and Identity and Access Management (IAM) role that allows the DLP cloud service access to
automatically store files. Palo Alto Networks provides you with a JSON data containing the
required policy permissions to create the IAM role. Files uploaded to your S3 storage bucket are
automatically named using a unique Report ID for each file. The Report ID is used to search and
download specific files for more in-depth investigation.
In case of connection issues to your S3 storage bucket due to configuration error or change in
settings on the bucket, an email is automatically generated and sent to the admin that originally
connected Enterprise DLP to the storage bucket and to the user who last modified the storage
bucket connection settings. This email is sent out every 48 hours until the connection is restored.
Files that are scanned by the DLP cloud service while Enterprise DLP is disconnected from
your storage bucket can't be stored and are lost. This means that all impacted files are not
available for download. However, all snippet data is preserved and can still be viewed.
File storage automatically resumes after the connection status is restored.
• AWS
• AWS KSM
STEP 1 | Review the setup prerequisites for Enterprise DLP and enable the required ports, full
qualified domain names (FQDN), and IP addresses on your network.
STEP 2 | Create a public S3 storage bucket to store files scanned by the Enterprise DLP cloud service.
1. Log in to the Amazon AWS console.
2. Select Services > Storage > S3 > Buckets and Create bucket.
3. Enter a descriptive Bucket name.
4. Select the AWS Region for the S3 storage bucket.
5. In the Default encryption section, select Amazon S3 managed keys (SSE-S3) as the
Encryption key type.
You can Create a KMS Key if one does not already exist. Refer to AWS Documentation
for more information on creating a new KMS key.
6. Create bucket.
7. Obtain the ARN for the S3 storage bucket.
After creating the S3 storage bucket, you're redirected back to the Buckets page. Search
for and click the storage bucket you created.
Click Properties. The storage bucket ARN is displayed in the Bucket overview.
STEP 3 | Enable the AWS KMS setting for the storage bucket and locate the trust relationship and
access policy JSONs provided by Palo Alto Networks.
1. Log in to Strata Cloud Manager.
2. Select Manage > Configuration > Data Loss Prevention > Settings > Sensitive Data.
3. In Evidence Storage, select Configure Bucket > AWS as the Public Storage Bucket.
4. In Instructions - AWS, locate the trust relationship and access policy JSON provided
to define the trust relationship and access policy between the IAM role and Palo Alto
Networks.
The first JSON provided is the trust relationship and the second is the access policy.
Highlighted are the copy buttons that you will use later on to create the IAM role for the
S3 storage bucket.
Leave the Configure Bucket for Evidence Storage display open and continue
to create the IAM role for the S3 storage bucket in a separate browser window.
7. Click Next.
8. In Add permissions, select Create policy > JSON.
A new window is automatically opened in your browser to create the new access policy.
9. Return to Strata Cloud Manager and copy the access policy JSON.
10. In the Amazon AWS console, paste the access policy JSON into the Policy editor.
11. Add the bucket ARN for the S3 storage bucket you created.
Throughout the JSON, you must replace all instances of
bucket_name_to_be_replaced with the S3 storage bucket ARN you created.
Access to evidence storage settings and files on Strata Cloud Manager is allowed
only for an account administrator or app administrator role with Enterprise
DLP read and write privileges. This is to ensure that only the appropriate users
have access to report data and evidence.
2. Select Manage > Configuration > Security Services > Data Loss Prevention > Settings >
Sensitive Data and select AWS as the Public Cloud Storage Bucket.
3. Select Input Bucket Details.
4. Enter the S3 Bucket Name of the bucket you created.
The name you enter in the Strata Cloud Manager must match the name of the S3 storage
bucket on AWS.
5. Enter the Role ARN for the IAM role you created.
The IAM Role ARN can be found in the IAM role Permissions. The role ARN is displayed
in the Summary.
6. Select the AWS Region where the bucket is located.
If Enterprise DLP can't successfully connect your bucket, select Previous and edit the
bucket connection settings.
STEP 1 | Review the setup prerequisites for Enterprise DLP and enable the required ports, full
qualified domain names (FQDN), and IP addresses on your network.
STEP 2 | Create a public S3 storage bucket to store files scanned by the Enterprise DLP cloud service.
1. Log in to the Amazon AWS console.
2. Select Services > Storage > S3 > Buckets and Create bucket.
3. Enter a descriptive Bucket name.
4. Select the AWS Region for the S3 storage bucket.
5. In the Default encryption section, select AWS Key Management Service (SSE-
KMS) as the Encryption key type.
6. To specify the AWS KMS key, you can Choose from your AWS KMS keys or you can
Enter AWS key ARN.
You can Create a KMS Key if one does not already exist. Refer to AWS Documentation
for more information on creating a new KMS key.
7. Create bucket.
8. Obtain the ARN for the S3 storage bucket.
After creating the S3 storage bucket, you're redirected back to the Buckets page. Search
for and click the storage bucket you created.
Click Properties. The storage bucket ARN is displayed in the Bucket overview.
STEP 3 | Enable the AWS KMS setting for the storage bucket and locate the trust relationship and
access policy JSONs provided by Palo Alto Networks.
