Κοινή χρήση μέσω


Define your own DLP templates and information types in Exchange 2013

Applies to: Exchange Server 2013

You can develop data loss prevention (DLP) policy templates as XML files independent of Microsoft Exchange Server 2013 and then import them using the Exchange admin center or the Exchange management shell. This section describes the process and details of authoring and tuning DLP XML files for use within a DLP solution. You are not required to develop your own DLP XML files because the Exchange admin center provides a way for you to get started quickly with existing DLP policy templates and transport rules in order to scan messages.

Looking for management tasks related to DLP policy templates? See DLP procedures.

Note

Exchange 2013: DLP is a premium feature that requires an Exchange Enterprise Client Access License (CAL). For more information about CALs and server licensing, see Exchange licensing FAQs.

Important

It's beyond the scope of this documentation to recommend a business model or information about file packaging or deployment guidelines for the sensitive information rules or to discuss how such rules would be distributed. Furthermore, this documentation does not discuss protection mechanisms, such as encryption, for custom developed rules, nor does it discuss how such mechanism would be employed.

Extend the information types to meet your needs

The following sections describe concepts and the XML schema definition that you must understand in order to begin creating your own XML files for both DLP policy templates and sensitive information rule packages that can be imported into Exchange 2013 and used as DLP policies.

DLP in Microsoft Exchange helps you to apply organizational-specific policy to sensitive information. A key factor in the strength of a DLP solution is the ability to correctly identify confidential or sensitive information that may be unique to the organization, regulatory needs, geography, or other aspects of business. Although Microsoft has provided policy templates and sensitive information types within the product for you to get started, your unique business needs can require a custom data loss prevention solution. For this reason, Microsoft provides a way for you to create and import your own DLP policy templates or your own sensitive information definitions within classification rule packages. An accurate DLP solution relies on configuring the correct set of rules for the sensitive information detection engine that provide high degree of protection while minimizing false positives and negatives.

Develop your own DLP policy templates

You can write your own DLP policy template XML file and import it. This approach to extending the DLP solution provided in Exchange will allow you to build DLP policies that closely match your DLP requirements.

Managing custom templates and their related policies is similar to managing the DLP policies that you create based on Microsoft-supplied templates. In a typical DLP policy lifecycle, you would do the following:

  1. Create your own DLP policy template, a custom XML file. To learn more, see Developing DLP policy template files.

  2. Import your custom template. To learn more, see Import a custom DLP policy template from a file.

  3. Create a DLP Policy based on your custom template. To learn more, see Create a DLP policy from a template.

  4. Update your custom template by repeating steps 1 and 2.

  5. Remove your custom template. To learn more, see Remove-DlpPolicyTemplate.

For more information about the XML schema definition and concepts related to developing your own templates, see Developing DLP policy template files.

Develop your own sensitive information types and matching logic in classification rule packages

You can write your own sensitive information definitions in a classification rule package, which is an XML file, and import it as part of your DLP solution. The sensitive information detection engine provides the deep content analysis capabilities for identifying sensitive information like credit card numbers, social security numbers, and company intellectual property. The engine is controlled by a configurable set of instructions, or rules, for scanning and analyzing the content. The rules are combined together into a classification rule package, an XML document that adheres to a standardized rules package XML schema definition. Here's how you can develop your own.

  1. Create your own sensitive information types, a custom XML file. To learn more, see Developing sensitive information rule packages.

  2. Import your sensitive information type. To learn more, see New-ClassificationRuleCollection.

  3. Create custom template based on your information types. To learn more, see Developing sensitive information rule packages

  4. Update your custom template by repeating steps 1 and 2.

  5. Remove your custom template. To learn more, see Remove-ClassificationRuleCollection

For more information about the rule packages, see Developing sensitive information rule packages and Matching methods and techniques for rule packages.

Understanding rule types in rule packages

The rules within a rule package configure the process for detecting well-defined content characteristics; for example, rules for finding a driver's license number. Two main rule types are available: Entity and Affinity.

Entity rules are targeted toward well-defined (and oftentimes regulated) identifiers such as U.S. social security numbers. An Entity is represented by a collection of countable patterns. A pattern defines a collection of matches with an explicit primary match identifier. An example Entity is a driver's license.

Affinity rules are targeted toward a certain type of document such as a corporate financial statement. An Affinity is represented as a collection of independent evidences. Evidence is an aggregation of required matches within certain proximity. An example of an Affinity is the U.S. Sarbanes-Oxley Act.

For more information

Data loss prevention

Import a custom DLP policy template from a file

New-ClassificationRuleCollection

Transport rules in Exchange 2013

Sensitive information types in Exchange Server