Skip to content

Commit 778bbf6

Browse files
maxvppatriciasantaana
authored andcommitted
[CES/DLP] Email DLP (#16940)
1 parent 0777408 commit 778bbf6

File tree

7 files changed

+69
-7
lines changed

7 files changed

+69
-7
lines changed

src/content/docs/cloudflare-one/email-security/detection-settings/allow-policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ To configure allow policies:
1212
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
1313
2. Select **Email Security**.
1414
3. Select **Settings**, then go to **Detection settings** > **Allow policies**.
15-
4. On the **Detection settings** page, select **+ Add a policy**.
15+
4. On the **Detection settings** page, select **Add a policy**.
1616
5. On the **Add an allow policy** page, enter the policy information:
1717
- **Input method**: Choose between **Manual input**, and **Uploading an allow policy**:
1818
- **Manual input**:

src/content/docs/cloudflare-one/email-security/detection-settings/blocked-senders.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ To configure blocked senders:
1212
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
1313
2. Select **Email Security**.
1414
3. Select **Settings**, go to **Detection settings** > **Blocked senders**.
15-
4. On the **Detection settings** page, select **+ Add a sender**.
15+
4. On the **Detection settings** page, select **Add a sender**.
1616
5. Select the **Input method**: Choose between **Manual input**, and **Upload blocked sender list**:
1717
- **Manual input**:
1818
- **Sender type**:

src/content/docs/cloudflare-one/email-security/detection-settings/impersonation-registry.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ To add a user to the impersonation registry:
1818
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
1919
2. Select **Email Security**.
2020
3. Select **Settings** > **Impersonation registry**.
21-
4. Select **+ Add a user**.
21+
4. Select **Add a user**.
2222
5. Select **Input method**: Choose between **Manual input**, **Upload manual list**, and **Select from existing directories**:
2323
- **Manual input**: Enter the following information:
2424
- **User info**: enter a valid **Display name**.

src/content/docs/cloudflare-one/email-security/detection-settings/trusted-domains.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ To configure a trusted domain:
1212
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
1313
2. Select **Email Security**.
1414
3. Select **Settings**, go to **Detection settings** > **Trusted domains**.
15-
4. On the **Detection settings** page, select **+ Add a domain**.
15+
4. On the **Detection settings** page, select **Add a domain**.
1616
5. Select the **Input method**: Choose between **Manual input**, and **Upload trusted domain list**:
1717
- **Manual input**:
1818
- **Domain info**: Enter a valid domain name.

src/content/docs/cloudflare-one/email-security/directories/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ To add a directory:
1212
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
1313
2. Select **Email security**.
1414
3. Select **Directories**.
15-
4. Select **+ Add a directory** > **Manage integrations**.
16-
5. On the SaaS integrations page, select **+ Add integration**.
15+
4. Select **Add a directory** > **Manage integrations**.
16+
5. On the SaaS integrations page, select **Add integration**.
1717

1818
To sync a directory, select the three dots, then select **Sync now**.
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: Outbound Data Loss Prevention (DLP)
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 6
6+
---
7+
8+
:::note[Compatibility]
9+
Outbound DLP is only compatible with Microsoft 365.
10+
:::
11+
12+
Outbound Data Loss Prevention ensures the protection of sensitive information in outbound emails with [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/). Outbound Data Loss Prevention integrates with your inbox, and it proactively monitors your email to prevent unauthorized data leaks.
13+
14+
## Get started
15+
16+
To begin using outbound DLP, install the Cloudflare add-in in Microsoft 365:
17+
18+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**.
19+
2. In **Protect sensitive data in outbound emails**, select **Get started**.
20+
3. Select **Download add-in** to download the Cloudflare add-in.
21+
4. Configure Microsoft 365 to use the Cloudflare add-in:
22+
1. In the [Microsoft 365 Apps admin center](https://config.office.com/), go to **Microsoft 365 Admin Center** > **Settings** > **Integrated Apps**.
23+
2. Select **Upload custom apps**. For the application type, choose _Office Add-in_.
24+
3. Select **Upload manifest file (.xml) from device**.
25+
4. Upload the Cloudflare add-in file.
26+
5. Verify and complete the wizard.
27+
5. Confirm the Cloudflare add-in was configured in Microsoft 365.
28+
29+
After configuring the Cloudflare add-in in Microsoft 365, you can select **Add a policy** to create an [outbound DLP policy](#create-an-outbound-policy).
30+
31+
:::note
32+
The Cloudflare add-in can take up to 24 hours to propagate after install.
33+
:::
34+
35+
## Create an outbound policy
36+
37+
An outbound policy allows you to control outbound email flow.
38+
39+
To create an outbound DLP policy:
40+
41+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**.
42+
2. Select **Add a policy**.
43+
3. Name your policy.
44+
4. Build an expression to match specific email traffic. For example, you can create a policy that blocks outbound emails containing identifying numbers:
45+
46+
| Selector | Operator | Value | Logic | Action |
47+
| ------------------- | -------- | --------------------------------------------------------- | ----- | ------ |
48+
| Recipient email | not in | `example.com` | And | Block |
49+
| Matched DLP profile | in | _Social Security, Insurance, Tax, and Identifier Numbers_ | | |
50+
51+
5. (Optional) Choose whether to use the default block message or a custom message.
52+
6. Select **Create policy**.
53+
54+
After creating your policy, you can modify or reorder your policies in **Email Security** > **Outbound DLP**.
55+
56+
### Selectors
57+
58+
| Selector | Description |
59+
| ------------------- | -------------------------------------------------------------------------------------------------------------------------- |
60+
| Recipient email | The intended recipient of an outbound email. |
61+
| Email sender | The user in your organization sending an email. |
62+
| Matched DLP profile | The [DLP profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/) that content of an email matches upon scan. |

src/content/docs/cloudflare-one/email-security/setup/api-deployment/office365-api.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ To connect new domains:
5555
2. Select **Zero Trust**.
5656
3. Select **Email security**.
5757
4. Select **Settings**.
58-
5. On the **Integrated domains** page, select **+ Connect a domain**.
58+
5. On the **Integrated domains** page, select **Connect a domain**.
5959
6. Select the domains you want Email Security to scan.
6060
7. Select **Save**.
6161

0 commit comments

Comments
 (0)