zia.DLPWebRules
Explore with Pulumi AI
The zia_dlp_web_rules resource allows the creation and management of ZIA DLP Web Rules in the Zscaler Internet Access cloud or via the API.
⚠️ WARNING: Zscaler Internet Access DLP supports a maximum of 127 Web DLP Rules to be created via API.
Example Usage
OCR ENABLED
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
const test = new zia.DLPWebRules("test", {
action: "ALLOW",
cloudApplications: [
"ZENDESK",
"LUCKY_ORANGE",
"MICROSOFT_POWERAPPS",
"MICROSOFTLIVEMEETING",
],
description: "Test",
fileTypes: [
"BITMAP",
"JPEG",
"PNG",
"TIFF",
],
matchOnly: false,
minSize: 20,
ocrEnabled: true,
order: 1,
protocols: [
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
rank: 7,
state: "ENABLED",
withoutContentInspection: false,
zscalerIncidentReceiver: true,
});
import pulumi
import zscaler_pulumi_zia as zia
test = zia.DLPWebRules("test",
action="ALLOW",
cloud_applications=[
"ZENDESK",
"LUCKY_ORANGE",
"MICROSOFT_POWERAPPS",
"MICROSOFTLIVEMEETING",
],
description="Test",
file_types=[
"BITMAP",
"JPEG",
"PNG",
"TIFF",
],
match_only=False,
min_size=20,
ocr_enabled=True,
order=1,
protocols=[
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
rank=7,
state="ENABLED",
without_content_inspection=False,
zscaler_incident_receiver=True)
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := zia.NewDLPWebRules(ctx, "test", &zia.DLPWebRulesArgs{
Action: pulumi.String("ALLOW"),
CloudApplications: pulumi.StringArray{
pulumi.String("ZENDESK"),
pulumi.String("LUCKY_ORANGE"),
pulumi.String("MICROSOFT_POWERAPPS"),
pulumi.String("MICROSOFTLIVEMEETING"),
},
Description: pulumi.String("Test"),
FileTypes: pulumi.StringArray{
pulumi.String("BITMAP"),
pulumi.String("JPEG"),
pulumi.String("PNG"),
pulumi.String("TIFF"),
},
MatchOnly: pulumi.Bool(false),
MinSize: pulumi.Int(20),
OcrEnabled: pulumi.Bool(true),
Order: pulumi.Int(1),
Protocols: pulumi.StringArray{
pulumi.String("FTP_RULE"),
pulumi.String("HTTPS_RULE"),
pulumi.String("HTTP_RULE"),
},
Rank: pulumi.Int(7),
State: pulumi.String("ENABLED"),
WithoutContentInspection: pulumi.Bool(false),
ZscalerIncidentReceiver: pulumi.Bool(true),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var test = new Zia.DLPWebRules("test", new()
{
Action = "ALLOW",
CloudApplications = new[]
{
"ZENDESK",
"LUCKY_ORANGE",
"MICROSOFT_POWERAPPS",
"MICROSOFTLIVEMEETING",
},
Description = "Test",
FileTypes = new[]
{
"BITMAP",
"JPEG",
"PNG",
"TIFF",
},
MatchOnly = false,
MinSize = 20,
OcrEnabled = true,
Order = 1,
Protocols = new[]
{
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
},
Rank = 7,
State = "ENABLED",
WithoutContentInspection = false,
ZscalerIncidentReceiver = true,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.DLPWebRules;
import com.pulumi.zia.DLPWebRulesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var test = new DLPWebRules("test", DLPWebRulesArgs.builder()
.action("ALLOW")
.cloudApplications(
"ZENDESK",
"LUCKY_ORANGE",
"MICROSOFT_POWERAPPS",
"MICROSOFTLIVEMEETING")
.description("Test")
.fileTypes(
"BITMAP",
"JPEG",
"PNG",
"TIFF")
.matchOnly(false)
.minSize(20)
.ocrEnabled(true)
.order(1)
.protocols(
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE")
.rank(7)
.state("ENABLED")
.withoutContentInspection(false)
.zscalerIncidentReceiver(true)
.build());
}
}
resources:
test:
type: zia:DLPWebRules
properties:
action: ALLOW
cloudApplications:
- ZENDESK
- LUCKY_ORANGE
- MICROSOFT_POWERAPPS
- MICROSOFTLIVEMEETING
description: Test
fileTypes:
- BITMAP
- JPEG
- PNG
- TIFF
matchOnly: false
minSize: 20
ocrEnabled: true
order: 1
protocols:
- FTP_RULE
- HTTPS_RULE
- HTTP_RULE
rank: 7
state: ENABLED
withoutContentInspection: false
zscalerIncidentReceiver: true
“ALL_OUTBOUND” File Type
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const thisDLPEngines = zia.getDLPEngines({
predefinedEngineName: "EXTERNAL",
});
const thisDLPWebRules = new zia.DLPWebRules("thisDLPWebRules", {
description: "Example",
action: "BLOCK",
order: 1,
rank: 7,
state: "ENABLED",
protocols: [
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
fileTypes: ["ALL_OUTBOUND"],
zscalerIncidentReceiver: true,
withoutContentInspection: false,
userRiskScoreLevels: [
"LOW",
"MEDIUM",
"HIGH",
"CRITICAL",
],
severity: "RULE_SEVERITY_HIGH",
dlpEngines: {
ids: [thisDLPEngines.then(thisDLPEngines => thisDLPEngines.id)],
},
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
this_dlp_engines = zia.get_dlp_engines(predefined_engine_name="EXTERNAL")
this_dlp_web_rules = zia.DLPWebRules("thisDLPWebRules",
description="Example",
action="BLOCK",
order=1,
rank=7,
state="ENABLED",
protocols=[
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
file_types=["ALL_OUTBOUND"],
zscaler_incident_receiver=True,
without_content_inspection=False,
user_risk_score_levels=[
"LOW",
"MEDIUM",
"HIGH",
"CRITICAL",
],
severity="RULE_SEVERITY_HIGH",
dlp_engines=zia.DLPWebRulesDlpEnginesArgs(
ids=[this_dlp_engines.id],
))
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
thisDLPEngines, err := zia.LookupDLPEngines(ctx, &zia.LookupDLPEnginesArgs{
PredefinedEngineName: pulumi.StringRef("EXTERNAL"),
}, nil)
if err != nil {
return err
}
_, err = zia.NewDLPWebRules(ctx, "thisDLPWebRules", &zia.DLPWebRulesArgs{
Description: pulumi.String("Example"),
Action: pulumi.String("BLOCK"),
Order: pulumi.Int(1),
Rank: pulumi.Int(7),
State: pulumi.String("ENABLED"),
Protocols: pulumi.StringArray{
pulumi.String("FTP_RULE"),
pulumi.String("HTTPS_RULE"),
pulumi.String("HTTP_RULE"),
},
FileTypes: pulumi.StringArray{
pulumi.String("ALL_OUTBOUND"),
},
ZscalerIncidentReceiver: pulumi.Bool(true),
WithoutContentInspection: pulumi.Bool(false),
UserRiskScoreLevels: pulumi.StringArray{
pulumi.String("LOW"),
pulumi.String("MEDIUM"),
pulumi.String("HIGH"),
pulumi.String("CRITICAL"),
},
Severity: pulumi.String("RULE_SEVERITY_HIGH"),
DlpEngines: &zia.DLPWebRulesDlpEnginesArgs{
Ids: pulumi.IntArray{
pulumi.Int(thisDLPEngines.Id),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var thisDLPEngines = Zia.GetDLPEngines.Invoke(new()
{
PredefinedEngineName = "EXTERNAL",
});
var thisDLPWebRules = new Zia.DLPWebRules("thisDLPWebRules", new()
