ASD's Blueprint for Secure Cloud

Add PSPF X-header and subject marking

This section describes the configuration of Data Loss Prevention policies within Microsoft Purview associated with systems built according to guidance in ASD's Blueprint for Secure Cloud.

Estimated reading time: 37 minutes

Name

Name your DLP policy

ItemValue
NameAdd PSPF X-header and subject marking to emails
DescriptionApply PSPF markings to the email X-Protective-Marking X-header and email subject

Admin units

Assign admin units

ItemValue
Admin unitsFull directory

Locations

Choose where to apply the policy

ItemValue
Exchange emailAll groups
SharePoint sitesNot checked
OneDrive accountsNot checked
Teams chat and channel messagesNot checked
DevicesNot checked
InstancesNot checked
On-premises repositoriesNot checked
Fabric and Power BI workspacesNot checked
Microsoft 365 Copilot (preview)Not checked

Policy settings

ItemValue
Define policy settingsCreate or customize advanced DLP rules

Advanced DLP rules

Rule index:

Mark UNOFFICIAL X-header
ItemValue
NameMark UNOFFICIAL X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsUNOFFICIAL
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=UNOFFICIAL
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=UNOFFICIAL
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority0
Mark UNOFFICIAL subject
ItemValue
NameMark UNOFFICIAL subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsUNOFFICIAL
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=UNOFFICIAL]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority1
Mark OFFICIAL X-header
ItemValue
NameMark OFFICIAL X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=OFFICIAL(?!:Sensitive)
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=OFFICIAL
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority2
Mark OFFICIAL subject
ItemValue
NameMark OFFICIAL subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=OFFICIAL]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority3
Mark OS X-header
ItemValue
NameMark OS X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive (group)/OFFICIAL Sensitive
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=OFFICIAL:Sensitive(?!\u002C CAVEAT=|[a-zA-Z\u002C= /]*\u002C ACCESS=)
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=OFFICIAL:Sensitive
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority4
Mark OS subject
ItemValue
NameMark OS subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive (group)/OFFICIAL Sensitive
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=OFFICIAL:Sensitive]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority5
Mark OS PP X-header
ItemValue
NameMark OS PP X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive (group)/Personal Privacy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=OFFICIAL:Sensitive(?!\u002C CAVEAT=).*\u002C ACCESS=Personal-Privacy
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=OFFICIAL:Sensitive, ACCESS=Personal-Privacy
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority6
Mark OS PP subject
ItemValue
NameMark OS PP subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive (group)/Personal Privacy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=OFFICIAL:Sensitive, ACCESS=Personal-Privacy]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority7
Mark OS LP X-header
ItemValue
NameMark OS LP X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive (group)/Legal Privilege
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=OFFICIAL:Sensitive(?!\u002C CAVEAT=).*\u002C ACCESS=Legal-Privilege
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=OFFICIAL:Sensitive, ACCESS=Legal-Privilege
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority8
Mark OS LP subject
ItemValue
NameMark OS LP subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive (group)/Legal Privilege
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=OFFICIAL:Sensitive, ACCESS=Legal-Privilege]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority9
Mark OS LS X-header
ItemValue
NameMark OS LS X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive (group)/Legislative Secrecy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=OFFICIAL:Sensitive(?!\u002C CAVEAT=).*\u002C ACCESS=Legislative-Secrecy
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=OFFICIAL:Sensitive, ACCESS=Legislative-Secrecy
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority10
Mark OS LS subject
ItemValue
NameMark OS LS subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive (group)/Legislative Secrecy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=OFFICIAL:Sensitive, ACCESS=Legislative-Secrecy]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority11
Mark OS NC X-header
ItemValue
NameMark OS NC X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive NATIONAL CABINET (group)/OFFICIAL Sensitive NATIONAL CABINET
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=OFFICIAL:Sensitive\u002C CAVEAT=SH:NATIONAL-CABINET(?![a-zA-Z\u002C= /]*\u002C ACCESS=)
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=OFFICIAL:Sensitive, CAVEAT=SH:NATIONAL-CABINET
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority12
Mark OS NC subject
ItemValue
NameMark OS NC subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive NATIONAL CABINET (group)/OFFICIAL Sensitive NATIONAL CABINET
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=OFFICIAL:Sensitive, CAVEAT=SH:NATIONAL-CABINET]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority13
Mark OS NC PP X-header
ItemValue
