Guides
ProductDeveloperPartnerPersonal
Guides

Add a SaaS API Rule to the Data Loss Prevention Policy

Configure a SaaS API Rule to set the criteria as to what triggers the scanning. As files in the selected tenant are scanned upon content and/or context (sharing) change, Umbrella assesses the file against this rule’s criteria. In case of a rule violation, the rule's action automatically triggers. You may also trigger a manual response action from the Data Loss Prevention Report.

  1. Navigate to Policies > Management > Data Loss Prevention Policy. The page displays a list of all Real Time and SaaS API Rules created.
  2. From the Add Rule drop-down, choose SaaS API Rule.
2256
  1. In the Add New SaaS API Rule page, enter a meaningful Rule Name and Description. Choose a Severity value from the drop-down based on the risk involved or the importance within the ruleset. (Assigning severity values can help later on when you need to filter events in the Data Loss Prevention report).
2154
  1. Select where in scanned files you would like this rule to search for the data classifications that you choose.

Content—(Default) Scans only the content of files for the selected data classifications.
File Name—Scans only file names for the selected data classifications.
Content and File Name—Scans content and file names for the selected data classifications. Both content and file name do not need to match for the rule to apply, only one or the other.

Note: Choosing Content, File Name, or Content and File Name refers to scanning file uploads for the selected data classifications and configured file labels.

  1. Click the Data Classifications radio button to apply this rule; you can choose a data classification of your own making or a built-in data classification provided by Umbrella. (See Manage Data Classifications and Built-In Data Classifications.) Hover over PREVIEW to view data identifiers associated with each data classification.
1542
  1. Add up to 10 case-sensitive file label names to apply to this rule. The rule will search for any of the configured file label names in the value of the files' document properties. This includes:
    Microsoft Office Document Properties
    Microsoft Office Sensitivity Labels
    Adobe PDF Document Properties
    File uploads to Confluence and Jira are not scanned for file labels.
1184

👍

Microsoft Sensitivity Labels

Umbrella currently supports the detection of Microsoft sensitivity labels in the file properties’ values of the inspected file for Microsoft Word, Excel, PowerPoint, and .pdf files. Ensure you configure the rule with the name of the sensitivity labels, not the Display Names.

  1. In the Platform area, select a platform and tenant for this rule.
  1. In the Include and Exclude area, select users whose files are included or excluded from scanning for this rule. Make selections to include or exclude users from being matched.
  • Click the Include all users radio button to scan files from all users, including external collaborators.

  • Click the Include specific users radio button to scan files from specific users in one of the following ways:
  • Check the Select users check box to include scanning for selected users as per the rule. You can select the entire AD group or search for identities by AD username or AD Group. The selected identities will appear in the box on the right.

Note: Identities added to a category after the category has been included or excluded from a rule will be treated as if they were part of the category when the rule was created.

  • Check the Manually add user domain destinations check box to specify domains where rules will apply to users within those domains.

Note: You can enter a maximum of 1,000 user domain destinations. This field applies only to the Webex platform.


  • Check the Exclude specific users check box to exclude selected users from being matched by this rule. You can select the entire AD group or search for identities by AD username or AD Group. The selected identities will appear in the box on the right.
  1. In the Resources area, select resources such as Webex Teams and Webex Space that are included or excluded from scanning for this rule.

Note: The Resource Labels section will only appear if you have selected AWS, Azure or Webex as your platform.

  • Click the Include All Resources radio button which is the default option. Selecting this option will include all resources for scanning.
  • Click the Include Specific Resources radio button to display three types of resources: AWS, Azure and Webex. You can further expand these options and select the required items to be included for scanning under this rule.
  • For AWS, you can select S3 buckets; for Azure, you can select Blob storage; and for Webex, you can select Webex Teams and Webex Spaces.
  • Select Webex Teams to display a list of available resources.
  • Select Webex Spaces to display a list of available resources.
  1. Under Exposure, optionally select the file sharing permissions to consider when processing files to search for data violations:
  • Shared Publicly- Accessible to all users with the link to the file.
  • Domain-wide Share- Shared with all users in a domain.
  • Shared with Internal Users- Shared with users who belong to the authorized domains.
  • Shared with External Users- Shared with users who do not belong to the authorized domains.
  • Shared with Specific Users- Shared with specific users by their email addresses.

