From f91d547ec158b2ee181509f81ab49bdb18fefb70 Mon Sep 17 00:00:00 2001 From: Max Phillips Date: Wed, 18 Sep 2024 16:22:54 -0500 Subject: [PATCH] Initial commit --- .../detection-settings/allow-policies.mdx | 2 +- .../detection-settings/blocked-senders.mdx | 2 +- .../impersonation-registry.mdx | 2 +- .../detection-settings/trusted-domains.mdx | 2 +- .../email-security/directories/index.mdx | 4 +-- .../email-security/outbound-dlp.mdx | 27 +++++++++++++++++++ .../setup/api-deployment/office365-api.mdx | 2 +- 7 files changed, 34 insertions(+), 7 deletions(-) create mode 100644 src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx diff --git a/src/content/docs/cloudflare-one/email-security/detection-settings/allow-policies.mdx b/src/content/docs/cloudflare-one/email-security/detection-settings/allow-policies.mdx index 45cc692c179597..903d3701720294 100644 --- a/src/content/docs/cloudflare-one/email-security/detection-settings/allow-policies.mdx +++ b/src/content/docs/cloudflare-one/email-security/detection-settings/allow-policies.mdx @@ -12,7 +12,7 @@ To configure allow policies: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). 2. Select **Email Security**. 3. Select **Settings**, then go to **Detection settings** > **Allow policies**. -4. On the **Detection settings** page, select **+ Add a policy**. +4. On the **Detection settings** page, select **Add a policy**. 5. On the **Add an allow policy** page, enter the policy information: - **Input method**: Choose between **Manual input**, and **Uploading an allow policy**: - **Manual input**: diff --git a/src/content/docs/cloudflare-one/email-security/detection-settings/blocked-senders.mdx b/src/content/docs/cloudflare-one/email-security/detection-settings/blocked-senders.mdx index 5be18a631d08df..eefb0d7bc43897 100644 --- a/src/content/docs/cloudflare-one/email-security/detection-settings/blocked-senders.mdx +++ b/src/content/docs/cloudflare-one/email-security/detection-settings/blocked-senders.mdx @@ -12,7 +12,7 @@ To configure blocked senders: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). 2. Select **Email Security**. 3. Select **Settings**, go to **Detection settings** > **Blocked senders**. -4. On the **Detection settings** page, select **+ Add a sender**. +4. On the **Detection settings** page, select **Add a sender**. 5. Select the **Input method**: Choose between **Manual input**, and **Upload blocked sender list**: - **Manual input**: - **Sender type**: diff --git a/src/content/docs/cloudflare-one/email-security/detection-settings/impersonation-registry.mdx b/src/content/docs/cloudflare-one/email-security/detection-settings/impersonation-registry.mdx index 620c2565bc154d..c1da351c77edec 100644 --- a/src/content/docs/cloudflare-one/email-security/detection-settings/impersonation-registry.mdx +++ b/src/content/docs/cloudflare-one/email-security/detection-settings/impersonation-registry.mdx @@ -18,7 +18,7 @@ To add a user to the impersonation registry: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). 2. Select **Email Security**. 3. Select **Settings** > **Impersonation registry**. -4. Select **+ Add a user**. +4. Select **Add a user**. 5. Select **Input method**: Choose between **Manual input**, **Upload manual list**, and **Select from existing directories**: - **Manual input**: Enter the following information: - **User info**: enter a valid **Display name**. diff --git a/src/content/docs/cloudflare-one/email-security/detection-settings/trusted-domains.mdx b/src/content/docs/cloudflare-one/email-security/detection-settings/trusted-domains.mdx index 1aa48aacfd6945..6a830725cefe63 100644 --- a/src/content/docs/cloudflare-one/email-security/detection-settings/trusted-domains.mdx +++ b/src/content/docs/cloudflare-one/email-security/detection-settings/trusted-domains.mdx @@ -12,7 +12,7 @@ To configure a trusted domain: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). 2. Select **Email Security**. 3. Select **Settings**, go to **Detection settings** > **Trusted domains**. -4. On the **Detection settings** page, select **+ Add a domain**. +4. On the **Detection settings** page, select **Add a domain**. 5. Select the **Input method**: Choose between **Manual input**, and **Upload trusted domain list**: - **Manual input**: - **Domain info**: Enter a valid domain name. diff --git a/src/content/docs/cloudflare-one/email-security/directories/index.mdx b/src/content/docs/cloudflare-one/email-security/directories/index.mdx index 15a8c708bf23c6..7415fb362d19e1 100644 --- a/src/content/docs/cloudflare-one/email-security/directories/index.mdx +++ b/src/content/docs/cloudflare-one/email-security/directories/index.mdx @@ -12,7 +12,7 @@ To add a directory: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). 2. Select **Email security**. 3. Select **Directories**. -4. Select **+ Add a directory** > **Manage integrations**. -5. On the SaaS integrations page, select **+ Add integration**. +4. Select **Add a directory** > **Manage integrations**. +5. On the SaaS integrations page, select **Add integration**. To sync a directory, select the three dots, then select **Sync now**. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx b/src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx new file mode 100644 index 00000000000000..6ffc475da22d91 --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx @@ -0,0 +1,27 @@ +--- +title: Outbound Data Loss Prevention (DLP) +pcx_content_type: how-to +sidebar: + order: 6 +--- + +:::caution[Compatibility] +Outbound DLP is only compatible with Microsoft 365. +::: + +## Get started + +1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**. +2. In **Protect sensitive data in outbound emails**, select **Get started**. +3. Select **Download add-in** to download the Cloudflare add-in. +4. Configure Microsoft 365 to use the Cloudflare add-in: + 1. In the [Microsoft 365 admin panel](https://config.office.com/), go to **Microsoft 365 Admin Center** > **Settings** > **Integrated Apps**. + 2. Select **Upload custom apps**. For the application type, choose _Office Add-in_. + 3. Select **Upload manifest file (.xml) from device**. + 4. Upload the Cloudflare add-in file. + 5. Verify and complete the wizard. +5. Confirm the Cloudflare add-in was configured in Microsoft 365. + +After configuring the Cloudflare add-in in Microsoft 365, you can select **Add a policy** to create an [outbound DLP policy](#create-an-outbound-policy). + +## Create an outbound policy diff --git a/src/content/docs/cloudflare-one/email-security/setup/api-deployment/office365-api.mdx b/src/content/docs/cloudflare-one/email-security/setup/api-deployment/office365-api.mdx index 319eb824e46d7b..be0910621d790e 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/api-deployment/office365-api.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/api-deployment/office365-api.mdx @@ -55,7 +55,7 @@ To connect new domains: 2. Select **Zero Trust**. 3. Select **Email security**. 4. Select **Settings**. -5. On the **Integrated domains** page, select **+ Connect a domain**. +5. On the **Integrated domains** page, select **Connect a domain**. 6. Select the domains you want Email Security to scan. 7. Select **Save**.