Skip to content

Commit ea4478f

Browse files
[Email Security] DLP Assist Add-in docs
1 parent 0aa23ba commit ea4478f

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed

src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,3 +63,48 @@ After creating your policy, you can modify or reorder your policies in **Email S
6363
| Recipient email | The intended recipient of an outbound email. |
6464
| Email sender | The user in your organization sending an email. |
6565
| Matched DLP profile | The [DLP profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/) that content of an email matches upon scan. |
66+
67+
## DLP Assist Add-in
68+
69+
The Data Loss Prevention (DLP) Assist add-in allows Microsoft O365 users to deploy a DLP solution for free using Cloudflare's Email Security.
70+
71+
To set up DLP Assist add-in:
72+
73+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**.
74+
2. Select **View Microsoft add-in instructions** > Select **Download add-in**. This downloads a `.xml` file necessary to install the add-in on the client side.
75+
3. Set up the add-in in Microsoft 365:
76+
- Log in to the [Microsoft admin panel](https://security.microsoft.com/homepage) and go to **Microsoft 365 Admin Center** > **Settings** > **Integrated Apps**.
77+
- Choose **Upload custom apps** and select **Office Add-in** for the application type.
78+
- Select **Upload manifest file (.xml) from device**.
79+
- Upload the Cloudflare add-in file you downloaded in step three. Then, verify and complete the wizard. It can take up to 24 hours for an add-in to propagate.
80+
81+
The add-in works by inserting headers into the [EML](https://en.wikipedia.org/wiki/EML) on the client side before the message is sent out.
82+
83+
To block, encrypt, or send approval, you can configure rules within Microsoft Purview DLP:
84+
85+
1. Go to [Microsoft Purview](https://purview.microsoft.com/datalossprevention/overview?tid=11648e1c-3d60-40e2-bf07-f8d481e48e2d).
86+
2. Select **Policies** > **Create policy**.
87+
3. Do not choose any templates or custom policy. Select **Next**.
88+
4. Choose a name and description for the policy: You can choose any name. However, this guide will use `Cloudflare Assist Block`.
89+
5. Select **Next** on **Admin Units**:
90+
- Choose to only apply to **Exchange Email**.
91+
- **Choose Create or customize advanced DLP Rules**.
92+
6. Select **Create rule**:
93+
- Create a policy name.
94+
- Add the following conditions:
95+
- **Header contains words or phrases**: `Key: cf_outbound_dlp with Value: BLOCK`
96+
- Select **AND**.
97+
- **Content is shared from Microsoft 365**: Select **with people from outside my organization**.
98+
7. Under **Actions**, the admin can choose what to do with the message. You can use the **Restrict access or encrypt the content in Microsoft 365 locations** to block the message or encrypt it.
99+
8. Under **User notifications**, turn on notifications. Admins can also edit the message if they want to. You can also configure if the admin wants to receive a notification under **Incident reports** > **Use this severity level in admin alerts and reports**.
100+
9. Select **Save**.
101+
10. Select **Turn the Policy On Immediately**.
102+
103+
## Set up DLP profiles
104+
105+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**.
106+
2. Select **Add a policy**:
107+
- **Name your policy**.
108+
- **Build an expression**.
109+
- **(Optional) Configure message type**: Create a custom message that can be displayed when a violation occurs.
110+
3. Select **Save**.

0 commit comments

Comments
 (0)