Forum Discussion
Use case for Endpoint DLP restricted apps blocking uploads to ZOOM from user desktops
Heather_PoulsenThanks for the featured question! Very cool
Following the steps provided, we still notice that although it gets a "flag" in DLP as "File accessed by unallowed app", it still looks like we are just in "audit" enforcement mode (see screenshot below). "How applied" is also set to None.
Would any of these settings below need to be changed from "Audit" to "Block" in order to activate this Endpoint DLP policy?
Once again, our specific use case is:
To block file uploads from a user's desktop through the ZOOM chat (in the ZOOM desktop app).
Thank you once again and in advance for more guidance.
Best,
Luke Fisher
Hello Luke! Are the files that you are trying to block being uploaded to the restricted application protected? For example, what are the conditions of your EDLP rule?
To answer your question, "YES" you would need to set the action type to "BLOCK" in order to prevent the files from being uploaded to the restricted application. Also, please ensure that you have configured the "Restricted app activities":
- Luke_Michael_FisherApr 06, 2023Brass Contributor
Leo_Ramirez Thanks for the quick reply!
Your prompt to re-examine the EDLP policy was timely. The EDLP policy was configured such that we were using a group in Azure AD that I was a member of (with my work email address) but I have a UPN address that was not part of that group in Azure AD. This something for us to consider architecturally moving forward.
Once I know more from my team about if the necessary changes can be made, I'll follow up with a celebratory "Resolved" note 🙂
Thanks for helping me to troubleshoot this issue and drill down to the root cause!
Best,
Luke Fisher
- Luke_Michael_FisherApr 20, 2023Brass ContributorFollowing up on this. I learned from our engineers that the UPN vs work email addresses was not an issue. It may have been that I just needed to wait for the EDLP policy to propagate. The issue was resolved 🙂