Sensitivity labels
In order to safeguard your organization's data, labels can be employed as markers for sensitive information. Microsoft provides sensitivity labels, which act as identifiers emphasizing the importance of the data they're associated with, thereby enhancing the security measures in place. See Protect your sensitive data with Microsoft Purview (formerly MIP) for more information.
Any data traffic that includes a sensitivity label can be effectively managed using FortiGate. This is made possible through the utilization of a predefined label type, mpip, specifically designed for Microsoft Purview Information Protection. See Microsoft Purview sensitivity labels for more information.
MPIP labels have their own settings and can be used directly with DLP profiles without needing a dictionary. Additionally, remote MPIP labels can be synchronized automatically from a Microsoft Purview account through the Azure SDN connector, complementing locally defined labels.
Prerequisites
The following procedures should be completed before configuring the FortiGate:
-
Create and configure sensitivity labels and their policies. See Create sensitivity labels for more information.
-
Apply a sensitivity label to content. See Apply sensitivity labels to your files and email for more information.
Example 1: Verifying that a user's attempt to post a file matching the remote MPIP label through HTTPS will be blocked
The following example demonstrates configuring a remote MPIP label to block HTTPS-POST actions.
To configure remote MPIP labels in the GUI:
-
Configure the external connector:
-
Go to Security Fabric > External Connectors.
-
Click Create New.
-
Configure a Microsoft Azure connector with Microsoft 365 enabled. See Azure SDN connector using service principle for more information.
-
-
Configure the DLP label:
-
Go to Security Profiles > Data Loss Prevention.
-
Select the Label tab.
-
Click Create New.
-
Set Purview connector to the new connector.
-
Select the MPIP labels synced from the connector to match sensitive files.
-
Click OK.
-
-
Configure the DLP profile:
-
Go to Security Profiles > Data Loss Prevention.
-
Select the Profile tab.
-
Click Create New.
-
Configure the DLP profile with the new DLP label applied in a rule set to block HTTP-POST and HTTP-GET. See Basic DLP settings for more information.
-
-
Add the DLP profile to a firewall policy:
-
Go to Policy & Objects > Firewall Policy.
-
Click Create New.
-
Set the Inspection Mode to Proxy-based.
-
In the Security Profiles section, enable DLP Profile and select the new DLP profile.
-
Set SSL Inspection to deep-inspection.
-
Configure the other settings as needed.
-
Click OK.
-
-
Attempt an HTTPS-POST action.
The action matches the remote MPIP label and is blocked by the FortiGate.
To configure remote MPIP labels in the CLI:
-
Configure the external connector with Microsoft 365 enabled:
config system sdn-connector edit remote-mpip set type azure set azure-region global set tenant-id eca3011d-89ec-481d-9ed0-a0f7d2bb9b45 set client-id 44ac574f-227a-4e90-a33b-820f2d7230b2 set client-secret XXXXXXXX set update-interval 30 set microsoft-365 enable next end -
Configure the DLP label:
config dlp label edit "remote-mpip-label" set type mpip set mpip-type remote set connector "remote-mpip" config entries edit 1 set mpip-label-name "Confidential/Anyone (unrestricted)" next end next end -
Configure the DLP profile to block HTTP-POST and HTTP-GET:
config dlp profile edit "remote-mpip-profile" config rule edit 1 set proto http-get http-post set filter-by label set label "remote-mpip-label" set action block next end next end -
Add the DLP profile to a firewall policy:
config firewall policy edit 1 set srcintf "port2" set dstintf "port1" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set ssl-ssh-profile "deep-inpsection" set dlp-profile "remote-mpip-profile" set nat enable next end -
Attempt an HTTPS-POST action.
The action matches the remote MPIP label and is blocked by the FortiGate:
1: date=2025-06-23 time=15:36:53 eventtime=1750718213619030708 tz="-0700" logid="0954024576" type="utm" subtype="dlp" eventtype="dlp" level="warning" vd="vdom1" ruleid=1 dlpextra="remote-mpip-label" filtertype="label" filtercat="file" severity="medium" policyid=1 poluuid="824d4c98-4947-51f0-5ea1-60d1343c2ef9" policytype="policy" sessionid=720 epoch=1656654802 eventid=1 srcip=10.1.100.241 srcport=41346 srccountry="Reserved" srcintf="port2" srcintfrole="undefined" srcuuid="4a1017e8-4947-51f0-55cb-8c18f3765a3f" dstip=206.47.132.132 dstport=443 dstcountry="Canada" dstintf="port1" dstintfrole="undefined" dstuuid="4a1017e8-4947-51f0-55cb-8c18f3765a3f" proto=6 service="HTTPS" filetype="msofficex" direction="outgoing" action="block" hostname="dlptest.ai" url="https://dlptest.ai/api/upload-file" agent="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:139.0) Gecko/20100101 Firefox/139.0" httpmethod="POST" referralurl="https://dlptest.ai/" filename="confidential-unrestricted.pptx" filesize=30427 profile="remote-mpip-profile" infectedfilename="docProps/custom.xml" infectedfilesize=2025 infectedfilelevel=1
Example 2: Verifying that a user's attempt to post a file matching the local MPIP label's GUID will be monitored through FTPS
The following example demonstrates configuring a local MPIP label with a Globally Unique Identifier (GUID) that will monitor files posted through FTPS.
|
|
Local MPIP label configuration is not supported in the GUI. However, once the local MPIP label has been configured in the CLI, it can be applied to a DLP profile in the GUI. See Basic DLP settings. |
To configure and apply a local MPIP label:
-
Obtain a GUID for your sensitivity labels. See Search for documents by sensitivity label for more information.
-
Configure the local MPIP label:
config dlp label edit "local-mpip-label" set type mpip set mpip-type local config entries edit 1 set guid "c0ef495a-6714-4056-a44b-a9cb63fa9161" next end next end -
Configure the DLP profile:
config dlp profile edit "local-mpip-profile" config rule edit 1 set proto ftp set filter-by label set label "local-mpip-label" set action log-only next end next end -
Add the DLP profile to a firewall policy:
config firewall policy edit 2 set srcintf "port2" set dstintf "port1" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set ssl-ssh-profile "deep-inpsection" set dlp-profile "local-mpip-profile" set nat enable next end -
Attempt to transfer a file matching the remote MPIP label through FTPS.
The file passes and DLP monitor logs are generated:
-
A GUI log can be reviewed:
-
A CLI log can be reviewed:
1: date=2025-05-28 time=20:32:35 eventtime=1748489555516121022 tz="-0700" logid="0954024577" type="utm" subtype="dlp" eventtype="dlp" level="notice" vd="vdom1" ruleid=1 dlpextra="local-mpip-label" filtertype="label" filtercat="file" severity="medium" policyid=1 poluuid="319d6e9e-3c23-51f0-3a27-434de0e559ee" policytype="policy" sessionid=8379 epoch=1330974272 eventid=0 srcip=10.1.100.241 srcport=57865 srccountry="Reserved" srcintf="port2" srcintfrole="undefined" srcuuid="f9cd0f6a-3c22-51f0-b75c-6fad5f412db5" dstip=172.16.200.175 dstport=38353 dstcountry="Reserved" dstintf="port1" dstintfrole="undefined" dstuuid="f9cd0f6a-3c22-51f0-b75c-6fad5f412db5" proto=6 service="FTPS" filetype="zip" direction="outgoing" action="log-only" filename="mip_doc.zip" filesize=5470 profile="local-mpip-profile" infectedfilename="doc.doc" infectedfilesize=19456 infectedfiletype="msoffice" infectedfilelevel=1
-