Check Point Harmony Email & Collaboration includes a powerful Data Loss Prevention (DLP) engine that protects sensitive information from unauthorized sharing through email, attachments, and collaboration tools. This guide covers configuring DLP policies to prevent data breaches while minimizing false positives.
Prerequisites
Before configuring DLP, ensure you have:
- Harmony Email & Collaboration connected to Microsoft 365 or Google Workspace
- Administrator access to the Check Point Infinity Portal
- Complete Protect license (DLP is included in Complete Protect tier)
- Understanding of your data classification requirements and regulatory obligations
Understanding DLP Capabilities
Harmony Email DLP provides:
| Capability | Description |
|---|---|
| Pre-built Data Types | 100+ patterns for common sensitive data (SSN, credit cards, etc.) |
| Custom Data Types | Define your own regex patterns for organization-specific data |
| OCR Scanning | Extract text from images for scanning |
| Microsoft Purview Integration | Honor sensitivity labels from Microsoft 365 |
| Multi-directional Scanning | Scan inbound, outbound, and internal emails |
Step 1: Access DLP Configuration
- Sign in to https://portal.checkpoint.com
- Navigate to Harmony > Email & Collaboration
- Go to Security Settings in the left menu
- Click Security Engines
- Locate DLP and click Configure
Step 2: Configure Global DLP Settings
Detection Settings
Configure how the DLP engine processes detections:
Unique Detections Only
- In the DLP Configuration window, locate Detection Settings
- Enable Unique detections only checkbox
- When enabled, the system ignores duplicate occurrences of the same string
- Example: "SSN: 123-45-6789" appearing 5 times counts as 1 detection
Tip: Enable this setting to reduce false positives from email threads that repeat sensitive data in quoted replies.
Occurrence Threshold
Set the minimum number of matches required to trigger a detection:
- Locate Occurrence Threshold settings
- Set a threshold value (default is 1)
- If set to 3, the DLP engine only triggers when 3 or more matches are found
- This helps reduce false positives from isolated occurrences
Detected Text Storage Mode
Configure how detected sensitive strings are stored and displayed:
| Mode | Description | Use Case |
|---|---|---|
| Full | Stores complete matched text | Detailed investigation |
| Masked | Partially obscures matched text | Privacy compliance |
| None | No text stored | Maximum privacy |
- Select your preferred Detected Text Storage Mode
- Consider regulatory requirements (GDPR, HIPAA) when choosing
- Click Save to apply settings
Step 3: Configure DLP Categories
DLP categories group related data types for easier policy management:
Pre-built Categories
Harmony Email includes these built-in categories:
| Category | Data Types Included |
|---|---|
| PII | SSN, Driver's License, Passport numbers |
| Financial | Credit card numbers, bank accounts, routing numbers |
| HIPAA | PHI, medical record numbers, health insurance IDs |
| PCI-DSS | Credit card data, CVV codes |
| GDPR | EU personal data identifiers |
| Custom | Organization-specific patterns |
Enable DLP Categories
- Go to Security Settings > Security Engines > DLP
- Under DLP Categories, review available categories
- Enable categories relevant to your compliance requirements:
- Toggle PII for personal information protection
- Toggle Financial for payment card data
- Toggle HIPAA for healthcare environments
- Click Save
Adjust Category Sensitivity
Fine-tune detection sensitivity for each category:
- Click the gear icon next to a DLP category
- Adjust Sensitivity Level:
- Low: Fewer detections, may miss some violations
- Medium: Balanced detection (recommended)
- High: Maximum detection, more false positives
- Configure Likelihood Adjustment for specific data types
- Click Save
Step 4: Create DLP Policy Rules
DLP Policy for Outgoing Emails
Protect against data exfiltration via outbound email:
- Navigate to Policy in the left menu
- Click Add a New Policy Rule
- Under Choose SaaS, select your email platform (Office 365 Mail or Gmail)
- Under Choose Security, select DLP
- Click Next
Configure the rule:
- Rule Name: Enter a descriptive name (e.g., "Block PII in Outbound Email")
- Email Direction: Select Outbound
- Protection Mode: Choose based on your requirements:
- Monitor only: Log violations without blocking
- Prevent (Inline): Block emails containing sensitive data
- Click Next
Select DLP categories to enforce:
- Enable checkboxes for categories to include:
- PII: Personal identifiable information
- Financial: Credit cards, bank accounts
- HIPAA: Protected health information
- Select Sensitivity Level for this rule
- Click Next
Configure actions:
- When DLP violation is detected:
- Quarantine: Hold email for admin review
- Block: Reject the email
- Alert Only: Allow delivery but log the event
- Notify sender: Enable to inform users of violations
- Notify admin: Configure admin email for alerts
- Click Save
DLP Policy for Incoming Emails
Monitor sensitive data entering your organization:
- Click Add a New Policy Rule
- Select your email platform under Choose SaaS
- Select DLP under Choose Security
- Click Next
Configure the rule:
- Rule Name: "Monitor PII in Inbound Email"
- Email Direction: Select Inbound
- Protection Mode: Select Monitor only (recommended for inbound)
- Select applicable DLP Categories
- Configure notification settings
- Click Save
Note: Blocking inbound emails for DLP is less common, as you typically want to receive all business communications. Monitor mode helps track what sensitive data is being sent to your organization.