1. Log in to Strata Cloud Manager.
2. Select Manage > Configuration > Data Loss Prevention > Settings > Sensitive Data.
3. In Evidence Storage, select Configure Bucket > AWS as the Public Storage Bucket.
4. Toggle KMS Enabled enable an S3 storage bucket using AWS KMS.
5. In Instructions - AWS, locate the trust relationship and access policy JSON provided
to define the trust relationship and access policy between the IAM role and Palo Alto
Networks.
The first JSON provided is the trust relationship and the second is the access policy.
Highlighted are the copy buttons that you will use later on to create the IAM role for the
S3 storage bucket.
Leave the Configure Bucket for Evidence Storage display open and continue
to create the IAM role for the S3 storage bucket in a separate browser window.
7. Click Next.
8. In Add permissions, select Create policy > JSON.
A new window is automatically opened in your browser to create the new access policy.
9. Return to Strata Cloud Manager and copy the access policy JSON.
10. In the Amazon AWS console, paste the access policy JSON into the Policy editor.
11. Add the bucket ARN for the S3 storage bucket you created.
Throughout the JSON, you must replace all instances of
bucket_name_to_be_replaced with the S3 storage bucket ARN you created.
Access to evidence storage settings and files on Strata Cloud Manager is allowed
only for an account administrator or app administrator role with Enterprise
DLP read and write privileges. This is to ensure that only the appropriate users
have access to report data and evidence.
2. Select Manage > Configuration > Security Services > Data Loss Prevention > Settings >
Sensitive Data and select AWS as the Public Cloud Storage Bucket.
3. Select Input Bucket Details.
4. Enter the S3 Bucket Name of the bucket you created.
The name you enter in Strata Cloud Manager must match the name of the S3 storage
bucket on AWS.
5. Enter the Role ARN for the IAM role you created.
The IAM Role ARN can be found in the IAM role Permissions. The role ARN is displayed
in the Summary.
6. Select the AWS Region where the bucket is located.
If Enterprise DLP can't successfully connect your bucket, select Previous and edit the
bucket connection settings.
Microsoft Azure users can configure a blog storage bucket to automatically upload all files that
match an Enterprise Data Loss Prevention (E-DLP) data profile for Enterprise DLP.
To store your files scanned by the DLP cloud service, you must create a storage account
and Identity and Access Management (IAM) role that allows the DLP cloud service access to
automatically store files. Files uploaded to your storage account are automatically named using
a unique Report ID for each file. The Report ID is used to search and download specific files for
more in-depth investigation.
In case of connection issues to your storage account due to configuration error or change in
settings, an email is automatically generated and sent to the admin that originally connected
to Enterprise DLP to the storage bucket and to the user who last modified the storage account
connection settings. This email is sent out every 48 hours until the connection is restored.
Files scanned by the DLP cloud service while Enterprise DLP was disconnected from your
storage account can’t be stored and are lost. This means that all impacted files aren’t
available for download. However, all snippet data is preserved and can still be viewed in
the Enterprise DLP
File storage automatically resumes after the connection status is restored.
STEP 1 | Review the setup prerequisites for Enterprise DLP and enable the required ports, full
qualified domain names (FQDN), and IP addresses on your network.
STEP 3 | (Optional) From the portal menu, select Storage groups and Create a new storage group.
You can also search for storage groups.
The storage group is required to associate the storage account you create next for
storing matched files.
Skip this step if you have an existing resource group that you want to associate with
the storage account.
STEP 4 | From the portal menu, select Storage accounts and Create a new storage account.
You can also search for storage accounts.
STEP 5 | Obtain the App-ID, Tenant ID, and blob service endpoint URL.
This information is required to add the Palo Alto Networks Enterprise DLP application to your
Microsoft Azure tenant and to configure connectivity to the DLP cloud service.
• Palo Alto Networks Enterprise DLP App ID - 65def4b7-bae6-4bff-ab73-63fe8c9a3c8d
The Palo Alto Networks Enterprise DLP App-ID can be found in the DLP app on the hub
(Settings > Sensitive Data > Configure Bucket > Azure).
1. Obtain your Tenant ID.
1. From the portal menu, select Azure Active Directory.
You can also search for azure active directory.
2. In the Basic Information section, copy the Tenant ID.
2. Obtain the blob service endpoint URL.
1. From the portal menu, select Storage accounts and select the storage account you
will use to save files for evidence analysis.
2. Select Settings > Endpoints and copy the Blob service endpoint URL.
STEP 7 | Configure permissions for the Palo Alto Networks Enterprise DLP application.
1. Select the Palo Alto Networks Enterprise DLP application name.
2. Select Security > Permissions and Grant Admin consent.
3. Select the administrator email in the Microsoft login prompt that is displayed.
4. Accept the permissions request to allow the Palo Alto Networks Enterprise DLP
application to view your Azure storage accounts.
It might take a few minutes for the permissions to be successfully granted to the Palo
Alto Networks Enterprise DLP application.
You still need to grant the Palo Alto Networks Enterprise DLP application permission to
write to a specific storage account.