NameMark OS NC PP X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive NATIONAL CABINET (group)/Personal Privacy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=OFFICIAL:Sensitive\u002C CAVEAT=SH:NATIONAL-CABINET.*\u002C ACCESS=Personal-Privacy
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=OFFICIAL:Sensitive, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Personal-Privacy
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority14
Mark OS NC PP subject
ItemValue
NameMark OS NC PP subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive NATIONAL CABINET (group)/Personal Privacy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=OFFICIAL:Sensitive, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Personal-Privacy]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority15
Mark OS NC LP X-header
ItemValue
NameMark OS NC LP X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive NATIONAL CABINET (group)/Legal Privilege
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=OFFICIAL:Sensitive\u002C CAVEAT=SH:NATIONAL-CABINET.*\u002C ACCESS=Legal-Privilege
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=OFFICIAL:Sensitive, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Legal-Privilege
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority16
Mark OS NC LP subject
ItemValue
NameMark OS NC LP subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive NATIONAL CABINET (group)/Legal Privilege
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=OFFICIAL:Sensitive, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Legal-Privilege]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority17
Mark OS NC LS X-header
ItemValue
NameMark OS NC LS X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive NATIONAL CABINET (group)/Legislative Secrecy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=OFFICIAL:Sensitive\u002C CAVEAT=SH:NATIONAL-CABINET.*\u002C ACCESS=Legislative-Secrecy
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=OFFICIAL:Sensitive, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Legislative-Secrecy
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority18
Mark OS NC LS subject
ItemValue
NameMark OS NC LS subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsOFFICIAL Sensitive NATIONAL CABINET (group)/Legislative Secrecy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=OFFICIAL:Sensitive, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Legislative-Secrecy]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority19
Mark PROTECTED X-header
ItemValue
NameMark PROTECTED X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED (group)/PROTECTED
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED(?!\u002C CAVEAT=|[a-zA-Z\u002C= /]*\u002C ACCESS=)
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority20
Mark PROTECTED subject
ItemValue
NameMark PROTECTED subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED (group)/PROTECTED
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority21
Mark P PP X-header
ItemValue
NameMark P PP X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED (group)/Personal Privacy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED(?!\u002C CAVEAT).*\u002C ACCESS=Personal-Privacy
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, ACCESS=Personal-Privacy
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority22
Mark P PP subject
ItemValue
NameMark P PP subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED (group)/Personal Privacy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, ACCESS=Personal-Privacy]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority23
Mark P LP X-header
ItemValue
NameMark P LP X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED (group)/Legal Privilege
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED(?!\u002C CAVEAT).*\u002C ACCESS=Legal-Privilege
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, ACCESS=Legal-Privilege
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority24
Mark P LP subject
ItemValue
NameMark P LP subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED (group)/Legal Privilege
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, ACCESS=Legal-Privilege]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority25
Mark P LS X-header
ItemValue
NameMark P LS X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED (group)/Legislative Secrecy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED(?!\u002C CAVEAT).*\u002C ACCESS=Legislative-Secrecy
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, ACCESS=Legislative-Secrecy
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority26
Mark P LS subject
ItemValue
NameMark P LS subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED (group)/Legislative Secrecy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, ACCESS=Legislative-Secrecy]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority27
Mark P NC X-header
ItemValue
NameMark P NC X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED NATIONAL CABINET (group)/PROTECTED NATIONAL CABINET
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED\u002C CAVEAT=SH:NATIONAL-CABINET(?![a-zA-Z\u002C= /]*\u002C ACCESS=)
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, CAVEAT=SH:NATIONAL-CABINET
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority28
Mark P NC subject
ItemValue
NameMark P NC subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED NATIONAL CABINET (group)/PROTECTED NATIONAL CABINET
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, CAVEAT=SH:NATIONAL-CABINET]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority29
Mark P NC PP X-header
ItemValue
