Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

DLP Building Blocks: Dictionaries, Engines & Policy

Zscaler
05/11/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • DLP dictionaries define what data to protect using patterns and phrases with confidence scores indicating detection accuracy from low (pattern-based) to high (phrase-proximity combinations)
  • DLP engines combine dictionaries with logical operators and match counts to create detection criteria, supporting advanced features like exact data matching and Microsoft MIP label integration
  • DLP policy connects engines to actions (allow, block, confirm) and enables sophisticated data protection through optical character recognition and index-based matching for structured and unstructured data

Summary

This technical tutorial explains the three fundamental components that form the foundation of data loss prevention policy in Zscaler Internet Access. DLP dictionaries define the content to protect through pattern matching and confidence scoring, ranging from low confidence pattern detection to high confidence phrase-proximity combinations. DLP engines combine multiple dictionaries with logical operators and match counts to create sophisticated detection criteria, supporting advanced features like sub-expressions and exclusions. Finally, DLP policy ties engines to actions—allow, block, or user confirmation—enabling granular control over data protection decisions. The video demonstrates how these building blocks work together through practical examples, including integration with Microsoft Purview Information Protection labels, exact data matching using CSV-based indexing, and index document matching for form detection. Organizations already using MIP labels in Microsoft 365 can import these classifications directly into Zscaler, eliminating duplicate effort while maintaining data security through hash-based matching that never exposes sensitive data to the cloud platform.

Chapters

0:00 - Introduction to DLP Building Blocks
0:47 - DLP Dictionaries and Confidence Scores
1:57 - DLP Engines and Logical Operators
3:05 - Microsoft MIP Label Integration
3:30 - Exact Data Matching (EDM)
5:00 - Index Document Matching and OCR
5:31 - Implementation Recommendations

Key Quotes

0:20 "The first of these are DLP dictionaries. These are the what. These describe content, which is the data you want to protect."
3:24 "This means if you've already done the work of classifying your data inside your M365 tenant, you don't need to do this work again inside Zscaler to benefit from these protections."
3:47 "This is to guarantee the safety and security of your personal data. This generates an index template. No data is ever shared with Zscaler, only hashes to allow the cloud to identify that data inside documents."

Categories:
  • » Webinar Library » Zscaler
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Data Security
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Technical Deep Dive
  • How-To
  • Compliance & Governance
  • Data Loss Prevention
  • DLP Policy Configuration
  • Data Classification
  • Exact Data Matching
  • Microsoft Purview Integration
  • Index Document Matching
  • Optical Character Recognition
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: DLP Building Blocks: Dictionaries, Engines & Policy

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights
                https://www.truthinit.com/index.php/channel/1895/transforming-perceptions-of-ai-risks-and-threats-through-data-lineage-insights/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Data Lineage: Revealing AI Risks and Hidden Threats
                https://www.truthinit.com/index.php/channel/1894/transforming-data-lineage-revealing-ai-risks-and-hidden-threats/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Harnessing AI: Transitioning from Illusion to Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Data Lineage: Revealing AI Risks and Hidden Threats

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version