icon-zia.svg
Secure Internet and SaaS Access (ZIA)

About Data at Rest Scanning DLP

Watch a video about SaaS Security Data at Rest Scanning and policy configuration

The SaaS Security Data at Rest Scanning Data Loss Prevention (DLP) policy allows you to create rules to discover and protect sensitive data at rest in sanctioned SaaS applications.

Adding a DLP policy for a SaaS application provides the following benefits and enables you to:

  • Maintain individualized DLP policies for each SaaS application tenant in your organization.
  • Detect threats to your data and protect against data loss in your SaaS applications.

This policy uses Zscaler DLP engines to scan content within your organization’s SaaS application tenants. You can configure criteria, such as file type or collaboration scope, to specify the type of content for the policy to scan. You can also configure actions for the policy to take if it detects content that matches the criteria.

After creating a policy rule, you must schedule a scan for it to inspect content based on the rule's specifications (e.g., tenant, DLP engines, action, etc.). To learn more, see About SaaS Security Scan Configuration.

When a scan inspects content, it uses all applicable DLP engines for that application tenant in addition to the DLP rule’s selected engines. However, the Zscaler service only enforces the DLP policy based on the highest priority DLP rule. The service uses the other DLP engines for sensitive information discovery. You can view this information in the SaaS Security Report.

Evidence Collection

You can forward the data related to the rule violation, including the file, to an on-premises DLP incident receiver. To learn more, see Configuring the SaaS Security DLP Policy.

There are three different methods of evidence collection:

  • Email Notification: This method sends an email notification for a rule violation.
  • Incident Receiver: This method forwards the content that caused the rule violation to an on-premises incident receiver.
  • For file sharing applications, a link to the file causing the rule violation is provided.

Supported DLP Actions

The following table lists the Zscaler-supported DLP actions categorized by applications:

1 to 10 of 19. Page 1 of 2

About the Data at rest Scanning DLP Page

On the DLP page (Policy > SaaS Security > Data at Rest Scanning), you can do the following:

  1. From the drop-down menu, choose an application type to configure the DLP policy for related SaaS applications.

To enable Amazon S3, Google Cloud Platform, and Microsoft Azure for your organization, contact your Zscaler Account team.

  1. Configure a Data at Rest Scanning DLP policy rule.
  2. Search for a DLP policy rule.
  3. View a list of all configured DLP policy rules. For policy rules, you can see and sort:
    • Rule Order: The policy rule's order number. SaaS Security Data at Rest Scanning DLP policy rules are evaluated in ascending numerical order.
    • Admin Rank: The assigned admin rank for the rule. This is visible only if admin ranking is enabled in the Advanced Settings.
    • Rule Name: The name of the policy rule.
    • Severity: The severity level of the incidents that match the policy rule.
    • Criteria: The policy rule's criteria (i.e., SaaS Application Tenant, DLP Engine, Collaboration Scope, etc.)
    • Action: The configured action for the policy rule.
    • Label and Description: The label and description of the policy rule, if available.
    • Status: Whether the policy rule is enabled or disabled.
  4. Edit, duplicate, or delete a DLP policy rule.
  5. Modify the table and its columns.
  6. Go to the Exceptions page, where you can configure DLP policy exceptions.
  7. Go to the Malware Detection page, where you can create rules to discover and prevent threats to data at rest in sanctioned SaaS applications. You can also configure exceptions to the policy.
  8. Go to the Scanning Exceptions page, where you can configure scanning exceptions for file sharing applications.

The SaaS Security Data At Rest Scanning Data Loss Prevention page details.

Related Articles
Understanding the Data at Rest Scanning PolicyAbout Data at Rest Scanning DLPConfiguring the Data at Rest Scanning DLP PolicyConfiguring the Data at Rest Scanning DLP Policy ExceptionsAbout Data at Rest Scanning Malware DetectionConfiguring the Data at Rest Scanning Malware Detection PolicyConfiguring the Data at Rest Scanning Malware detection Policy ExceptionsAbout SaaS Security Scan ConfigurationUnderstanding SaaS Security Scan SchedulesConfiguring SaaS Security Scan SchedulesConfiguring the Data at Rest Scanning Exceptions