The table below indicates which Exposure settings are available for each platform:

Shared PubliclyDomain-wide shareShared with internal usersShared with external usersShared with specific users
AWS S3
Azure Storage
Box
Dropbox
Google
Microsoft Office 365
Service Now
Slack
Webex Teams

🚧

  • A DLP rule can be configured with either Data Classifications, File Labels or both. Exposure is an optional criterion.
  • When a DLP rule is configured with all 3 criteria, then a DLP event is raised when any of the selected Data Classifications and when any of the configured file labels are detected in the inspected file and when the file’s permissions match any of the selected exposure settings.
  1. From the Action drop-down list, choose Monitor, Quarantine, Delete or Revoke Access.
  • Monitor- Detects and logs a DLP event for every modified file violating this rule’s criteria
  • Quarantine- Isolates a file that violates the rule criteria to the quarantine folder and revokes all shares
  • Delete- Permanently deletes when a change is detected that violates the rule criteria (This option is available only for Webex Teams, and applies for a violation within a post, as well as a violation within a file attached to a post.)
  • Revoke Access- Removes public link, all external or internal users, and any share permission within the entire organization. This action also removes the file owner and transfers the ownership to the selected user.

The table below indicates which Actions settings are available for each platform:

MonitorQuarantineDeleteRevoke
Access
AWS S3
Azure Storage
Box
Dropbox
Google
Microsoft Office 365
Service Now
Slack
Webex Teams
1394

🚧

If you choose Quarantine for Microsoft OneDrive, Sharepoint Online, Box, Dropbox, or Google Drive:

  • The file identified as exposing sensitive data is moved to the Cisco_Quarantine/DLP folder Umbrella created in the root path of the Global Admin who authorized the tenant.
  • In lieu of the quarantined file, a text file is left in the original location with the name filename.ppt_Unique-Event-ID_Cisco_Quarantined.txt explaining to the original File Owner that the file is identified as exposing sensitive data and for more information to contact their organization administrator.
  • The user who authorizes access to Umbrella will have access to the quarantine folder. All other accesses and collaborators are removed.
  • Thus, we recommend that the admin add the relevant DLP Admins as additional collaborators to the folder.

If you choose Quarantine for ServiceNow:

  • The file identified as exposing sensitive data is moved to a table named Cisco_Quarantine_Malware which can be access only by the admin user who authorized the ServiceNow tenant.
  • A footprint is attached to the notes\activities area of the table the file is attached to. This footprint will notify users that the file has been identified as malware, and for more information they should contact their administrator.
  • Note: Quarantine attempts may fail if the files have been locked or blocked by settings within their native platforms. Settings local to the platform where a file resides take precedence over Umbrella’s ability to detect or remediate DLP violations or malware.
  • Note: If your DLP rules process files from Microsoft OneDrive, SharePoint Online, Box, Dropbox, ServiceNow, or Google Drive and you restore a quarantined file that still violates rule criteria, the system will quarantine that file again. To prevent the system from quarantining the file again, remove the file's violation, or update the rule's criteria.”
  1. If you chose Revoke Access:
  • If you chose Google Drive for the Platform, select from the following options:
  • Remove public link: Removes any file link that has public exposure.
  • Remove share exclusively with internal users: Removes all internal users of files that were shared with few specific internal users.
  • Remove share with any external user: Removes all external users. (External users are not part of the organization domain)
  • Remove specific shares: Entered email addresses or group email addresses are removed.
  • Remove org-wide share link: Removes any share permission with the entire organization.
  • Remove owner: Removes the file owner and transfers ownership to a new email address.
1412
  • If you chose Microsoft 365 for the platform, select from the following options:
  • Remove public link: Removes any file link that has public exposure.
  • Remove org-wide share link: Removes any share permission with the entire organization.
950
  • If you chose Box for the platform, select the following option:
  • Remove public link: Removes any file link that has public exposure.
  • If you chose Dropbox for the platform, select from the following options:
  • Remove public link: Removes any file link that has public exposure.
  • Remove org-wide share link: Removes any share permission with the entire organization.
  1. In the User Notifications area, click the User Notifications toggle button to enable and configure an email notification to be sent to one or both of the following users:
  • The owner of the file associated with a rule violation
  • The user who performs an action that triggers a rule violation