5. Verify that the Azure Storage and Microsoft Graph API names are displayed in
the Admin consent section.
6. From the portal menu, select Storage accounts and select the storage account you want
to use to save files for evidence analysis.
7. Select Access Control (IAM) > Add > Add Role Assignment > Storage Blob Data Owner
and click Next.
8. Select to assign access to User, group, or service principle and select members.
9. Search and select the Palo Alto Networks Enterprise DLP application and Select the
application.
10. Review + assign to allow the Palo Alto Networks Enterprise DLP application to write to
the storage account.
It can take up to 10 minutes for the write permissions to be successfully granted to the
Palo Alto Networks Enterprise DLP application.
Access to evidence storage settings and files on Strata Cloud Manager is allowed
only for an account administrator or app administrator role with Enterprise
DLP read and write privileges. This is to ensure that only the appropriate users
have access to report data and evidence.
2. Select Manage > Configuration > Data Loss Prevention > Settings > Sensitive Data and
select Azure as the Public Cloud Storage Bucket.
3. Select Input Bucket Details.
4. Enter Microsoft Azure Tenant ID.
5. Enter the Storage Endpoint.
This is the blob service endpoint URL that you gathered for the storage account.
6. Connect the storage account and the DLP cloud service.
7. View the Connection Status to verify that the DLP cloud service successfully connected
to the storage account.
Select Save if Strata Cloud Manager can successfully connect your bucket. A
connectiontest file is uploaded to your storage account by the DLP cloud service to
verify connectivity.
If Strata Cloud Manager can’t successfully connect your bucket, select Previous and edit
the bucket connection settings.
8. In the Store Sensitive Files settings, enable storage of sensitive files for Strata Cloud
Manager.
After you successfully connect your AWS storage bucket, Azure storage bucket, or SFTP server to
Enterprise Data Loss Prevention (E-DLP) to store evidence for traffic that match your Enterprise
DLP data profiles, you can download a file to your local device the instance of traffic scanned by
the DLP cloud service that generated the DLP incident to allow for in-depth investigation.
Traffic scanned by the DLP cloud service while Enterprise DLP is disconnected from your cloud
storage bucket isn't stored in your cloud storage. This means that all files created by traffic that
generated a DLP incident aren’t available for download. However, all snippet data is preserved
and can still be viewed in Enterprise DLP.
The file format or the matched traffic is dependent on the type of traffic that generated the DLP
incident.
• File Based—Copy of the file that generated the incident is saved in the same file format in
which it was inspected.
• Non-File—Non-file traffic is saved in .txt format.
If a file is shared in a non-file based app, for example Slack, then the file is saved in the same
file format in which it was inspected.
• Email DLP—Outbound emails are saved in .eml format.
STEP 1 | Connect your AWS storage bucket, Azure storage bucket, or SFTP server to Enterprise DLP
if not already connected.
The files available to download are only files scanned by the DLP cloud service after you
successfully connected Enterprise DLP to your cloud storage bucket.
STEP 2 | (AWS and Azure only) Log in to the Amazon AWS console or Microsoft Azure portal and
access the cloud storage you connected to Strata Cloud Manager. Select Reports and enter a
Report ID to Search.
The object Name is the Report ID.
STEP 4 | Select Manage > Configuration > Data Loss Prevention > DLP Incidents and search for the
Report ID.
STEP 5 | Review report summary and click the download button to download the file to your device.
Whether the stored file is downloaded directly to your local device is dependent on the
storage bucket you connected to Enterprise DLP.
• AWS and Azure—The file associated with the particular Report ID is downloaded locally to
your device.
• SFTP Server—Enterprise DLP displays the folder path of the location the file was uploaded
to on your SFTP server. You must access your SFTP server to download the file to your
local device.
Data Risk
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Data Risk provides deep insights into the data security risk for your organization with contextual
recommendations to help improve your security posture.
• What Is Data Risk?
• Analyze the Data Risk Dashboard
• Configure Risk Score Ranges
• Configure Risk Factor Importance
• Configure Severity for Data Profiles
• Data Risk Recommendations
Data Risk provides quantifiable metrics to measure the overall data risk for your organization. It
provides administrators the ability to analyze and take preventative action to strengthen your data
risk security posture using the Data Risk Dashboard.
• Visibility—Provides administrators visibility to measure risk down to an individual data asset.
Additionally, it allows the administrator to group and filter risk at an aggregate level to identify
risk hotspots.
The Data Risk Dashboard offers a Risk Breakdown to identify risk across multiple clusters and
individual nodes, giving you visibility into the riskiest assets on your network. In addition to
the data asset and document level risk measurement, the Data Risk Dashboard also provides a
high-level summary of the Data Risk score across your deployment. This includes a risk trend
for the past 7, 30, or 90 days and visibility into the industry average to help you compare your
data risk security posture against your industry peers.
• Customization—Administrators can configure the Data Risk risk model weights and severity for
contextual risk analysis.
This allows you to customize the Data Disk Dashboard with visibility into only data exposures
you're interested in preventing. Data Risk weighs three categories of risk factors; data,
application, and users. You can configure the overall data risk score based on each of these
three data risk categories. Within each data risk category, you can configure individual risk
factors related to each.