{
Description = "Example",
Action = "BLOCK",
Order = 1,
Rank = 7,
State = "ENABLED",
Protocols = new[]
{
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
},
FileTypes = new[]
{
"ALL_OUTBOUND",
},
ZscalerIncidentReceiver = true,
WithoutContentInspection = false,
UserRiskScoreLevels = new[]
{
"LOW",
"MEDIUM",
"HIGH",
"CRITICAL",
},
Severity = "RULE_SEVERITY_HIGH",
DlpEngines = new Zia.Inputs.DLPWebRulesDlpEnginesArgs
{
Ids = new[]
{
thisDLPEngines.Apply(getDLPEnginesResult => getDLPEnginesResult.Id),
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetDLPEnginesArgs;
import com.pulumi.zia.DLPWebRules;
import com.pulumi.zia.DLPWebRulesArgs;
import com.pulumi.zia.inputs.DLPWebRulesDlpEnginesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var thisDLPEngines = ZiaFunctions.getDLPEngines(GetDLPEnginesArgs.builder()
.predefinedEngineName("EXTERNAL")
.build());
var thisDLPWebRules = new DLPWebRules("thisDLPWebRules", DLPWebRulesArgs.builder()
.description("Example")
.action("BLOCK")
.order(1)
.rank(7)
.state("ENABLED")
.protocols(
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE")
.fileTypes("ALL_OUTBOUND")
.zscalerIncidentReceiver(true)
.withoutContentInspection(false)
.userRiskScoreLevels(
"LOW",
"MEDIUM",
"HIGH",
"CRITICAL")
.severity("RULE_SEVERITY_HIGH")
.dlpEngines(DLPWebRulesDlpEnginesArgs.builder()
.ids(thisDLPEngines.applyValue(getDLPEnginesResult -> getDLPEnginesResult.id()))
.build())
.build());
}
}
resources:
thisDLPWebRules:
type: zia:DLPWebRules
properties:
description: Example
action: BLOCK
order: 1
rank: 7
state: ENABLED
# ocr_enabled = true
protocols:
- FTP_RULE
- HTTPS_RULE
- HTTP_RULE
fileTypes:
- ALL_OUTBOUND
zscalerIncidentReceiver: true
withoutContentInspection: false
userRiskScoreLevels:
- LOW
- MEDIUM
- HIGH
- CRITICAL
severity: RULE_SEVERITY_HIGH
dlpEngines:
ids:
- ${thisDLPEngines.id}
variables:
thisDLPEngines:
fn::invoke:
Function: zia:getDLPEngines
Arguments:
predefinedEngineName: EXTERNAL
Create DLPWebRules Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new DLPWebRules(name: string, args?: DLPWebRulesArgs, opts?: CustomResourceOptions);
@overload
def DLPWebRules(resource_name: str,
args: Optional[DLPWebRulesArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def DLPWebRules(resource_name: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
auditor: Optional[DLPWebRulesAuditorArgs] = None,
cloud_applications: Optional[Sequence[str]] = None,
departments: Optional[DLPWebRulesDepartmentsArgs] = None,
description: Optional[str] = None,
dlp_download_scan_enabled: Optional[bool] = None,
dlp_engines: Optional[DLPWebRulesDlpEnginesArgs] = None,
excluded_departments: Optional[DLPWebRulesExcludedDepartmentsArgs] = None,
excluded_groups: Optional[DLPWebRulesExcludedGroupsArgs] = None,
excluded_users: Optional[DLPWebRulesExcludedUsersArgs] = None,
external_auditor_email: Optional[str] = None,
file_types: Optional[Sequence[str]] = None,
groups: Optional[DLPWebRulesGroupsArgs] = None,
icap_server: Optional[DLPWebRulesIcapServerArgs] = None,
labels: Optional[DLPWebRulesLabelsArgs] = None,
location_groups: Optional[DLPWebRulesLocationGroupsArgs] = None,
locations: Optional[DLPWebRulesLocationsArgs] = None,
match_only: Optional[bool] = None,
min_size: Optional[int] = None,
name: Optional[str] = None,
notification_template: Optional[DLPWebRulesNotificationTemplateArgs] = None,
ocr_enabled: Optional[bool] = None,
order: Optional[int] = None,
parent_rule: Optional[int] = None,
protocols: Optional[Sequence[str]] = None,
rank: Optional[int] = None,
severity: Optional[str] = None,
state: Optional[str] = None,
sub_rules: Optional[Sequence[str]] = None,
time_windows: Optional[DLPWebRulesTimeWindowsArgs] = None,
url_categories: Optional[DLPWebRulesUrlCategoriesArgs] = None,
user_risk_score_levels: Optional[Sequence[str]] = None,
users: Optional[DLPWebRulesUsersArgs] = None,
without_content_inspection: Optional[bool] = None,
workload_groups: Optional[Sequence[DLPWebRulesWorkloadGroupArgs]] = None,
zcc_notifications_enabled: Optional[bool] = None,
zscaler_incident_receiver: Optional[bool] = None)
func NewDLPWebRules(ctx *Context, name string, args *DLPWebRulesArgs, opts ...ResourceOption) (*DLPWebRules, error)
public DLPWebRules(string name, DLPWebRulesArgs? args = null, CustomResourceOptions? opts = null)
public DLPWebRules(String name, DLPWebRulesArgs args)
public DLPWebRules(String name, DLPWebRulesArgs args, CustomResourceOptions options)
type: zia:DLPWebRules
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args DLPWebRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args DLPWebRulesArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args DLPWebRulesArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args DLPWebRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args DLPWebRulesArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var dlpwebRulesResource = new Zia.DLPWebRules("dlpwebRulesResource", new()
{
Action = "string",
Auditor = new Zia.Inputs.DLPWebRulesAuditorArgs
{
Id = 0,
},
CloudApplications = new[]
{
"string",
},
Departments = new Zia.Inputs.DLPWebRulesDepartmentsArgs
{
Ids = new[]
{
0,
},
},
Description = "string",
DlpDownloadScanEnabled = false,
DlpEngines = new Zia.Inputs.DLPWebRulesDlpEnginesArgs
{
Ids = new[]
{
0,
},
},
ExcludedDepartments = new Zia.Inputs.DLPWebRulesExcludedDepartmentsArgs
{
Ids = new[]
{
0,
},
},
ExcludedGroups = new Zia.Inputs.DLPWebRulesExcludedGroupsArgs
{
Ids = new[]
{
0,
},
},
ExcludedUsers = new Zia.Inputs.DLPWebRulesExcludedUsersArgs
{
Ids = new[]
{
0,
},
},
ExternalAuditorEmail = "string",
FileTypes = new[]
{
"string",
},
Groups = new Zia.Inputs.DLPWebRulesGroupsArgs
{
Ids = new[]
{
0,
},
},
IcapServer = new Zia.Inputs.DLPWebRulesIcapServerArgs
{
Id = 0,
},
Labels = new Zia.Inputs.DLPWebRulesLabelsArgs
{
Id = 0,
},
LocationGroups = new Zia.Inputs.DLPWebRulesLocationGroupsArgs
{
Ids = new[]
{
0,
},
},
Locations = new Zia.Inputs.DLPWebRulesLocationsArgs
{
Ids = new[]
{
0,
},
},
MatchOnly = false,
MinSize = 0,
Name = "string",
NotificationTemplate = new Zia.Inputs.DLPWebRulesNotificationTemplateArgs
