Cloud App Security Administration Guide for Office 365
- Cloud App Security
- Understanding Cloud App Security
- Configuring Cloud App Security
- Managing Quarantine for Office 365 and Microsoft 365
- Setting Up a Quarantine Mailbox for Office 365 and Microsoft 365 Email (Exchange Online)
- Setting Up a Quarantine Folder for Office 365 and Microsoft 365 OneDrive
- Setting Up a Quarantine Folder for Office 365 and Microsoft 365 SharePoint
- Using the Quarantine View for Office 365 and Microsoft 365 Email (Exchange Online)
- Using the Quarantine Page
- Using the Quarantined File Creator Dashboard
- Using the User Dashboard for Office 365 and Microsoft 365
- Managing Restore Requests
- Using the SonicWall Cloud App Security Dashboard
- Managing Security Events
- Managing Policies
- Understanding Cloud App Security Policies
- Creating New Policy Rules
- Stopping Policy Rules
- Removing Policy Rules
- Managing Office 365 and Microsoft 365 (Exchange Online) Mail-Flow Rules
- Managing Spam and Anti-Phishing
- Managing Spam
- Managing User-Reported Phishing
- Customizing Warning Messages
- Managing Nickname Impersonation
- Managing the Anti-Phishing Exceptions
- Using the Mail Explorer
- Working with Office 365 and Microsoft 365 Email Encryption
- Configuring and Using Click-Time Protection
- Using Cloud App Security Analytics
- Configuring Cloud Applications in the Cloud App Store
- Managing Security Applications in the Security App Store
- Managing Anomaly Exceptions
- Managing Security Tool Exceptions
- Using the System Log
- Managing Cloud App Security Licenses
- SonicWall Support
Configuring Data Leak Protection Detection Rules
To configure Data Leak Protection
- Navigate to Configuration > Security App Store.
- In the Data Leakage Prevention section, locate the SmartDLP tile.
- If the SmartDLP security application is not currently running (as indicated by two vertical white bars in the green circle on the top left of the tile), activate the SmartDLP security application.
- Click Configure. The Configure SmartDLP dialog displays.
-
From the Detected Text Storage Mode list, select what scanned data will be saved and how:
- Store detected text strings: Detected data is saved and can be displayed on the security events for the forensic process.
- Obfuscate detected text prior to storage: Detected data is saved and displayed in obfuscated format on the security events. The original data is discarded and cannot be accessed.
- Do not store detected text: No detected data is saved or displayed on the security events.
-
From the Minimal Likelihood list, select one of the options:
- Very Unlikely: It is very unlikely that the data matches the given information type.
- Unlikely: It is unlikely that the data matches the given information type.
- Possible: It is possible that the data matches the given information type.
- Likely: It is likely that the data matches the given information type. It may also depend on the context of the information.
- Very Likely: It is very likely that the data matches the given information type. It may also depend on the context of the information.
The Minimal Likelihood is determined by the number of matching elements a result contains. SmartDLP uses a bucketized representation of likelihood intended to indicate how likely it is that the data matches the specified DLP detection rules.
- In the Detection Types section, select which predefined DLP rules are you want included for each of the DLP detection categories:
- PII
- PHI
- Financial
- Encrypted Content
- Access Control
- Intellectual Property
- PCI
- Resume
- SOX
- HIPAA
- Click Ok to save your SmartDLP configuration settings.
Was This Article Helpful?
Help us to improve our support portal