• Remediation Recommendations—The Data Risk Dashboard provides administrators with
actionable recommendations to address risky hotspots and improve your security posture.
Enterprise DLP provides insights based on security gaps that most impact your overall Data
Risk score. This allows you to immediately take action to address the weakest security points
and strengthen your security posture.
approach to assessing your data security risk, aligning it with your organization's unique needs,
and provides actionable recommendations for improving your data security posture.
Identification of Key Risk Factors—Data Risk begins by identifying critical attributes within three
main categories: application, data, and users. These attributes are carefully chosen by security
experts, incorporating their knowledge, threat intelligence, and industry insights.
Configurable Risk Factors—Administrators have the flexibility to configure the risk score ranges,
risk factor importance, and data profile severity settings to align with your organization's specific
business processes and technical requirements. Enterprise DLP uses these importance settings to
determine the weighting (multiplier) for each risk attribute.
Assessing the Likelihood of a Breach—The attributes help assess the likelihood of a data breach.
Data Risk considers factors like application configurations, user behavior, and data exposure. This
analysis helps in quantifying the potential threats an organization faces.
Evaluating the Impact of Data Breaches—Data Risk also factors in the potential impact of a data
breach by examining data sensitivity and data profiles. This enables a more nuanced evaluation of
the consequences of security incidents.
Aggregated Risk Score—Using these attributes and assessments, Data Risk calculates an
aggregated risk score for all discovered assets. This score provides a comprehensive overview of
the risk associated with sensitive data stored in SaaS applications.
Incorporation of SaaS App Compliance Data—Risk scoring attributes incorporate data related to
SaaS application compliance, ensuring that regulatory and industry standards are part of the risk
assessment.
Continuous Monitoring and Change Tracking—Use the Data Risk Dashboard for ongoing
monitoring. It continuously monitors changes in data asset properties and tracks the effectiveness
of implemented security and privacy controls. This ongoing monitoring provides insights into
shifts in your organization's overall risk posture.
Insights and Recommendations—Data Risk goes beyond just providing a risk score and offers
insights into the specific security and privacy controls that significantly influence the risk score.
It also provides actionable recommendations for improving the organization's security posture,
allowing for informed decision-making and risk mitigation.
Analyze the Data Risk Dashboard to understand your overall data risk score and get an
assessment of your overall security posture. It helps you identify data security hotspots where
data risk may be high and needs priority attention. The Data Risk Dashboard provides a granular
Risk Breakdown that allows you to explore potential data risks across your control points,
applications, and data profiles. By default, the Risk Breakdown displays the risks for what
Enterprise DLP has calculated to be your riskiest data asset exposures. However, you can modify
and change the Risk Breakdown as needed. The default Risk Breakdown display is restored when
the page is refreshed. The Data Risk Dashboard recalculates your data risk every 24 hours.
Additionally, actionable Recommendations are provided. These are contextual recommendations
made by Enterprise DLP based on your data risk model. The recommendations are sorted and
displayed based on the highest impact changes to your security posture. These actionable
recommendations address platform-wide changes you can make rather to applications, data
assets, or users rather than addressing an individual data asset.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Data Risk.
STEP 3 | Review the high-level summary for your data risk exposure.
To begin, apply the time filter for which you want to review. You can select Past 7 Days
(default), Past 30 Days, or Past 90 Days.
• Risk Summary —Your overall data risk score out of 100 across all your data profiles,
instances, applications, and control points. Additionally, a widget displays whether your data
risk score has improved or gotten worse over the specified time period.
• Risk Trend—Line graph to show you how your data security posture has improved or gotten
worse over the specified period of time.
• Recommendations—Actionable security recommendations you can take to strengthen your
security posture. Each recommendation allows you to:
• View App Details to understand which applications are impacted by the
recommendation.
• View Assets to understand which files and file types are impacted by the
recommendation.
filter each node independent of one another to display to review the risk breakdown that is
most important to you.
• Data Profiles—Enterprise DLP data profiles with traffic matches.
• Instances—Application instances for applications onboarded to SaaS Security.
• Applications—Applications onboarded to SaaS Security that has seen activity such as data
profile matches, uploaded assets, or downloaded assets.
• Control Points—The security enforcement points where data security incidents have
occurred.
STEP 5 | Click a specific data risk node to view detailed information for assets matching that group.
• Total Risk—Average Data Risk for all assets matching that specific group.
• Total Assets—Total number of unique and sensitive data assets inspected.
• Users—Total number of unique users who have either owned, uploaded, or downloaded
assets with sensitive data.
• Publicly Shared Assets—Data asset on a SaaS application that is publicly accessible by
anybody with the public link.
• External Assets—Data asset created using your corporate domain that is shared with a
specific user outside of your corporate domain.
• Uploaded Assets—Files uploaded to a SaaS application.
• Downloaded Assets—Files downloaded from a SaaS application.
• Data Profile Matches—Number of Enterprise DLP data profiles that were matched.
• Applications—Total number of applications with inspected traffic that generated a data
security risk.
