You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx
+45Lines changed: 45 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,3 +63,48 @@ After creating your policy, you can modify or reorder your policies in **Email S
63
63
| Recipient email | The intended recipient of an outbound email. |
64
64
| Email sender | The user in your organization sending an email. |
65
65
| Matched DLP profile | The [DLP profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/) that content of an email matches upon scan. |
66
+
67
+
## DLP Assist Add-in
68
+
69
+
The Data Loss Prevention (DLP) Assist add-in allows Microsoft O365 users to deploy a DLP solution for free using Cloudflare's Email Security.
70
+
71
+
To set up DLP Assist add-in:
72
+
73
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**.
74
+
2. Select **View Microsoft add-in instructions** > Select **Download add-in**. This downloads a `.xml` file necessary to install the add-in on the client side.
75
+
3. Set up the add-in in Microsoft 365:
76
+
- Log in to the [Microsoft admin panel](https://security.microsoft.com/homepage) and go to **Microsoft 365 Admin Center** > **Settings** > **Integrated Apps**.
77
+
- Choose **Upload custom apps** and select **Office Add-in** for the application type.
78
+
- Select **Upload manifest file (.xml) from device**.
79
+
- Upload the Cloudflare add-in file you downloaded in step three. Then, verify and complete the wizard. It can take up to 24 hours for an add-in to propagate.
80
+
81
+
The add-in works by inserting headers into the [EML](https://en.wikipedia.org/wiki/EML) on the client side before the message is sent out.
82
+
83
+
To block, encrypt, or send approval, you can configure rules within Microsoft Purview DLP:
84
+
85
+
1. Go to [Microsoft Purview](https://purview.microsoft.com/datalossprevention/overview?tid=11648e1c-3d60-40e2-bf07-f8d481e48e2d).
86
+
2. Select **Policies** > **Create policy**.
87
+
3. Do not choose any templates or custom policy. Select **Next**.
88
+
4. Choose a name and description for the policy: You can choose any name. However, this guide will use `Cloudflare Assist Block`.
89
+
5. Select **Next** on **Admin Units**:
90
+
- Choose to only apply to **Exchange Email**.
91
+
-**Choose Create or customize advanced DLP Rules**.
92
+
6. Select **Create rule**:
93
+
- Create a policy name.
94
+
- Add the following conditions:
95
+
-**Header contains words or phrases**: `Key: cf_outbound_dlp with Value: BLOCK`
96
+
- Select **AND**.
97
+
-**Content is shared from Microsoft 365**: Select **with people from outside my organization**.
98
+
7. Under **Actions**, the admin can choose what to do with the message. You can use the **Restrict access or encrypt the content in Microsoft 365 locations** to block the message or encrypt it.
99
+
8. Under **User notifications**, turn on notifications. Admins can also edit the message if they want to. You can also configure if the admin wants to receive a notification under **Incident reports** > **Use this severity level in admin alerts and reports**.
100
+
9. Select **Save**.
101
+
10. Select **Turn the Policy On Immediately**.
102
+
103
+
## Set up DLP profiles
104
+
105
+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**.
106
+
2. Select **Add a policy**:
107
+
-**Name your policy**.
108
+
-**Build an expression**.
109
+
-**(Optional) Configure message type**: Create a custom message that can be displayed when a violation occurs.
0 commit comments