AIP labeled file upload or download does not create DLP incidents
1015
Created On 04/26/25 00:27 AM - Last Modified 04/29/25 21:18 PM
Symptom
No incidents are created when AIP labelled files are uploaded or downloaded.
Environment
- Prisma Access or Next Gen Firewalls (NGFW)
- Enterprise DLP
- Azure Information Protection (AIP)
Cause
Current DLP design only supports detection of AIP labels and Microsoft Encrypted files but will not scan data within the Encrypted files.
Resolution
The following series of steps will help configure the DLP data patterns and profiles to create incidents.
- Ensure that the data pattern “File Property” are defined as documented.
- Ensure that the AIP labels are defined exactly the same way as its defined in “File Properties”.
- Ensure that the data profile to include (1) data pattern with AIP label and/or (2) Encrypted- Microsoft AIP and Encrypted- Standard.
- Once the data profiles/patterns are pushed to firewalls, an upload or download files should block.
- To verify, check the incidents in DLP portal UI and the snippets will show detection and matched AIP labels and Encrypted- Microsoft AIP/Encrypted- Standard upon match.