|
| 1 | +--- |
| 2 | +title: Outbound Data Loss Prevention (DLP) |
| 3 | +pcx_content_type: how-to |
| 4 | +sidebar: |
| 5 | + order: 6 |
| 6 | +--- |
| 7 | + |
| 8 | +:::note[Compatibility] |
| 9 | +Outbound DLP is only compatible with Microsoft 365. |
| 10 | +::: |
| 11 | + |
| 12 | +Outbound Data Loss Prevention ensures the protection of sensitive information in outbound emails with [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/). Outbound Data Loss Prevention integrates with your inbox, and it proactively monitors your email to prevent unauthorized data leaks. |
| 13 | + |
| 14 | +## Get started |
| 15 | + |
| 16 | +To begin using outbound DLP, install the Cloudflare add-in in Microsoft 365: |
| 17 | + |
| 18 | +1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**. |
| 19 | +2. In **Protect sensitive data in outbound emails**, select **Get started**. |
| 20 | +3. Select **Download add-in** to download the Cloudflare add-in. |
| 21 | +4. Configure Microsoft 365 to use the Cloudflare add-in: |
| 22 | + 1. In the [Microsoft 365 Apps admin center](https://config.office.com/), go to **Microsoft 365 Admin Center** > **Settings** > **Integrated Apps**. |
| 23 | + 2. Select **Upload custom apps**. For the application type, choose _Office Add-in_. |
| 24 | + 3. Select **Upload manifest file (.xml) from device**. |
| 25 | + 4. Upload the Cloudflare add-in file. |
| 26 | + 5. Verify and complete the wizard. |
| 27 | +5. Confirm the Cloudflare add-in was configured in Microsoft 365. |
| 28 | + |
| 29 | +After configuring the Cloudflare add-in in Microsoft 365, you can select **Add a policy** to create an [outbound DLP policy](#create-an-outbound-policy). |
| 30 | + |
| 31 | +:::note |
| 32 | +The Cloudflare add-in can take up to 24 hours to propagate after install. |
| 33 | +::: |
| 34 | + |
| 35 | +## Create an outbound policy |
| 36 | + |
| 37 | +An outbound policy allows you to control outbound email flow. |
| 38 | + |
| 39 | +To create an outbound DLP policy: |
| 40 | + |
| 41 | +1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**. |
| 42 | +2. Select **Add a policy**. |
| 43 | +3. Name your policy. |
| 44 | +4. Build an expression to match specific email traffic. For example, you can create a policy that blocks outbound emails containing identifying numbers: |
| 45 | + |
| 46 | + | Selector | Operator | Value | Logic | Action | |
| 47 | + | ------------------- | -------- | --------------------------------------------------------- | ----- | ------ | |
| 48 | + | Recipient email | not in | `example.com` | And | Block | |
| 49 | + | Matched DLP profile | in | _Social Security, Insurance, Tax, and Identifier Numbers_ | | | |
| 50 | + |
| 51 | +5. (Optional) Choose whether to use the default block message or a custom message. |
| 52 | +6. Select **Create policy**. |
| 53 | + |
| 54 | +After creating your policy, you can modify or reorder your policies in **Email Security** > **Outbound DLP**. |
| 55 | + |
| 56 | +### Selectors |
| 57 | + |
| 58 | +| Selector | Description | |
| 59 | +| ------------------- | -------------------------------------------------------------------------------------------------------------------------- | |
| 60 | +| Recipient email | The intended recipient of an outbound email. | |
| 61 | +| Email sender | The user in your organization sending an email. | |
| 62 | +| Matched DLP profile | The [DLP profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/) that content of an email matches upon scan. | |
0 commit comments