Data Loss Prevention (DLP) in Proofpoint helps organizations prevent sensitive information from leaving via email. DLP rules scan outbound (and optionally inbound) messages for patterns matching credit cards, social security numbers, protected health information, and custom data patterns.
Prerequisites
Before configuring DLP rules, ensure you have:
- Administrator access to Proofpoint with DLP permissions
- DLP feature enabled in your subscription
- Clear data classification policy defining what data to protect
- Compliance requirements documented (PCI-DSS, HIPAA, GDPR, etc.)
- Stakeholder approval for DLP enforcement actions
Understanding Proofpoint DLP Architecture
Proofpoint DLP uses multiple detection methods:
| Detection Method | Description | Use Case |
|---|---|---|
| Smart Identifiers | Pre-built patterns for common data types | Credit cards, SSN, phone numbers |
| Dictionaries | Keyword and phrase lists | Industry terms, project names |
| Regular Expressions | Custom pattern matching | Custom account numbers, codes |
| Document Fingerprinting | Match document templates | Contracts, forms, policies |
| Machine Learning | Behavioral analysis | Unusual data transfer patterns |
Step 1: Access DLP Configuration
- Log in to the Proofpoint Admin Console
- Navigate to Security Settings or Data Loss Prevention
- Click on DLP Policies or Content Filtering
- You'll see existing policies and options to create new ones
Step 2: Create a DLP Policy
Basic Policy Setup
- Click New Policy or Create DLP Rule
- Enter a descriptive Policy Name (e.g., "PCI-DSS Credit Card Protection")
- Add a Description explaining the policy purpose
- Select Direction: Outbound (most common for DLP)
- Set Scope: Company, Group, or specific users
- Click Continue
Configure Detection Criteria
Define what sensitive data to detect:
Using Smart Identifiers (Pre-built Patterns)
- In the detection section, click Add Smart Identifier
- Select from available identifiers:
| Smart Identifier | Detects | Compliance |
|---|---|---|
| Credit Card Number | Visa, MasterCard, Amex, etc. | PCI-DSS |
| Social Security Number | US SSN patterns | Privacy |
| Bank Account Number | ABA routing + account | Financial |
| HIPAA Identifiers | PHI patterns | HIPAA |
| Driver's License | US state DL formats | Privacy |
| Passport Number | International passport formats | Privacy |
- Set the Minimum Match Count (e.g., trigger if 3+ credit cards found)
- Click Add to include in the policy
Using Custom Dictionaries
Create keyword lists for industry-specific detection:
- Navigate to DLP > Dictionaries
- Click Create Dictionary
- Enter a Name (e.g., "Confidential Project Keywords")
- Add keywords, one per line:
Project Apollo
Classified
Internal Use Only
Do Not Distribute
Patent Pending
- Click Save
- Return to your DLP policy and add the dictionary as a detection criterion
Using Regular Expressions
For custom patterns like internal account numbers:
- Click Add Custom Pattern or Regular Expression
- Enter your regex pattern:
# Example: Internal Account Number (ACT-XXXXXX)
ACT-[0-9]{6}
# Example: Employee ID (EMP followed by 5 digits)
EMP[0-9]{5}
- Test the pattern with sample data
- Add to your policy
Combine Detection Criteria
Use AND/OR logic to reduce false positives:
Example: Credit Card Policy with Reduced False Positives
Trigger when:
Credit Card Number detected
AND
(Dictionary match: "payment", "invoice", "charge", "billing")
AND
Attachment present
This prevents triggering on random number strings that happen to match credit card patterns.
Step 3: Configure DLP Actions
Define what happens when sensitive data is detected:
Primary Actions
| Action | Description | Use When |
|---|---|---|
| Block | Prevent message delivery | Strict compliance requirements |
| Quarantine | Hold for admin review | Moderate risk data |
| Encrypt | Automatically encrypt message | Sensitive but allowed data |
| Allow | Permit with notification | Monitoring mode |
Secondary Actions
| Action | Description |
|---|---|
| Notify Sender | Alert user their email was flagged |
| Notify Admin | Send alert to compliance team |
| Notify Manager | Alert sender's supervisor |
| Add Header | Insert compliance header |
| Log Only | Record without action |
Recommended Action Combinations
High Risk (Block + Notify):
Primary: Block
Secondary: Notify Sender, Notify Compliance Officer
Use for: SSN, large credit card batches, HIPAA data
Medium Risk (Encrypt + Log):
Primary: Encrypt automatically
Secondary: Log event, Notify Sender
Use for: Financial data to authorized external parties
Low Risk (Allow + Monitor):
Primary: Allow
Secondary: Log event only
Use for: Initial monitoring phase, false positive analysis
Step 4: Configure Policy Exceptions
Not all sensitive data transfers are violations:
Recipient Exceptions
Whitelist trusted recipients:
- In the policy, find Exceptions section
- Add trusted domains or addresses:
@trustedbank.com
[email protected]
[email protected]
Sender Exceptions
Exempt specific users or groups:
# Users authorized to send sensitive data
[email protected]
[email protected]
Content Exceptions
Exclude specific document types or patterns:
# Exclude redacted documents
Attachment name contains: "_REDACTED"
Subject contains: "[APPROVED]"