{
Id = 0,
},
OcrEnabled = false,
Order = 0,
ParentRule = 0,
Protocols = new[]
{
"string",
},
Rank = 0,
Severity = "string",
State = "string",
SubRules = new[]
{
"string",
},
TimeWindows = new Zia.Inputs.DLPWebRulesTimeWindowsArgs
{
Ids = new[]
{
0,
},
},
UrlCategories = new Zia.Inputs.DLPWebRulesUrlCategoriesArgs
{
Ids = new[]
{
0,
},
},
UserRiskScoreLevels = new[]
{
"string",
},
Users = new Zia.Inputs.DLPWebRulesUsersArgs
{
Ids = new[]
{
0,
},
},
WithoutContentInspection = false,
WorkloadGroups = new[]
{
new Zia.Inputs.DLPWebRulesWorkloadGroupArgs
{
Id = 0,
Name = "string",
},
},
ZccNotificationsEnabled = false,
ZscalerIncidentReceiver = false,
});
example, err := zia.NewDLPWebRules(ctx, "dlpwebRulesResource", &zia.DLPWebRulesArgs{
Action: pulumi.String("string"),
Auditor: &zia.DLPWebRulesAuditorArgs{
Id: pulumi.Int(0),
},
CloudApplications: pulumi.StringArray{
pulumi.String("string"),
},
Departments: &zia.DLPWebRulesDepartmentsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Description: pulumi.String("string"),
DlpDownloadScanEnabled: pulumi.Bool(false),
DlpEngines: &zia.DLPWebRulesDlpEnginesArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ExcludedDepartments: &zia.DLPWebRulesExcludedDepartmentsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ExcludedGroups: &zia.DLPWebRulesExcludedGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ExcludedUsers: &zia.DLPWebRulesExcludedUsersArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ExternalAuditorEmail: pulumi.String("string"),
FileTypes: pulumi.StringArray{
pulumi.String("string"),
},
Groups: &zia.DLPWebRulesGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
IcapServer: &zia.DLPWebRulesIcapServerArgs{
Id: pulumi.Int(0),
},
Labels: &zia.DLPWebRulesLabelsArgs{
Id: pulumi.Int(0),
},
LocationGroups: &zia.DLPWebRulesLocationGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Locations: &zia.DLPWebRulesLocationsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
MatchOnly: pulumi.Bool(false),
MinSize: pulumi.Int(0),
Name: pulumi.String("string"),
NotificationTemplate: &zia.DLPWebRulesNotificationTemplateArgs{
Id: pulumi.Int(0),
},
OcrEnabled: pulumi.Bool(false),
Order: pulumi.Int(0),
ParentRule: pulumi.Int(0),
Protocols: pulumi.StringArray{
pulumi.String("string"),
},
Rank: pulumi.Int(0),
Severity: pulumi.String("string"),
State: pulumi.String("string"),
SubRules: pulumi.StringArray{
pulumi.String("string"),
},
TimeWindows: &zia.DLPWebRulesTimeWindowsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
UrlCategories: &zia.DLPWebRulesUrlCategoriesArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
UserRiskScoreLevels: pulumi.StringArray{
pulumi.String("string"),
},
Users: &zia.DLPWebRulesUsersArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
WithoutContentInspection: pulumi.Bool(false),
WorkloadGroups: zia.DLPWebRulesWorkloadGroupArray{
&zia.DLPWebRulesWorkloadGroupArgs{
Id: pulumi.Int(0),
Name: pulumi.String("string"),
},
},
ZccNotificationsEnabled: pulumi.Bool(false),
ZscalerIncidentReceiver: pulumi.Bool(false),
})
var dlpwebRulesResource = new DLPWebRules("dlpwebRulesResource", DLPWebRulesArgs.builder()
.action("string")
.auditor(DLPWebRulesAuditorArgs.builder()
.id(0)
.build())
.cloudApplications("string")
.departments(DLPWebRulesDepartmentsArgs.builder()
.ids(0)
.build())
.description("string")
.dlpDownloadScanEnabled(false)
.dlpEngines(DLPWebRulesDlpEnginesArgs.builder()
.ids(0)
.build())
.excludedDepartments(DLPWebRulesExcludedDepartmentsArgs.builder()
.ids(0)
.build())
.excludedGroups(DLPWebRulesExcludedGroupsArgs.builder()
.ids(0)
.build())
.excludedUsers(DLPWebRulesExcludedUsersArgs.builder()
.ids(0)
.build())
.externalAuditorEmail("string")
.fileTypes("string")
.groups(DLPWebRulesGroupsArgs.builder()
.ids(0)
.build())
.icapServer(DLPWebRulesIcapServerArgs.builder()
.id(0)
.build())
.labels(DLPWebRulesLabelsArgs.builder()
.id(0)
.build())
.locationGroups(DLPWebRulesLocationGroupsArgs.builder()
.ids(0)
.build())
.locations(DLPWebRulesLocationsArgs.builder()
.ids(0)
.build())
.matchOnly(false)
.minSize(0)
.name("string")
.notificationTemplate(DLPWebRulesNotificationTemplateArgs.builder()
.id(0)
.build())
.ocrEnabled(false)
.order(0)
.parentRule(0)
.protocols("string")
.rank(0)
.severity("string")
.state("string")
.subRules("string")
.timeWindows(DLPWebRulesTimeWindowsArgs.builder()
.ids(0)
.build())
.urlCategories(DLPWebRulesUrlCategoriesArgs.builder()
.ids(0)
.build())
.userRiskScoreLevels("string")
.users(DLPWebRulesUsersArgs.builder()
.ids(0)
.build())
.withoutContentInspection(false)
.workloadGroups(DLPWebRulesWorkloadGroupArgs.builder()
.id(0)
.name("string")
.build())
.zccNotificationsEnabled(false)
.zscalerIncidentReceiver(false)
.build());
dlpweb_rules_resource = zia.DLPWebRules("dlpwebRulesResource",
action="string",
auditor=zia.DLPWebRulesAuditorArgs(
id=0,
),
cloud_applications=["string"],
departments=zia.DLPWebRulesDepartmentsArgs(
ids=[0],
),
description="string",
dlp_download_scan_enabled=False,
dlp_engines=zia.DLPWebRulesDlpEnginesArgs(
ids=[0],
),
excluded_departments=zia.DLPWebRulesExcludedDepartmentsArgs(
ids=[0],
),
excluded_groups=zia.DLPWebRulesExcludedGroupsArgs(
ids=[0],
),
excluded_users=zia.DLPWebRulesExcludedUsersArgs(
ids=[0],
),
external_auditor_email="string",
file_types=["string"],
groups=zia.DLPWebRulesGroupsArgs(
ids=[0],
),
icap_server=zia.DLPWebRulesIcapServerArgs(
id=0,
),
labels=zia.DLPWebRulesLabelsArgs(
id=0,
),
location_groups=zia.DLPWebRulesLocationGroupsArgs(
ids=[0],
),
locations=zia.DLPWebRulesLocationsArgs(
ids=[0],
),
match_only=False,
min_size=0,
name="string",
notification_template=zia.DLPWebRulesNotificationTemplateArgs(
id=0,
),
ocr_enabled=False,
order=0,
parent_rule=0,
protocols=["string"],
rank=0,
severity="string",
state="string",
sub_rules=["string"],
time_windows=zia.DLPWebRulesTimeWindowsArgs(
ids=[0],
),
url_categories=zia.DLPWebRulesUrlCategoriesArgs(
ids=[0],
),
user_risk_score_levels=["string"],
users=zia.DLPWebRulesUsersArgs(
ids=[0],
),
without_content_inspection=False,
workload_groups=[zia.DLPWebRulesWorkloadGroupArgs(