• Top 10 Risky Assets—List of data assets sorted by Data Risk. The Asset Name, Owner, and
Risk Score are displayed. Additionally, you can expand the Actions and View Asset or View
Related Incident.
STEP 6 | View Related Incident to view more details about the specific DLP Incident.
Configure the overall risk score ranges for data risk. This helps you better visualize data risk across
different levels when you analyze Data Risk.
If you have already configured the overall risk score ranges to custom values, you can Reset to
Default to reapply the default risk score ranges.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Settings > Data Risk > Risk Score
Ranges.
Data Risk is calculated based on multiple risk factors across data, application, and users for an
asset. Configure the overall risk factor importance to customize the risk factor weight for each risk
factor when calculating the overall data risk for a data security asset. You can apply the following
Importance Levels for each risk factor.
• Extremely Important
• Very Important
• Important
• Somewhat Important
• Of Little Importance
• Not Important
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Settings > Data Risk > Risk Factor
Importance.
STEP 3 | Configure the overall Data Application, and User risk factor importance.
• Data
• Data Profile—Predefined and custom Enterprise Data Loss Prevention (E-DLP) data
profiles.
• Data Exposure—Exposure of a data asset exposure.
• Application
• Application Tag—Default SaaS Security Inline application tags categorize discovered
applications on SaaS Security to monitor users of SaaS apps more efficiently.
• Users
• Owner Risk—Risk factor weight for the owner of a data asset that is consumed based on
the User Risk information collected from Cloud Identity Engine (CIE)
• Collaborator Risk—Risk Factor weight based on the risk of all collaborators who have
access to a data asset
Configure the severity for each data profile. Setting higher severity increases the effect a match
of a particular Data Profile has on the data risk for a data asset. If an asset matches multiple data
profiles, it will be assigned the highest matching severity for the Data Profile risk factor. The data
profiles listed here included all Enterprise Data Loss Prevention (E-DLP) predefined and custom
data profiles. All custom data profiles are assigned a default severity. You can apply the following
severity levels:
• Critical
• High
• Medium
• Low
• Very Low
• None
If you have already configured the severity levels for different data profiles to custom values, you
can Reset to Default to reapply the default severities.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > Data Loss Prevention > Settings > Data Risk > Data
Profile Severity.
On May 7, 2025, Palo Alto Networks is introducing new Evidence Storage and Syslog
Forwarding service IP addresses to improve performance and expand availability for these
services globally.
You must allow these new service IP addresses on your network to avoid disruptions for
these services. Review the Enterprise DLP Release Notes for more information.
Data Risk provides configuration change recommendations to help improve your data security
posture. These contextual recommendations are based on the current data risk model and data
assets inspected by Enterprise DLP. These recommendations are sorted based on those that will
have the highest impact on your organization's Data Risk score. Additionally, recommendations
are at a group or platform level and may include multiple data assets, applications, or users.
For example, Enterprise DLP has detected that a sensitive data asset has been uploaded to an
Unsanctioned application and that this is a major contributor to reducing your overall Data Risk
Summary score. In this scenario, remediation steps may be to create or update a Security policy
rule to block access to the unsanctioned application. Conversely, if this application is incorrectly
tagged as Unsanctioned, the remediation may be to update the application tag.
STEP 1 | Log in to Strata Cloud Manager.
End User Coaching allows you to display notifications to your users in the Access Experience User
Interface (UI) when they generate an Enterprise Data Loss Prevention (E-DLP) or Endpoint DLP
incident.
To determine what is considered sensitive data, you add one or more Inline DLP Rules or
Endpoint DLP Rules. These rules contain the traffic match criteria that define what is considered
sensitive data. For the Inline DLP Rules, the rule name is derived from the Enterprise DLP data
profile of the same name. For the Endpoint DLP Rules, it's based on the name you configured
when you created the policy rule. Additionally, you can configure custom messages for when an
Enterprise DLP or Endpoint DLP incident is generated. After an incident is generated, the user
who generated the incident can view the Data Security notification for more information about
the sensitive data uploaded, downloaded, or posted.
Access Experience User Interface displays only one notification per DLP incident in a 30 second
period regardless of how many times the user generates the same incident. For example, a user
attempts to upload a file containing sensitive data to the Box Web app and Enterprise DLP blocks
the upload. The user then immediately tries to upload the same file 5 more times but is blocked
each time. In this case only one Access Experience alert is generated even though the user was
blocked from uploading a file containing sensitive date to the Box Web app 6 total times.
• Set Up End User Coaching (Enterprise DLP)
• Set Up End User Coaching (Endpoint DLP)
STEP 2 | Install the GlobalProtect app version 6.2.7 or later on Windows or macOS.
STEP 5 | (macOS only) In the Access Experience UI, select Settings > Notifications and enable Allow
notifications.
This setting must be enabled in the Access Experience UI for each user and is required to
display notifications when the user generates a DLP incident. Configure the rest of the Access
Experience notifications settings as needed.
STEP 7 | Select Manage > Configuration > NGFW and Prisma Access > Global Settings > User
Coaching Notification Template and create an End User Notification Template.
