Data Loss Prevention

Overview

Data Loss Prevention (DLP) helps prevent data leakage and detect sensitive data exposure by performing automated file scanning across SaaS services using Check Point DLP engines. The system supports detection of over 200 sensitive data types and allows organizations to define custom policies applied to specific users or groups. It ensure compliance, protects customer and company data, and allows granular control over what information can be shared and with whom, minimizing the risk of accidental or intentional data exposure.

File scanning is performed in near real-time and is triggered by:

  • Adding a new file

  • Editing an existing file

  • Changing file sharing permissions

Supported Integrations:

  • Box

  • Dropbox

  • Google Drive

  • Microsoft SharePoint

  • Microsoft OneDrive

  • Jira

  • Salesforce

  • Slack

Prerequisites

Before creating Malware or DLP policies, ensure the following configurations are completed:

Note - These prerequisites apply to both DLP and Malware detection features and need to be configured only once.

DLP Policy Management

This page displays all configured services with their associated policy rules.

Policy Table

The DLP Policy page is organized by service (Google Drive, Jira, Microsoft, Salesforce, etc.). Each service displays:

  • Total number of rules.

  • Number of active rules.

  • A collapsed/expandable view of all rules.

When expanded, each service shows a detailed table of existing rules:

Column

Description

#

Indicates the rule’s position in the evaluation order.

Rule name

Name of the DLP policy rule.

Data types

Sensitive data types the rule monitors (for example, PII, PHI, Credit Card Numbers). Displays primary data type with a "+N" indicator if multiple types are selected.

Applied to

Users or groups the policy applies to.

Actions

Action taken when a violation occurs (Detect, Revoke Access, Delete)

Monitor external sharing

Status indicator (Enabled/Disabled) showing whether the rule monitors files shared outside the organization

Last modified

Date and time of the last rule modification.

Status

Toggle switch of the rule status (Active/Inactive).

Policy Execution Logic:

  • Policies follow a first match rule - when a file matches multiple policies, only the first matching policy is executed.

  • Policy order is critical and can be adjusted using drag and drop.

Available Actions:

  • Create new - Create a new policy rule

  • Edit - Modify an existing rule

  • Delete - Remove a rule permanently

  • Clone - Duplicate a rule (only within the same service)

  • Export - Export policy configurations

  • Drag and drop - Reorder policies to change execution priority

Creating a DLP Policy

To create a new DLP policy:

  1. From the left menu, navigate to Policy > Data Loss Prevention.

  2. Click Create new.

  3. In the Create new Data Loss Prevention policy rule window that opens, select the service you want to monitor from:

    • All Integrations - Shows all available services.

    • Connected - Shows services with active integrations.

    • Not Connected - Shows supported services not yet integrated. To connect such service, click it and start the Integration Manager.

    The page for creating a new rule opens.

  4. Configure the rule settings:

    1. Rule name - Enter a descriptive name for the rule.

    2. Description (optional) - Add additional context about the rule's purpose.

    3. Status - Set rule status (Default: Active).

    4. Data Types - Select the types of sensitive data this policy should monitor:

      • Search or browse through 200+ data types.

      • Data types are organized into categories.

      • Click a data type to view its details.

      • Multiple data types can be selected for a single policy.

    5. Monitor External Sharing - Detects files containing sensitive data. The policy identifies files shared with users from external domains as configured in Domains Configuration. Select one of these policies:

      • Detect - Identify externally shared files with violations.

      • Remediate + Delete - Delete files with violations (removes sharing automatically).

      • Remediate + Revoke Access - Remove external access while keeping the file within the organization.

      Note - Revoke Access and Delete actions are currently available only for Microsoft and Google services.

    6. Scope - Specify which organizational areas this policy applies to:

      • Search and select specific user groups from your IdP

      • Entire organization

    7. Action - Choose what happens when a violation occurs:

      • Detect only - Identify and report files with violations without taking an action.

      • Remediate + Delete - Automatically delete files containing sensitive data.

      • Remediate + Revoke Access - Remove access permissions for files with violations (requires Monitor external sharing to be enabled).

  5. Optionally, you can copy settings from an existing rule.

    1. Click Import settings.

    2. Select an existing rule to copy its settings. This action imports only relevant settings and you have to configure manually the rule name, description, and action.

  6. Click Create Rule to save and activate the policy. The new rule appears in the service's policy table.

Managing Policies

Select any rule or click the info icon (i) to open a side panel with the rule details:

Editing a Policy:

  • From the policy table, click Edit or open the side panel and click Edit.

  • This opens the policy configuration screen in edit mode.

Activating/Deactivating a Policy:

  • Toggle the Active/Inactive switch in the Status column or use the toggle in the side panel.

  • Inactive policies are not enforced but remain configured.

Cloning a Policy:

  • Click Clone to duplicate an existing rule.

  • Cloning is only available within the same service (cannot clone across different services).

  • Modify the cloned rule as needed.

Deleting a Policy:

  • Click Delete to permanently remove a rule.

  • Deleted policies cannot be recovered.

Reordering Policies:

  • Use drag and drop to change the order of policies.

Important - Policies follow first match logic, so the order matters.

 

For information on DLP events, see File Protection Events.

For information on DLP dashboard, see File Protection Dashboard.