id=0,
name="string",
)],
zcc_notifications_enabled=False,
zscaler_incident_receiver=False)
const dlpwebRulesResource = new zia.DLPWebRules("dlpwebRulesResource", {
action: "string",
auditor: {
id: 0,
},
cloudApplications: ["string"],
departments: {
ids: [0],
},
description: "string",
dlpDownloadScanEnabled: false,
dlpEngines: {
ids: [0],
},
excludedDepartments: {
ids: [0],
},
excludedGroups: {
ids: [0],
},
excludedUsers: {
ids: [0],
},
externalAuditorEmail: "string",
fileTypes: ["string"],
groups: {
ids: [0],
},
icapServer: {
id: 0,
},
labels: {
id: 0,
},
locationGroups: {
ids: [0],
},
locations: {
ids: [0],
},
matchOnly: false,
minSize: 0,
name: "string",
notificationTemplate: {
id: 0,
},
ocrEnabled: false,
order: 0,
parentRule: 0,
protocols: ["string"],
rank: 0,
severity: "string",
state: "string",
subRules: ["string"],
timeWindows: {
ids: [0],
},
urlCategories: {
ids: [0],
},
userRiskScoreLevels: ["string"],
users: {
ids: [0],
},
withoutContentInspection: false,
workloadGroups: [{
id: 0,
name: "string",
}],
zccNotificationsEnabled: false,
zscalerIncidentReceiver: false,
});
type: zia:DLPWebRules
properties:
action: string
auditor:
id: 0
cloudApplications:
- string
departments:
ids:
- 0
description: string
dlpDownloadScanEnabled: false
dlpEngines:
ids:
- 0
excludedDepartments:
ids:
- 0
excludedGroups:
ids:
- 0
excludedUsers:
ids:
- 0
externalAuditorEmail: string
fileTypes:
- string
groups:
ids:
- 0
icapServer:
id: 0
labels:
id: 0
locationGroups:
ids:
- 0
locations:
ids:
- 0
matchOnly: false
minSize: 0
name: string
notificationTemplate:
id: 0
ocrEnabled: false
order: 0
parentRule: 0
protocols:
- string
rank: 0
severity: string
state: string
subRules:
- string
timeWindows:
ids:
- 0
urlCategories:
ids:
- 0
userRiskScoreLevels:
- string
users:
ids:
- 0
withoutContentInspection: false
workloadGroups:
- id: 0
name: string
zccNotificationsEnabled: false
zscalerIncidentReceiver: false
DLPWebRules Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The DLPWebRules resource accepts the following input properties:
- Action string
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- Auditor
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Auditor - The auditor to which the DLP policy rule must be applied.
- Cloud
Applications List<string> - The list of cloud applications to which the DLP policy rule must be applied.
- Departments
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Departments - The name-ID pairs of the departments that are excluded from the DLP policy rule.
- Description string
- The description of the DLP policy rule.
- Dlp
Download boolScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Dlp
Engines zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- Excluded
Departments zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Departments - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - Excluded
Groups zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Groups - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - Excluded
Users zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Users - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - External
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- File
Types List<string> The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- Groups
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - Icap
Server zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Icap Server - The DLP server, using ICAP, to which the transaction content is forwarded.
- Labels
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Labels - The Name-ID pairs of rule labels associated to the DLP policy rule.
- Location
Groups zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - Locations
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - Match
Only bool - The match only criteria for DLP engines.
- Min
Size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- Name string
- The name of the workload group
- Notification
Template zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Notification Template - The template used for DLP notification emails.
- Ocr
Enabled bool - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- Order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- Parent
Rule int The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- Protocols List<string>
- The protocol criteria specified for the DLP policy rule.
- Rank int
- Admin rank of the admin who creates this rule
- Severity string
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- State string
- Enables or disables the DLP policy rule.. The supported values are:
- Sub
Rules List<string> The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- Time
Windows zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Time Windows - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - Url
Categories zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- User
Risk List<string>Score Levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- Users
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - Without
Content boolInspection - must be set to false if
file_types
is not defined. - Workload
Groups List<zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Workload Group> - The list of preconfigured workload groups to which the policy must be applied
- Zcc
Notifications boolEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Zscaler
Incident boolReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- Action string
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- Auditor
DLPWeb
Rules Auditor Args - The auditor to which the DLP policy rule must be applied.
- Cloud
Applications []string - The list of cloud applications to which the DLP policy rule must be applied.
- Departments
DLPWeb
Rules Departments Args - The name-ID pairs of the departments that are excluded from the DLP policy rule.
- Description string
- The description of the DLP policy rule.
- Dlp
Download boolScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Dlp
Engines DLPWebRules Dlp Engines Args - The list of DLP engines to which the DLP policy rule must be applied.