The end user notification template defines which DLP Rules generate a notification in the
Access Experience UI and the contents of the notification. You should only add DLP Rules
added to a Profile Group that is associated with a Security policy rule. This is required for
Enterprise DLP to generate a DLP incident that then generates a notification in the Access
Experience UI. A single DLP Rule can be added to multiple User Coaching Notification
Templates.
1. For the Product Name, select Inline Data Loss Prevention.
2. Check (enable) Enable Notification Template to enable the template after creation.
This setting is enabled by default.
3. Enter a Notification Template Name.
4. (Optional) Enter a Description
5. (Optional) Check (enable) High Confidence Detections Only.
High confidence matches reflect how confident Enterprise DLP is when detecting
matched traffic. For regular expression (regex) patterns, this is based on the character
distance to the configured proximity keywords. For machine learning (ML) patterns, the
ML models calculate the confidence level.
6. Add one or more Applied Rules to the notification template.
You must add at least one DLP rule to the notification template. The end user
notification template defines which DLP Rules generate a notification in the Access
Experience UI and the contents of the notification. Only add DLP rules added to a Profile
Group that is associated with a Security policy rule. This is required for Enterprise DLP to
generate a DLP incident that then generates a notification in the Access Experience UI.
You can add a single DLP rule to multiple User Coaching Notification Templates.
You can View Details for each DLP rule or Endpoint DLP policy rule you add to review
the specific inspection details. This includes the traffic inspection Direction, applicable
File Type, Action, and whether the DLP Rule is inspecting for File Based Match Criteria,
Non-File Based Match Criteria, or both.
7. Define the Notification Message users receive when Enterprise DLP blocks sensitive
data that match the data profiles associated with the DLP Rule.
The message templates are the Access Experience toast notifications users receive
when Enterprise DLP blocks sensitive data. You can use the following variables in your
message templates. You must include the brackets for each variable.
• [file name]—File name and extension containing sensitive data blocked by
Enterprise DLP.
• (File Based only) [direction]—Specifies whether Enterprise DLP blocked a file
upload or download.
• [app name]—Application user attempted to upload to, download from, or post non-
file based content.
• [action]—Action Enterprise DLP took when sensitive data was detected. This value
is always Blocked.
1. Define the Message Template for File based detections.
Skip this step if the DLP Rule isn't configured for file based detections.
2. Define the Message Template for Non-File based detections.
Skip this step if the DLP Rule isn't configured for non-file based detections.
3. Add a Support Link.
You can add links directly into the Access Experience toast notification that describe
your company policy for sharing or downloading sensitive data.
STEP 8 | Save.
STEP 9 | The user who generated the Enterprise DLP incident can view the Data Security notification
for more information about the sensitive data uploaded, downloaded, or posted.
A Data Security notification is displayed for 7 days. There is no limit to the number of
notifications displayed.
STEP 2 | Install the GlobalProtect app version 6.2.7 or later on Windows or macOS.
STEP 5 | (macOS only) In the Access Experience UI, select Settings > Notifications and enable Allow
notifications.
This setting must be enabled in the Access Experience UI for each user and is required to
display notifications when the user generates a DLP incident. Configure the rest of the Access
Experience notifications settings as needed.
STEP 7 | Select Manage > Configuration > NGFW and Prisma Access > Global Settings > User
Coaching Notification Template and create an End User Notification Template.
The end user notification template defines which DLP Rules generate a notification in the
Access Experience UI and the contents of the notification. You should only add DLP Rules
added to a Profile Group that is associated with a Security policy rule. This is required for
Enterprise DLP to generate a DLP incident which then generates a notification in the Access
Experience UI. A single DLP Rule can be added to multiple User Coaching Notification
Templates.
1. For the Product Name, select Endpoint Data Loss Prevention.
2. Check (enable) Enable Notification Template to enable the template after creation.
This setting is enabled by default.
3. Enter a Notification Template Name.
4. (Optional) Check (enable) High Confidence Detections Only.
High confidence matches reflect how confident Enterprise DLP is when detecting
matched traffic. For regular expression (regex) patterns, this is based on the character
distance to the configured proximity keywords. For machine learning (ML) patterns, this
confidence level is calculated by the ML models.
and peripheral device types, Action, the Incident Assignee, and the Notification email
recipient when an Endpoint DLP incident is generated.
6. Define the Notification Message users receive when Enterprise DLP blocks sensitive
data that match the data profiles associated with the DLP Rule.
The message templates are the Access Experience toast notifications users receive
when Enterprise DLP blocks sensitive data. You can use the following variables in your
message templates. You must include the brackets for each variable.
• [File Name]—File name and extension containing sensitive data blocked by
Enterprise DLP.
• [Transfer Method]—Application user attempted to upload to, download from, or
post non-file based content.
• [Peripheral Type]—Type of peripheral device associated with the Endpoint DLP
incident.
• [Peripheral Name]—Name of the peripheral device associated with the Endpoint
DLP incident.
• [Action]—Action Enterprise DLP took when sensitive data was detected. This value
is always Blocked.