Step 5: Enable Encryption for DLP
Automatic encryption for sensitive outbound emails:
- Navigate to Security Settings > Email Encryption
- Enable Policy-Based Encryption
- Link encryption to your DLP policy:
When DLP Policy "PCI-DSS Protection" triggers:
Action: Encrypt with Proofpoint Encryption
Encryption type: Portal pickup
Notification: Send secure message notification to recipient
Encryption Options
| Type | Description | Best For |
|---|---|---|
| Portal Pickup | Recipient accesses via web portal | External recipients |
| PDF Encryption | Attach as encrypted PDF | One-time secure delivery |
| TLS Enforced | Require TLS connection | B2B with configured partners |
| S/MIME | Certificate-based encryption | High-security environments |
Step 6: Test DLP Policies
Before enforcing, test thoroughly:
Monitor-Only Mode
- Create your DLP policy
- Set primary action to Allow or Monitor Only
- Enable all logging and notifications
- Run for 1-2 weeks
- Review logs for:
- False positives (legitimate emails flagged)
- False negatives (sensitive data not caught)
- Volume of detections
Test with Sample Data
-
Create test emails containing:
- Test credit card numbers (use standard test numbers: 4111111111111111)
- Sample SSN patterns
- Dictionary keywords
-
Send to test accounts
-
Verify detection and action
-
Adjust thresholds and patterns
Review and Refine
Based on testing:
- Add exceptions for false positives
- Strengthen patterns for missed detections
- Adjust minimum match counts
- Fine-tune notification recipients
Step 7: Deploy DLP Policies
Phased Rollout
-
Pilot Group (Week 1-2)
- IT department only
- Monitor mode with notifications
- Gather feedback
-
Extended Pilot (Week 3-4)
- Add Finance, HR, Legal
- Enable soft enforcement (warn but allow)
- Continue monitoring
-
Full Deployment (Week 5+)
- Company-wide rollout
- Full enforcement
- Ongoing monitoring and refinement
User Communication
Notify users before enforcement:
Subject: New Email Security Policy - Sensitive Data Protection
Starting [date], our email system will automatically detect and protect sensitive data including credit card numbers, social security numbers, and confidential business information.
What this means for you:
- Emails containing sensitive data may be automatically encrypted
- You'll receive notifications if an email is blocked for review
- Legitimate business needs are supported with approved processes
To send sensitive data securely:
- Use the [SECURE] tag in your subject line for automatic encryption
- Contact [[email protected]] for bulk data transfer requests
Step 8: Monitor DLP Effectiveness
Key Metrics to Track
| Metric | Target | Action if Off-Target |
|---|---|---|
| Detection Rate | Based on data volume | Adjust patterns |
| False Positive Rate | < 5% | Add exceptions, refine patterns |
| Policy Violations | Trending down | User training, process improvement |
| Encryption Adoption | Trending up | User awareness |
Regular Review Schedule
| Frequency | Activity |
|---|---|
| Daily | Review quarantined messages |
| Weekly | False positive/negative analysis |
| Monthly | Policy effectiveness report |
| Quarterly | Compliance audit, policy updates |
Troubleshooting DLP Issues
High False Positive Rate
Symptoms: Legitimate emails consistently flagged.
Solutions:
- Review detection patterns for over-matching
- Increase minimum match thresholds
- Add recipient/sender exceptions
- Combine detectors (require multiple matches)
- Use more specific dictionaries
Sensitive Data Not Detected
Symptoms: Known sensitive content passes through.
Solutions:
- Verify policy is enabled and active
- Check policy scope includes affected users
- Test Smart Identifiers with sample data
- Add custom patterns for edge cases
- Review attachment scanning settings
Encryption Failures
Symptoms: Messages flagged but not encrypted.
Solutions:
- Verify encryption service is properly configured
- Check encryption policy is linked to DLP rule
- Test encryption with manual [SECURE] trigger
- Review encryption logs for errors
Best Practices for DLP
- Start with monitoring - Never enforce untested policies
- Layer detection - Combine multiple detectors for accuracy
- Document exceptions - Record why each exception exists
- Train users - Explain DLP purpose and secure alternatives
- Review regularly - Update policies as data types change
- Integrate with HR - Align with employee data handling policies
- Test continuously - Regular false positive testing
Compliance Mapping
| Compliance | Proofpoint DLP Features |
|---|---|
| PCI-DSS | Credit card detection, encryption, logging |
| HIPAA | PHI identifiers, encryption, audit trails |
| GDPR | PII detection, consent tracking, data portability |
| SOX | Financial data protection, audit logging |
| GLBA | Financial privacy, encryption requirements |
Next Steps
After configuring DLP:
- Set up email filtering - Configure filter policies
- Manage quarantine - Handle DLP-quarantined messages
- Configure URL Defense - Enable click-time protection
- Manage sender lists - Safe senders and block lists
Additional Resources
Need help implementing Proofpoint DLP? Inventive HQ provides expert data loss prevention consulting, policy development, and compliance alignment. Contact us for a free DLP assessment.