You can use a default email template provided by the system or create your own custom template.

a. Click User Notifications toggle button.

b. Select one or both of the following email recipients:

  • File owner - The owner of the file associated with the rule violation.
  • Event actor - The user who performs an action that triggers the rule violation.

c. Choose the email template:

To Use the Default Email Template:

a. Click the Default Email radio button.

b. To preview the content of the email that will be sent to users, click Preview Default Email. You can review the email subject line and text, but you cannot change it.

c. (Optional) To send a test copy of the email to an address of your choosing, enter an address in Preview Test Email and click SEND PREVIEW to send the message. (By default, the system uses the email address of the logged in user.)

d. Click CLOSE to return to the Data Loss Prevention Policy page.

To Use a Custom Email Template:

a. Click the Custom Email radio button.

b. From the drop-down list, choose an existing custom template, or choose CREATE CUSTOM TEMPLATE. If you select an existing custom template, you can click Preview and Edit Custom Email to review and change the template.

c. When you choose to create or edit a custom template for email notifications of policy violations you will see one of these two dialogs, which are almost identical:


The Edit Custom Email Template includes a DELETE link which you can use to delete a custom template that is no longer needed. You may not delete a template that is in use by any rule.

To create a new template or change an existing template:

a. Enter a unique Custom Email Template Name.

b. Enter an Email Subject Line.

c. Enter the text of the email in the Email Body text box.

The email text can include the following variables, which you must enclose in braces ( {} ):

  • {eventId} - The unique identifier the system generates for the policy violation event.
  • (detectedTimestamp} - The date and time the violation was detected, formatted as shown in this example: "Oct 1, 2023 at 14:04 UTC"
  • (actorName} - Name of the user whose action triggered the violation. (The system gets this from the tenant associated with the violation. Depending on application and file settings, this information may not be available, in which case the the system replaces this variable with blank text.)
  • {actorEmail} - Email address of the user whose action triggered the violation. (The system gets this from the tenant associated with the violation. Depending on application and file settings, this information may not be available, in which case the the system replaces this variable with blank text.)
  • {fileName} - Name of the data file that triggered the violation.
  • {ruleName} - Name of the rule that was triggered.
  • {matchedClassifications} - The data classifications associated with the violation. (See Manage Data Classifications.)
  • {destination} - The application or platform type of the tenant associated with the violation. (E.g., Google Drive or One Drive; see Manage Tenant Controls.)
  • {fileOwnerName} - Name of the file owner. (The system gets this from the tenant associated with the violation. Depending on application and file settings, this information may not be available, in which case the the system replaces this variable with blank text.)
  • {fileOwnerEmail} - Email address of the file owner. (The system gets this from the tenant associated with the violation. Depending on application and file settings, this information may not be available, in which case the the system replaces this variable with blank text.)
  • {fileLocation} - The file URL.

Note: The system replaces a variable with blank text if there is no value assigned to the variable or if an invalid variable name appears within the braces.

d. (Optional) To send a test copy of the email to an address of your choosing, enter an address in Preview Test Email and click SEND PREVIEW to send the message. (By default, the system uses the email address of the logged in user.)
e. Click SAVE to return to return to the Data Loss Prevention Policy page.

  1. Click Save. All fields must have options selected to save.

Supported Applications < Add a SaaS API Rule to the Data Loss Prevention Policy > Discovery Scan