• [Policy Name]—Name of the Endpoint DLP policy rule against which the Endpoint
DLP incident was generated.
1. Define the Message Template for File.
This is the message displayed when traffic matches a Data in Motion Endpoint DLP
policy rule.
2. Define the Message Template for Peripheral Control based detections.
This is the message displayed when traffic matches a Peripheral Control Endpoint
DLP policy rule.
3. Add a Support Link.
You can add links directly into the Access Experience toast notification that describe
your company policy for sharing or downloading sensitive data.
STEP 8 | Save.
STEP 9 | The user who generated the Endpoint DLP incident can view the Data Security notification
for more information about the sensitive data uploaded, downloaded, or posted.
A Data Security notification is displayed for 7 days. There is no limit to the number of
notifications displayed.
The Data Asset Explorer eliminates the fragmented approach to data security that leaves
organizations vulnerable. It provides comprehensive visibility into all sensitive files, messages,
and non-file based traffic, referred to as assets, detected by Enterprise Data Loss Prevention
(E-DLP) across your data security enforcement channels. The Data Asset Explorer allows your
data security admins to perform cross-channel asset discovery, centralize your data security risk
assessments, and provides enterprise-wide visibility into sensitive assets moving to and from apps
and peripherals, and across your network.
The core concept of Data Asset Explorer is to provide a single pane of glass for viewing and
managing sensitive data assets. It allows admins to:
• Discover and inventory sensitive assets across various platforms and channels
• Analyze data sensitivities, types, and distribution patterns
• Investigate asset metadata, activities, matched policy rules, and incidents
• Visualize data leak paths and potential vulnerabilities
By centralizing this information and functionality, Data Asset Explorer enables data security teams
to make informed decisions, optimize their Security policy rules, and enhance their overall data
protection strategies. It transforms fragmented data security management into a cohesive and
efficient process to strengthen your organization's security posture.
You can access the Data Asset Explorer on Strata Cloud Manager (Manage > Configuration >
Data Loss Prevention > Data Asset Explorer) only.
• Filters
The Data Asset Explorer allows you to apply filters to narrow down the scope of sensitive
assets the Data Asset Explorer displays. Apply these filters to more quickly identify the
sensitive assets you want to investigate. The Data Asset Explorer automatically applies any
filters to the Asset Aggregates widget and the Assets table.
• Time Filter—Specify the time frame to narrow down the list of sensitive assets. You can
select Past 1 Hour, Past 3 Hours, Past 24 Hours, Past 7 Days, Past 30 Days, or Past 90
Days.
• Region—Select the region where Enterprise DLP inspected sensitive assets. The default
Global displays all sensitive assets detected across all regions.
• GenAI Apps Only—Toggle this filter to display only the GenAI apps supported by Enterprise
DLP.
• Add Filter—Add additional filters to narrow down the scope of assets.
• Reset—Remove any of the additional filters added. This does not remove the time, region, or
GenAI apps only filters.
• Asset Aggregates
• Asset Aggregates Widget
The Asset Aggregates widget provides an interactive visualization to view aggregated asset
information detected by Enterprise DLP. Click on the asset characteristics to automatically
apply filters to and narrow down the number of assets displayed. Click on the same
characteristic again to remove the filter.
The characters described below display only if Enterprise DLP has matching data. For
example, you apply the Past 7 Days filter and Asset Type displays Data at Rest and
Data in Motion but only displays Data in Motion when you apply the Past 24 Hours.
This is because Enterprise DLP inspected traffic for both data at rest and in motion at some
point in the last seven days, but only sensitive data in motion detected by Enterprise DLP in
the past 24 hours.
• Applications—App classification for inspected traffic.
Can be Sanctioned, Tolerated, or Unsanctioned.
• Data Type—Data asset file type, message, or non-file traffic inspected by Enterprise DLP.
The Data Asset Explorer lists the four data asset types with the largest number of assets
and displays Others to combine all other data asset types.
• Asset Type—Type asset traffic inspected. Can be Data at Rest or Data in Motion.
• Policy Action—Action configured in the DLP rule (Strata Cloud Manager), data profile
(Panorama) or data asset policy rule (Data Security).
Can be Blocked, Alerted, Quarantined, or Deleted.
• Data Profiles—Data profiles containing the match criteria the asset inspected by
Enterprise DLP matched against. The Data Asset Explorer lists the four data profiles
with the largest number of traffic matches and displays Others to combine all other data
profiles.
• Channels—Data security channel where Enterprise DLP inspection and verdict rendering
occurred.
Can be NGFW, Prisma Access, Email DLP, Endpoint DLP, SaaS API, or PA
Browser.
• Users—Top users who uploaded, downloaded, sent messages, or generated non-file
based data assets forwarded to Enterprise DLP for inspection.
• Assets by Risk—Distribution of the assets across different Risk Scores as defined in the DLP
rule (Strata Cloud Manager) or data profile (Panorama).
• Top Users—Top 3 users who uploaded data assets containing sensitive data based on the
currently applied filters and the total number of data assets.
• Top Applications—Top 3 apps where users uploaded, downloaded, sent messages, or
generated non-file based data assets containing sensitive data and the total number of data
assets.
