browse
Introduction
When configuring a real-time Data Loss Prevention (DLP) rule to block all form data, there is a risk of both true positives and false positives leading to unintended consequences for cloud applications. These consequences can impact the successful operation of cloud applications, including the possibility of users being unable to use the login page. This article aims to highlight these risks and provide troubleshooting steps to address any issues that may arise.
Troubleshooting
In the event of any issues arising from blocking all form data in real-time DLP rules, the following steps can help troubleshoot and resolve the problem:
-
Refine Data Identifiers - This step helps strike a balance between effectively blocking sensitive data and allowing legitimate form data to pass through without disruption.
-
Review the blocked DLP events details via the Data Loss Prevention report (Reporting -> Additional Reports -> Data Loss Prevention) to identify the specific data identifiers triggering the DLP rule.
-
Consider refining the data identifiers by adjusting the tolerance levels or adding proximity terms to reduce false positives while still maintaining their ability to match as needed.
-
-
Exclude Blocked URLs - By excluding URLs, you can ensure that login pages and other essential components of your applications are not affected by the blocking DLP rule.
-
Analyze the activity log via Activity Search (Reporting -> Core Reports -> Activity Search) and the DLP event details to identify the URLs that are getting blocked.
-
Add these URLs to a destination list configured under "Select Destination Lists and Applications for Exclusion."
-
-
Modify DLP Rule Behavior - If the issues persist and the unintended consequences outweigh the benefits of blocking all form data, you may need to modify the behavior of the DLP to stop form data scanning. Changing behavior is possible by simply selecting "File uploads and form data of vetted applications only."
Conclusion
When configuring a Real Time DLP rule to block all form data, it is crucial to be aware of the risks associated with unintended consequences. These risks can impact the smooth operation of cloud applications, including the ability to use the login page. By following the troubleshooting steps outlined in this guide, you can mitigate these risks and ensure the successful functioning of your cloud applications while maintaining data protection.