- Excluded
Departments DLPWebRules Excluded Departments Args - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - Excluded
Groups DLPWebRules Excluded Groups Args - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - Excluded
Users DLPWebRules Excluded Users Args - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - External
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- File
Types []string The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- Groups
DLPWeb
Rules Groups Args - The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - Icap
Server DLPWebRules Icap Server Args - The DLP server, using ICAP, to which the transaction content is forwarded.
- Labels
DLPWeb
Rules Labels Args - The Name-ID pairs of rule labels associated to the DLP policy rule.
- Location
Groups DLPWebRules Location Groups Args - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - Locations
DLPWeb
Rules Locations Args - The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - Match
Only bool - The match only criteria for DLP engines.
- Min
Size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- Name string
- The name of the workload group
- Notification
Template DLPWebRules Notification Template Args - The template used for DLP notification emails.
- Ocr
Enabled bool - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- Order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- Parent
Rule int The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- Protocols []string
- The protocol criteria specified for the DLP policy rule.
- Rank int
- Admin rank of the admin who creates this rule
- Severity string
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- State string
- Enables or disables the DLP policy rule.. The supported values are:
- Sub
Rules []string The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- Time
Windows DLPWebRules Time Windows Args - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - Url
Categories DLPWebRules Url Categories Args - The list of URL categories to which the DLP policy rule must be applied.
- User
Risk []stringScore Levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- Users
DLPWeb
Rules Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - Without
Content boolInspection - must be set to false if
file_types
is not defined. - Workload
Groups []DLPWebRules Workload Group Args - The list of preconfigured workload groups to which the policy must be applied
- Zcc
Notifications boolEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Zscaler
Incident boolReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action String
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- auditor
DLPWeb
Rules Auditor - The auditor to which the DLP policy rule must be applied.
- cloud
Applications List<String> - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments - The name-ID pairs of the departments that are excluded from the DLP policy rule.
- description String
- The description of the DLP policy rule.
- dlp
Download BooleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines DLPWebRules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments DLPWebRules Excluded Departments - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - excluded
Groups DLPWebRules Excluded Groups - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - excluded
Users DLPWebRules Excluded Users - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - external
Auditor StringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types List<String> The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- groups
DLPWeb
Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - icap
Server DLPWebRules Icap Server - The DLP server, using ICAP, to which the transaction content is forwarded.
- labels
DLPWeb
Rules Labels - The Name-ID pairs of rule labels associated to the DLP policy rule.
- location
Groups DLPWebRules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
DLPWeb
Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - match
Only Boolean - The match only criteria for DLP engines.
- min
Size Integer - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name String
- The name of the workload group
- notification
Template DLPWebRules Notification Template - The template used for DLP notification emails.
- ocr
Enabled Boolean - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- order Integer
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule Integer The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- protocols List<String>
- The protocol criteria specified for the DLP policy rule.
- rank Integer
- Admin rank of the admin who creates this rule
- severity String
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- state String
- Enables or disables the DLP policy rule.. The supported values are:
- sub
Rules List<String> The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- time
Windows DLPWebRules Time Windows - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - url
Categories DLPWebRules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk List<String>Score Levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- users
DLPWeb
Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - without
Content BooleanInspection - must be set to false if
file_types
is not defined. - workload
Groups List<DLPWebRules Workload Group> - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications BooleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident BooleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action string
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- auditor
DLPWeb
Rules Auditor - The auditor to which the DLP policy rule must be applied.
- cloud
Applications string[] - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments - The name-ID pairs of the departments that are excluded from the DLP policy rule.
- description string
- The description of the DLP policy rule.
- dlp
Download booleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines DLPWebRules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments DLPWebRules Excluded Departments - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - excluded
Groups DLPWebRules Excluded Groups - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - excluded
Users DLPWebRules Excluded Users - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - external
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types string[] The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- groups
DLPWeb
Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - icap
Server DLPWebRules Icap Server - The DLP server, using ICAP, to which the transaction content is forwarded.
- labels
DLPWeb
Rules Labels - The Name-ID pairs of rule labels associated to the DLP policy rule.
- location
Groups DLPWebRules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
DLPWeb
Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - match
Only boolean - The match only criteria for DLP engines.
- min
Size number - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name string
- The name of the workload group
- notification
Template DLPWebRules Notification Template - The template used for DLP notification emails.
- ocr
Enabled boolean - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- order number
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule number The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- protocols string[]
- The protocol criteria specified for the DLP policy rule.
- rank number
- Admin rank of the admin who creates this rule
- severity string
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- state string
- Enables or disables the DLP policy rule.. The supported values are:
- sub
Rules string[] The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- time
Windows DLPWebRules Time Windows - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - url
Categories DLPWebRules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk string[]Score Levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- users
DLPWeb
Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - without
Content booleanInspection - must be set to false if
file_types
is not defined. - workload
Groups DLPWebRules Workload Group[] - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications booleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident booleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action str
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- auditor
DLPWeb
Rules Auditor Args - The auditor to which the DLP policy rule must be applied.
- cloud_
applications Sequence[str] - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments Args - The name-ID pairs of the departments that are excluded from the DLP policy rule.
- description str
- The description of the DLP policy rule.
- dlp_
download_ boolscan_ enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp_
engines DLPWebRules Dlp Engines Args - The list of DLP engines to which the DLP policy rule must be applied.
- excluded_
departments DLPWebRules Excluded Departments Args - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - excluded_
groups DLPWebRules Excluded Groups Args - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - excluded_
users DLPWebRules Excluded Users Args - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - external_
auditor_ stremail - The email address of an external auditor to whom DLP email notifications are sent.
- file_
types Sequence[str] The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- groups
DLPWeb
Rules Groups Args - The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - icap_
server DLPWebRules Icap Server Args - The DLP server, using ICAP, to which the transaction content is forwarded.
- labels
DLPWeb
Rules Labels Args - The Name-ID pairs of rule labels associated to the DLP policy rule.
- location_
groups DLPWebRules Location Groups Args - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
DLPWeb
Rules Locations Args - The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - match_
only bool - The match only criteria for DLP engines.
- min_
size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name str
- The name of the workload group
- notification_
template DLPWebRules Notification Template Args - The template used for DLP notification emails.
- ocr_
enabled bool - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent_
rule int The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- protocols Sequence[str]
- The protocol criteria specified for the DLP policy rule.
- rank int
- Admin rank of the admin who creates this rule
- severity str
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- state str
- Enables or disables the DLP policy rule.. The supported values are:
- sub_
rules Sequence[str] The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- time_
windows DLPWebRules Time Windows Args - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - url_
categories DLPWebRules Url Categories Args - The list of URL categories to which the DLP policy rule must be applied.