This Assets by Risk, Top Users, and Top Applications data are a summary of the total
assets based on the currently selected time filter. Click the asset value to automatically
apply the corresponding filters to the Asset Aggregates widget.
• Asset List
List of all data assets inspected by Enterprise DLP. This list dynamically updates based on the
currently applied filters.
• Last Modified—Date and time Enterprise DLP inspected the asset, message, or non-file
based traffic.
• Name—Name of the asset inspected by Enterprise DLP. Click the asset Name to view the
asset details.
• Channel—Data security channel that forwarded the asset to Enterprise DLP for inspection.
Can be NGFW, Prisma Access, Email DLP, Endpoint DLP, SaaS API, or PA
Browser.
• Data Risk Score—A Data risk score assigned to the asset to measure the overall risk the
asset poses to your organization.
• Policy Action—Action configured in the DLP rule (Strata Cloud Manager), data profile
(Panorama) or data asset policy rule (Data Security)
• (Data Security only) Exposure—Exposure level describing the accessibility of the asset.
• Data Profiles—One or more Data profiles containing the match criteria the asset inspected
by Enterprise DLP matched against.
• Application Name—App-ID of the destination or source app.
• User—User who uploaded or downloaded the asset to the destination or source app. If you
enabled Cloud Identity Engine (CIE), the user identification displays here.
• File Format—File format of the asset inspected by Enterprise DLP.
• (Email File Format only) Actions—Expand the Actions menu to open the email inspected by
Enterprise DLP.
• Asset Details
The Asset Details provides detailed information about the asset inspected by Enterprise DLP.
• General Info—General information of the asset that includes information such as the asset
name, type, and the data security channel where Enterprise DLP detected the asset.
• Data—Information about the asset. This can include the data risk score, the size of the asset,
the data profiles containing the match criteria the asset matched against, and the data type
of the asset.
• User—Information about the users who own the asset or have uploaded or download the
asset, sent a message, or generated non-file-based traffic.
• (SaaS API Channel only) Exposure—Data Security exposure level information.
• Application—Information about the specific source or destination app including the App-ID
and classification.
• Matches Within Data Profile—Displays snippets of the asset that matched the data pattern
match criteria within the data profile.
• Incidents—List of DLP incidents generated by the asset.
• Policies—Policy rules that match the selected asset.
• User Activities—Information about the users who uploaded, downloaded, sent messages, or
generated non-file based data assets.
In some instances, Enterprise Data Loss Prevention (E-DLP) might incorrectly detect and take
action on the file or network traffic that it should not have. This is called a false positive
detection and they can cause productivity impacts to individual employees and Enterprise DLP
administrators alike. False positive detections are commonly caused by traffic match criteria in
predefined regular expression (regex). Report false positive detections to Palo Alto Networks
to improve Enterprise DLP detection accuracy for yourself and other Enterprise DLP users. You
report a false positive detection against the DLP Incident where the false positive detection
occurred.
The DLP Incident must meet the following conditions to report a false positive detection:
• Traffic matched against a predefined regular expression (regex) data patterns
• The traffic is match is high confidence
• There is a snippet available of the false positive detection to share with Palo Alto Networks
For predefined data patterns marked with Augmented with ML, Enterprise DLP uses AI and
advanced machine learning (ML) techniques to improve its detection engine when you report a
false positive detection. This enables Enterprise DLP to continuously learn from your feedback to
reduce false positive detections and increase detection accuracy for yourself and other Enterprise
DLP users. For Enterprise DLP to use AI and ML to learn from your false positive detections and
improve its detection engine:
• Files in inspected traffic must be 19 MB and smaller
• The number of traffic matches per data pattern in the data profile is 100 matches or less
All selected DLP incident snippets are shared with Palo Alto Networks when you submit
a false positive report. The selected snippets are stored and accessible by Palo Alto
Networks for up to 90 days to enable Palo Alto Networks to investigate and improve
Enterprise DLP detection accuracy.
Enterprise DLP does not support reporting false positive detections for incidents
generated from Email DLP or SaaS Security.
STEP 2 | Reviewed your data patterns, profiles, and Security policy rules to reduce false positive
detections.
STEP 3 | Select Manage > Configuration > Data Loss Prevention > DLP Incidents.
STEP 4 | In the Incidents, click the File name of the false positive DLP incident you want to report to
Palo Alto Networks.
STEP 5 | In the Matches within Data Profile window, click Report False Positive.
STEP 6 | In the Falsely Detection Information, select one or more data patterns.
Enterprise DLP displays the list of available data patterns based on the data profile that
generated a false positive detection. Enterprise DLP only displays data patterns associated
with the data profile.
STEP 8 | (Optional) Add a Comment to provide additional details to Palo Alto Networks.
This helps Palo Alto Networks understand how to improve the predefined data pattern match
criteria or how to train the ML models to improve detection accuracy.
Click Next.
STEP 9 | A notification displays to confirm submission of the false positive report and that the snippet
will be shared with Palo Alto Networks for investigative purposes.
Click Submit to report the false positive detection.