You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx
+9-30Lines changed: 9 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,33 +7,17 @@ sidebar:
7
7
8
8
9
9
:::note[Compatibility]
10
-
Outbound DLP is only compatible with Microsoft 365.
10
+
Outbound DLP is only compatible with Microsoft 365. You need to have Microsoft E3 or E5 license to enable Outbound DLP.
11
11
:::
12
12
13
13
Outbound Data Loss Prevention ensures the protection of sensitive information in outbound emails with [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/). Outbound Data Loss Prevention integrates with your inbox, and it proactively monitors your email to prevent unauthorized data leaks.
14
14
15
-
## Get started
15
+
To enable Outbound DLP:
16
16
17
-
To begin using outbound DLP, install the Cloudflare add-in in Microsoft 365:
17
+
1.[Create an outbound policy](/cloudflare-one/email-security/outbound-dlp/#1-create-an-outbound-policy).
18
+
2.[Set up DLP Assist add-in](/cloudflare-one/email-security/outbound-dlp/#2-dlp-assist-add-in).
18
19
19
-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**.
20
-
2. In **Protect sensitive data in outbound emails**, select **Get started**.
21
-
3. Select **Download add-in** to download the Cloudflare add-in.
22
-
4. Configure Microsoft 365 to use the Cloudflare add-in:
23
-
1. In the [Microsoft 365 Apps admin center](https://config.office.com/), go to **Microsoft 365 Admin Center** > **Settings** > **Integrated Apps**.
24
-
2. Select **Upload custom apps**. For the application type, choose _Office Add-in_.
25
-
3. Select **Upload manifest file (.xml) from device**.
26
-
4. Upload the Cloudflare add-in file.
27
-
5. Verify and complete the wizard.
28
-
5. Confirm the Cloudflare add-in was configured in Microsoft 365.
29
-
30
-
After configuring the Cloudflare add-in in Microsoft 365, you can select **Add a policy** to create an [outbound DLP policy](#create-an-outbound-policy).
31
-
32
-
:::note
33
-
The Cloudflare add-in can take up to 24 hours to propagate after install.
34
-
:::
35
-
36
-
## Create an outbound policy
20
+
## 1. Create an outbound policy
37
21
38
22
An outbound policy allows you to control outbound email flow.
39
23
@@ -62,7 +46,7 @@ After creating your policy, you can modify or reorder your policies in **Email S
62
46
| Email sender | The user in your organization sending an email. |
63
47
| Matched DLP profile | The [DLP profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/) that content of an email matches upon scan. |
64
48
65
-
## DLP Assist add-in
49
+
## 2. DLP Assist add-in
66
50
67
51
The Data Loss Prevention (DLP) Assist add-in allows Microsoft O365 users to deploy a DLP solution for free using Cloudflare's Email Security.
68
52
@@ -98,11 +82,6 @@ To block, encrypt, or send approval, you can configure rules within Microsoft Pu
98
82
9. Select **Save**.
99
83
10. Select **Turn the Policy On Immediately**.
100
84
101
-
## Set up DLP profiles
102
-
103
-
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**.
104
-
2. Select **Add a policy**:
105
-
-**Name your policy**.
106
-
-**Build an expression**.
107
-
-**(Optional) Configure message type**: Create a custom message to be be displayed when a violation occurs.
108
-
3. Select **Save**.
85
+
:::note
86
+
The Cloudflare add-in can take up to 24 hours to propagate after install.
0 commit comments