DLP Policy for Internal Emails
Monitor internal sharing of sensitive information:
- Create a new policy rule
- Email Direction: Select Internal
- Protection Mode: Choose Monitor only initially
- Select relevant DLP Categories
- This helps identify internal data handling issues
Step 5: Configure Microsoft Purview Integration
If using Microsoft 365, integrate with Purview Sensitivity Labels:
Enable Sensitivity Label Support
- Go to Security Settings > Security Engines > DLP
- Locate Microsoft Purview Sensitivity Labels section
- Enable Use Microsoft Purview Sensitivity Labels
- Click Authorize to connect to Microsoft 365
Create Label-Based DLP Rules
- Go to Policy > Add a New Policy Rule
- Select Office 365 Mail and DLP
- Under DLP settings, select Sensitivity Labels
- Choose which labels trigger DLP actions:
- Confidential: Block external sharing
- Highly Confidential: Quarantine for review
- Internal Only: Alert on external recipients
- Configure actions and save
Supported File Formats for Labels
Sensitivity labels are detected in:
- Emails
- Microsoft Word (.docx)
- Microsoft Excel (.xlsx)
- Microsoft PowerPoint (.pptx)
- PDF documents
Step 6: Create Custom DLP Data Types
Define custom patterns for organization-specific data:
Access Custom Data Types
- Go to Security Settings > Security Engines > DLP
- Click Custom Data Types or Manage Data Types
- Click Add New Data Type
Define a Custom Pattern
Example: Detect internal project codes (format: PROJ-XXXX):
- Name: "Internal Project Codes"
- Description: "Detects project identifiers in format PROJ-####"
- Pattern Type: Select Regular Expression
- Regex Pattern:
PROJ-\d{4} - Validation: Test the pattern with sample data
- Click Save
Add to a Custom Category
- Create or select a custom DLP category
- Add your custom data type to the category
- Enable the category in your DLP policies
Step 7: Test DLP Configuration
Before enforcing DLP policies, test your configuration:
Send Test Emails
- Create test emails containing:
- Fake credit card numbers (use test patterns)
- Dummy SSN formats
- Sample data matching your custom patterns
- Send to internal and external addresses
- Verify detections appear in the Events log
Review DLP Events
- Go to Events in the left menu
- Filter by Event Type: DLP
- Review detected violations:
- Check Data Type matched
- Verify Sensitivity Level is appropriate
- Confirm Action Taken matches policy
Adjust Policies Based on Results
- If too many false positives:
- Increase occurrence threshold
- Enable unique detections only
- Lower sensitivity level
- If missing detections:
- Lower occurrence threshold
- Increase sensitivity level
- Review regex patterns for custom types
Step 8: Enable DLP for Collaboration Tools
Extend DLP protection to collaboration platforms:
Microsoft Teams DLP
- Go to Policy > Add a New Policy Rule
- Select Microsoft Teams under Choose SaaS
- Select DLP under Choose Security
- Configure categories and actions
- Save the policy
SharePoint and OneDrive DLP
- Create a policy rule for OneDrive or SharePoint
- Configure DLP to scan:
- File uploads
- File sharing events
- Document content
- Set appropriate actions for violations
Google Drive DLP
- Create a DLP policy for Google Drive
- Enable scanning for:
- Document content
- File names
- Sharing permissions
- Configure actions for detected violations
Troubleshooting DLP Issues
No DLP Events Appearing
Symptoms: Emails with sensitive data aren't triggering DLP events.
Solutions:
- Verify DLP categories are enabled in policy rules
- Check that the policy applies to the correct email direction
- Ensure file size is under 10 MB limit
- Confirm the data matches the expected pattern format
Too Many False Positives
Symptoms: Legitimate emails are being flagged for DLP violations.
Solutions:
- Increase the occurrence threshold
- Enable "Unique detections only"
- Create exceptions for specific senders or recipients
- Adjust sensitivity levels to medium or low
Custom Patterns Not Matching
Symptoms: Custom regex patterns don't detect expected data.
Solutions:
- Test regex pattern with online tools (regex101.com)
- Verify pattern syntax is correct for the DLP engine
- Check for special character escaping requirements
- Test with exact sample data
Best Practices
- Start with Monitor mode: Observe detections before blocking
- Phase rollout: Enable one category at a time
- Document exceptions: Track any exclusions and reasons
- Regular review: Audit DLP events weekly
- User training: Educate users about data handling policies
- Test updates: Verify policies after any configuration changes
Next Steps
After configuring DLP:
- Set up alerts: Configure notifications for high-severity DLP events
- Create reports: Schedule regular DLP violation reports
- Integrate SIEM: Forward DLP events to your security operations center
- Review compliance: Map DLP policies to regulatory requirements
- User education: Train employees on data classification and handling
Additional Resources
- Harmony Email DLP Documentation
- DLP Security Engine Configuration
- Microsoft Purview Sensitivity Labels
Need help implementing DLP? Inventive HQ specializes in data protection solutions for regulated industries. Contact us for expert guidance.