- user_
risk_ Sequence[str]score_ levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- users
DLPWeb
Rules Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - without_
content_ boolinspection - must be set to false if
file_types
is not defined. - workload_
groups Sequence[DLPWebRules Workload Group Args] - The list of preconfigured workload groups to which the policy must be applied
- zcc_
notifications_ boolenabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler_
incident_ boolreceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action String
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- auditor Property Map
- The auditor to which the DLP policy rule must be applied.
- cloud
Applications List<String> - The list of cloud applications to which the DLP policy rule must be applied.
- departments Property Map
- The name-ID pairs of the departments that are excluded from the DLP policy rule.
- description String
- The description of the DLP policy rule.
- dlp
Download BooleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines Property Map - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments Property Map - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - excluded
Groups Property Map - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - excluded
Users Property Map - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - external
Auditor StringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types List<String> The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- groups Property Map
- The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - icap
Server Property Map - The DLP server, using ICAP, to which the transaction content is forwarded.
- labels Property Map
- The Name-ID pairs of rule labels associated to the DLP policy rule.
- location
Groups Property Map - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations Property Map
- The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - match
Only Boolean - The match only criteria for DLP engines.
- min
Size Number - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name String
- The name of the workload group
- notification
Template Property Map - The template used for DLP notification emails.
- ocr
Enabled Boolean - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- order Number
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule Number The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- protocols List<String>
- The protocol criteria specified for the DLP policy rule.
- rank Number
- Admin rank of the admin who creates this rule
- severity String
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- state String
- Enables or disables the DLP policy rule.. The supported values are:
- sub
Rules List<String> The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- time
Windows Property Map - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - url
Categories Property Map - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk List<String>Score Levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- users Property Map
- The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - without
Content BooleanInspection - must be set to false if
file_types
is not defined. - workload
Groups List<Property Map> - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications BooleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident BooleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
Outputs
All input properties are implicitly available as output properties. Additionally, the DLPWebRules resource produces the following output properties:
Look up Existing DLPWebRules Resource
Get an existing DLPWebRules resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: DLPWebRulesState, opts?: CustomResourceOptions): DLPWebRules
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
auditor: Optional[DLPWebRulesAuditorArgs] = None,
cloud_applications: Optional[Sequence[str]] = None,
departments: Optional[DLPWebRulesDepartmentsArgs] = None,
description: Optional[str] = None,
dlp_download_scan_enabled: Optional[bool] = None,
dlp_engines: Optional[DLPWebRulesDlpEnginesArgs] = None,
excluded_departments: Optional[DLPWebRulesExcludedDepartmentsArgs] = None,
excluded_groups: Optional[DLPWebRulesExcludedGroupsArgs] = None,
excluded_users: Optional[DLPWebRulesExcludedUsersArgs] = None,
external_auditor_email: Optional[str] = None,
file_types: Optional[Sequence[str]] = None,
groups: Optional[DLPWebRulesGroupsArgs] = None,
icap_server: Optional[DLPWebRulesIcapServerArgs] = None,
labels: Optional[DLPWebRulesLabelsArgs] = None,
location_groups: Optional[DLPWebRulesLocationGroupsArgs] = None,
locations: Optional[DLPWebRulesLocationsArgs] = None,
match_only: Optional[bool] = None,
min_size: Optional[int] = None,
name: Optional[str] = None,
notification_template: Optional[DLPWebRulesNotificationTemplateArgs] = None,
ocr_enabled: Optional[bool] = None,
order: Optional[int] = None,
parent_rule: Optional[int] = None,
protocols: Optional[Sequence[str]] = None,
rank: Optional[int] = None,
rule_id: Optional[int] = None,
severity: Optional[str] = None,
state: Optional[str] = None,
sub_rules: Optional[Sequence[str]] = None,
time_windows: Optional[DLPWebRulesTimeWindowsArgs] = None,
url_categories: Optional[DLPWebRulesUrlCategoriesArgs] = None,
user_risk_score_levels: Optional[Sequence[str]] = None,
users: Optional[DLPWebRulesUsersArgs] = None,
without_content_inspection: Optional[bool] = None,
workload_groups: Optional[Sequence[DLPWebRulesWorkloadGroupArgs]] = None,
zcc_notifications_enabled: Optional[bool] = None,
zscaler_incident_receiver: Optional[bool] = None) -> DLPWebRules
func GetDLPWebRules(ctx *Context, name string, id IDInput, state *DLPWebRulesState, opts ...ResourceOption) (*DLPWebRules, error)
public static DLPWebRules Get(string name, Input<string> id, DLPWebRulesState? state, CustomResourceOptions? opts = null)
public static DLPWebRules get(String name, Output<String> id, DLPWebRulesState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- Auditor
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Auditor - The auditor to which the DLP policy rule must be applied.
- Cloud
Applications List<string> - The list of cloud applications to which the DLP policy rule must be applied.
- Departments
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Departments - The name-ID pairs of the departments that are excluded from the DLP policy rule.
- Description string
- The description of the DLP policy rule.
- Dlp
Download boolScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Dlp
Engines zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- Excluded
Departments zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Departments - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - Excluded
Groups zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Groups - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - Excluded
Users zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Users - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - External
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- File
Types List<string> The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- Groups
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - Icap
Server zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Icap Server - The DLP server, using ICAP, to which the transaction content is forwarded.
- Labels
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Labels - The Name-ID pairs of rule labels associated to the DLP policy rule.
- Location
Groups zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - Locations
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - Match
Only bool - The match only criteria for DLP engines.
- Min
Size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- Name string
- The name of the workload group
- Notification
Template zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Notification Template - The template used for DLP notification emails.
- Ocr
Enabled bool - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- Order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- Parent
Rule int The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- Protocols List<string>
- The protocol criteria specified for the DLP policy rule.
- Rank int
- Admin rank of the admin who creates this rule
- Rule
Id int - Severity string
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- State string
- Enables or disables the DLP policy rule.. The supported values are:
- Sub
Rules List<string> The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- Time
Windows zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Time Windows - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - Url
Categories zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- User
Risk List<string>Score Levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- Users
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - Without
Content boolInspection - must be set to false if
file_types
is not defined. - Workload
Groups List<zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Workload Group> - The list of preconfigured workload groups to which the policy must be applied
- Zcc
Notifications boolEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Zscaler
Incident boolReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- Action string
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- Auditor
DLPWeb
Rules Auditor Args - The auditor to which the DLP policy rule must be applied.
- Cloud
Applications []string - The list of cloud applications to which the DLP policy rule must be applied.
- Departments
DLPWeb
Rules Departments Args - The name-ID pairs of the departments that are excluded from the DLP policy rule.
- Description string
- The description of the DLP policy rule.
- Dlp
Download boolScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Dlp
Engines DLPWebRules Dlp Engines Args - The list of DLP engines to which the DLP policy rule must be applied.
- Excluded
Departments DLPWebRules Excluded Departments Args - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - Excluded
Groups DLPWebRules Excluded Groups Args - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - Excluded
Users DLPWebRules Excluded Users Args - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - External
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- File
Types []string The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- Groups
DLPWeb
Rules Groups Args - The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - Icap
Server DLPWebRules Icap Server Args - The DLP server, using ICAP, to which the transaction content is forwarded.
- Labels
DLPWeb
Rules Labels Args - The Name-ID pairs of rule labels associated to the DLP policy rule.
- Location
Groups DLPWebRules Location Groups Args - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - Locations
DLPWeb
Rules Locations Args - The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - Match
Only bool - The match only criteria for DLP engines.
- Min
Size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- Name string
- The name of the workload group
- Notification
Template DLPWebRules Notification Template Args - The template used for DLP notification emails.
- Ocr
Enabled bool - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- Order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- Parent
Rule int The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- Protocols []string
- The protocol criteria specified for the DLP policy rule.
- Rank int
- Admin rank of the admin who creates this rule
- Rule
Id int - Severity string
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- State string
- Enables or disables the DLP policy rule.. The supported values are:
- Sub
Rules []string The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- Time
Windows DLPWebRules Time Windows Args - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - Url
Categories DLPWebRules Url Categories Args - The list of URL categories to which the DLP policy rule must be applied.
- User
Risk []stringScore Levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- Users
DLPWeb
Rules Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - Without
Content boolInspection - must be set to false if
file_types
is not defined. - Workload
Groups []DLPWebRules Workload Group Args - The list of preconfigured workload groups to which the policy must be applied
- Zcc
Notifications boolEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Zscaler
Incident boolReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action String
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- auditor
DLPWeb
Rules Auditor - The auditor to which the DLP policy rule must be applied.
- cloud
Applications List<String> - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments - The name-ID pairs of the departments that are excluded from the DLP policy rule.
- description String
- The description of the DLP policy rule.
- dlp
Download BooleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines DLPWebRules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments DLPWebRules Excluded Departments - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - excluded
Groups DLPWebRules Excluded Groups - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - excluded
Users DLPWebRules Excluded Users - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - external
Auditor StringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types List<String> The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- groups
DLPWeb
Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - icap
Server DLPWebRules Icap Server - The DLP server, using ICAP, to which the transaction content is forwarded.
- labels
DLPWeb
Rules Labels - The Name-ID pairs of rule labels associated to the DLP policy rule.
- location
Groups DLPWebRules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
DLPWeb
Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - match
Only Boolean - The match only criteria for DLP engines.
- min
Size Integer - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name String
- The name of the workload group
- notification
Template DLPWebRules Notification Template - The template used for DLP notification emails.
- ocr
Enabled Boolean - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- order Integer
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule Integer The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- protocols List<String>
- The protocol criteria specified for the DLP policy rule.
- rank Integer
- Admin rank of the admin who creates this rule
- rule
Id Integer - severity String
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- state String
- Enables or disables the DLP policy rule.. The supported values are:
- sub
Rules List<String> The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- time
Windows DLPWebRules Time Windows - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - url
Categories DLPWebRules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk List<String>Score Levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- users
DLPWeb
Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - without
Content BooleanInspection - must be set to false if
file_types
is not defined. - workload
Groups List<DLPWebRules Workload Group> - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications BooleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident BooleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action string
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- auditor
DLPWeb
Rules Auditor - The auditor to which the DLP policy rule must be applied.
- cloud
Applications string[] - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments - The name-ID pairs of the departments that are excluded from the DLP policy rule.
- description string
- The description of the DLP policy rule.
- dlp
Download booleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines DLPWebRules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments DLPWebRules Excluded Departments - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - excluded
Groups DLPWebRules Excluded Groups - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - excluded
Users DLPWebRules Excluded Users - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - external
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types string[] The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- groups
DLPWeb
Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - icap
Server DLPWebRules Icap Server - The DLP server, using ICAP, to which the transaction content is forwarded.
- labels
DLPWeb
Rules Labels - The Name-ID pairs of rule labels associated to the DLP policy rule.
- location
Groups DLPWebRules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
DLPWeb
Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - match
Only boolean - The match only criteria for DLP engines.
- min
Size number - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name string
- The name of the workload group
- notification
Template DLPWebRules Notification Template - The template used for DLP notification emails.
- ocr
Enabled boolean - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- order number
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule number The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- protocols string[]
- The protocol criteria specified for the DLP policy rule.
- rank number
- Admin rank of the admin who creates this rule
- rule
Id number - severity string
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- state string
- Enables or disables the DLP policy rule.. The supported values are:
- sub
Rules string[] The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- time
Windows DLPWebRules Time Windows - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - url
Categories DLPWebRules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk string[]Score Levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- users
DLPWeb
Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - without
Content booleanInspection - must be set to false if
file_types
is not defined. - workload
Groups DLPWebRules Workload Group[] - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications booleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident booleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action str
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- auditor
DLPWeb
Rules Auditor Args - The auditor to which the DLP policy rule must be applied.
- cloud_
applications Sequence[str] - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments Args - The name-ID pairs of the departments that are excluded from the DLP policy rule.
- description str
- The description of the DLP policy rule.
- dlp_
download_ boolscan_ enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp_
engines DLPWebRules Dlp Engines Args - The list of DLP engines to which the DLP policy rule must be applied.
- excluded_
departments DLPWebRules Excluded Departments Args - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - excluded_
groups DLPWebRules Excluded Groups Args - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - excluded_
users DLPWebRules Excluded Users Args - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - external_
auditor_ stremail - The email address of an external auditor to whom DLP email notifications are sent.
- file_
types Sequence[str] The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- groups
DLPWeb
Rules Groups Args - The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - icap_
server DLPWebRules Icap Server Args - The DLP server, using ICAP, to which the transaction content is forwarded.
- labels
DLPWeb
Rules Labels Args - The Name-ID pairs of rule labels associated to the DLP policy rule.
- location_
groups DLPWebRules Location Groups Args - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
DLPWeb
Rules Locations Args - The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - match_
only bool - The match only criteria for DLP engines.
- min_
size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name str
- The name of the workload group
- notification_
template DLPWebRules Notification Template Args - The template used for DLP notification emails.
- ocr_
enabled bool - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent_
rule int The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- protocols Sequence[str]
- The protocol criteria specified for the DLP policy rule.
- rank int
- Admin rank of the admin who creates this rule
- rule_
id int - severity str
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- state str
- Enables or disables the DLP policy rule.. The supported values are:
- sub_
rules Sequence[str] The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- time_
windows DLPWebRules Time Windows Args - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - url_
categories DLPWebRules Url Categories Args - The list of URL categories to which the DLP policy rule must be applied.
- user_
risk_ Sequence[str]score_ levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- users
DLPWeb
Rules Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - without_
content_ boolinspection - must be set to false if
file_types
is not defined. - workload_
groups Sequence[DLPWebRules Workload Group Args] - The list of preconfigured workload groups to which the policy must be applied
- zcc_
notifications_ boolenabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler_
incident_ boolreceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action String
- The action taken when traffic matches the DLP policy rule criteria. The supported values are:
- auditor Property Map
- The auditor to which the DLP policy rule must be applied.
- cloud
Applications List<String> - The list of cloud applications to which the DLP policy rule must be applied.
- departments Property Map
- The name-ID pairs of the departments that are excluded from the DLP policy rule.
- description String
- The description of the DLP policy rule.
- dlp
Download BooleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines Property Map - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments Property Map - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
departments. - excluded
Groups Property Map - The name-ID pairs of the groups that are excluded from the DLP policy rule. Maximum of up to
256
groups. - excluded
Users Property Map - The name-ID pairs of the users that are excluded from the DLP policy rule. Maximum of up to
256
users. - external
Auditor StringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types List<String> The list of file types to which the DLP policy rule must be applied. For the complete list of supported file types refer to the ZIA API documentation
Note:
BITMAP
,JPEG
,PNG
, andTIFF
file types are exclusively supported when optical character recognitionocr_enabled
is set totrue
for DLP rules with content inspection.Note:
ALL_OUTBOUND
file type is applicable only when the predefined DLP engine calledEXTERNAL
is used and when the attributewithout_content_inspection
is set tofalse
.Note:
ALL_OUTBOUND
file type cannot be used alongside any any other file type.
- groups Property Map
- The Name-ID pairs of groups to which the DLP policy rule must be applied. Maximum of up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - icap
Server Property Map - The DLP server, using ICAP, to which the transaction content is forwarded.
- labels Property Map
- The Name-ID pairs of rule labels associated to the DLP policy rule.
- location
Groups Property Map - The Name-ID pairs of locations groups to which the DLP policy rule must be applied. Maximum of up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations Property Map
- The Name-ID pairs of locations to which the DLP policy rule must be applied. Maximum of up to
8
locations. When not used it impliesAny
to apply the rule to all locations. - match
Only Boolean - The match only criteria for DLP engines.
- min
Size Number - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name String
- The name of the workload group
- notification
Template Property Map - The template used for DLP notification emails.
- ocr
Enabled Boolean - Enables or disables image file scanning. When OCR is enabled only the following
file_types
are supported:WINDOWS_META_FORMAT
,BITMAP
,JPEG
,PNG
,TIFF
- order Number
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule Number The unique identifier of the parent rule under which an exception rule is added.
Note: Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- protocols List<String>
- The protocol criteria specified for the DLP policy rule.
- rank Number
- Admin rank of the admin who creates this rule
- rule
Id Number - severity String
- Indicates the severity selected for the DLP rule violation: Returned values are:
RULE_SEVERITY_HIGH
,RULE_SEVERITY_MEDIUM
,RULE_SEVERITY_LOW
,RULE_SEVERITY_INFO
- state String
- Enables or disables the DLP policy rule.. The supported values are:
- sub
Rules List<String> The list of exception rules added to a parent rule.
Note: All attributes within the WebDlpRule model are applicable to the sub-rules. Values for each rule are specified by using the WebDlpRule object Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings.
- time
Windows Property Map - The Name-ID pairs of time windows to which the DLP policy rule must be applied. Maximum of up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - url
Categories Property Map - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk List<String>Score Levels - Indicates the user risk score level selectedd for the DLP rule violation: Returned values are:
LOW
,MEDIUM
,HIGH
,CRITICAL
- users Property Map
- The Name-ID pairs of users to which the DLP policy rule must be applied. Maximum of up to
4
users. When not used it impliesAny
to apply the rule to all users. - without
Content BooleanInspection - must be set to false if
file_types
is not defined. - workload
Groups List<Property Map> - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications BooleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident BooleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
Supporting Types
DLPWebRulesAuditor, DLPWebRulesAuditorArgs
- Id int
- A unique identifier assigned to the workload group
- Id int
- A unique identifier assigned to the workload group
- id Integer
- A unique identifier assigned to the workload group
- id number
- A unique identifier assigned to the workload group
- id int
- A unique identifier assigned to the workload group
- id Number
- A unique identifier assigned to the workload group
DLPWebRulesDepartments, DLPWebRulesDepartmentsArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesDlpEngines, DLPWebRulesDlpEnginesArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesExcludedDepartments, DLPWebRulesExcludedDepartmentsArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesExcludedGroups, DLPWebRulesExcludedGroupsArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesExcludedUsers, DLPWebRulesExcludedUsersArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesGroups, DLPWebRulesGroupsArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesIcapServer, DLPWebRulesIcapServerArgs
- Id int
- A unique identifier assigned to the workload group
- Id int
- A unique identifier assigned to the workload group
- id Integer
- A unique identifier assigned to the workload group
- id number
- A unique identifier assigned to the workload group
- id int
- A unique identifier assigned to the workload group
- id Number
- A unique identifier assigned to the workload group
DLPWebRulesLabels, DLPWebRulesLabelsArgs
- Id int
- A unique identifier assigned to the workload group
- Id int
- A unique identifier assigned to the workload group
- id Integer
- A unique identifier assigned to the workload group
- id number
- A unique identifier assigned to the workload group
- id int
- A unique identifier assigned to the workload group
- id Number
- A unique identifier assigned to the workload group
DLPWebRulesLocationGroups, DLPWebRulesLocationGroupsArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesLocations, DLPWebRulesLocationsArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesNotificationTemplate, DLPWebRulesNotificationTemplateArgs
- Id int
- A unique identifier assigned to the workload group
- Id int
- A unique identifier assigned to the workload group
- id Integer
- A unique identifier assigned to the workload group
- id number
- A unique identifier assigned to the workload group
- id int
- A unique identifier assigned to the workload group
- id Number
- A unique identifier assigned to the workload group
DLPWebRulesTimeWindows, DLPWebRulesTimeWindowsArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesUrlCategories, DLPWebRulesUrlCategoriesArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesUsers, DLPWebRulesUsersArgs
- Ids List<int>
- A unique identifier assigned to the workload group
- Ids []int
- A unique identifier assigned to the workload group
- ids List<Integer>
- A unique identifier assigned to the workload group
- ids number[]
- A unique identifier assigned to the workload group
- ids Sequence[int]
- A unique identifier assigned to the workload group
- ids List<Number>
- A unique identifier assigned to the workload group
DLPWebRulesWorkloadGroup, DLPWebRulesWorkloadGroupArgs
Import
Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.
Visit
zia_dlp_web_rules can be imported by using <RULE ID>
or <RULE NAME>
as the import ID.
For example:
$ pulumi import zia:index/dLPWebRules:DLPWebRules example <rule_id>
or
$ pulumi import zia:index/dLPWebRules:DLPWebRules example <rule_name>
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
- This Pulumi package is based on the
zia
Terraform Provider.