NameMark P NC PP X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED NATIONAL CABINET (group)/Personal Privacy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED\u002C CAVEAT=SH:NATIONAL-CABINET.*\u002C ACCESS=Personal-Privacy
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Personal-Privacy
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority30
Mark P NC PP subject
ItemValue
NameMark P NC PP subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED NATIONAL CABINET (group)/Personal Privacy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Personal-Privacy]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority31
Mark P NC LP X-header
ItemValue
NameMark P NC LP X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED NATIONAL CABINET (group)/Legal Privilege
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED\u002C CAVEAT=SH:NATIONAL-CABINET.*\u002C ACCESS=Legal-Privilege
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Legal-Privilege
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority32
Mark P NC LP subject
ItemValue
NameMark P NC LP subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED NATIONAL CABINET (group)/Legal Privilege
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Legal-Privilege]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority33
Mark P NC LS X-header
ItemValue
NameMark P NC LS X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED NATIONAL CABINET (group)/Legislative Secrecy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED\u002C CAVEAT=SH:NATIONAL-CABINET.*\u002C ACCESS=Legislative-Secrecy
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Legislative-Secrecy
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority34
Mark P NC LS subject
ItemValue
NameMark P NC LS subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED NATIONAL CABINET (group)/Legislative Secrecy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, CAVEAT=SH:NATIONAL-CABINET, ACCESS=Legislative-Secrecy]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority35
Mark P C X-header
ItemValue
NameMark P C X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED CABINET (group)/ PROTECTED CABINET
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED\u002C CAVEAT=SH:CABINET(?![a-zA-Z\u002C= /]*\u002C ACCESS=)
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, CAVEAT=SH:CABINET
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority36
Mark P C subject
ItemValue
NameMark P C subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED CABINET (group)/PROTECTED CABINET
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, CAVEAT=SH:CABINET]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority37
Mark P C PP X-header
ItemValue
NameMark P C PP X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED CABINET(group)/Personal Privacy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED\u002C CAVEAT=SH:CABINET.*\u002C ACCESS=Personal-Privacy
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, CAVEAT=SH:CABINET, ACCESS=Personal-Privacy
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority38
Mark P C PP subject
ItemValue
NameMark P C PP subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED CABINET (group)/Personal Privacy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, CAVEAT=SH:CABINET, ACCESS=Personal-Privacy]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority39
Mark P C LP X-header
ItemValue
NameMark P C LP X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED CABINET (group)/Legal Privilege
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED\u002C CAVEAT=SH:CABINET.*\u002C ACCESS=Legal-Privilege
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, CAVEAT=SH:CABINET, ACCESS=Legal-Privilege
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority40
Mark P C LP subject
ItemValue
NameMark P C LP subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED CABINET (group)/Legal Privilege
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, CAVEAT=SH:CABINET, ACCESS=Legal-Privilege]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority41
Mark P C LS X-header
ItemValue
NameMark P C LS X-header
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED CABINET (group)/Legislative Secrecy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Condition group AND
NOT
Conditions
Header matches patternsX-Protective-Marking
SEC=PROTECTED\u002C CAVEAT=SH:CABINET.*\u002C ACCESS=Legislative-Secrecy
Actions
Set headersX-Protective-Marking: VER=2024.1, NS=gov.au, SEC=PROTECTED, CAVEAT=SH:CABINET, ACCESS=Legislative-Secrecy
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority42
Mark P C LS subject
ItemValue
NameMark P C LS subject
DescriptionNone
Conditions
Content contains
- Group nameDefault
- Group operatorAny of these
- Sensitivity labelsPROTECTED CABINET (group)/Legislative Secrecy
- Evaluate predicate for (available for Exchange workload only)Message or attachment
Actions
Modify subject
- Remove text that matches\s*?\[SEC=.*?\]
- Insert this replacement text [SEC=PROTECTED, CAVEAT=SH:CABINET, ACCESS=Legislative-Secrecy]1
- PositionRemove matches and append replacement text to subject
User notifications
Use notifications to inform your users and help educate them on the proper use of sensitive info.Off
Incident reports
Use this severity level in admin alerts and reports:Low
Send an alert to admins when a rule match occurs.Off
Use email incident reports to notify you when a policy match occurs.Off
Additional options
If there’s a match for this rule, stop processing additional DLP policies and rules.Not checked
Evaluate rule per component (Email body and each individual attachment will be considered an individual entity for rule evaluation)Off
Priority43

Policy mode

ItemValue
Policy modeTurn the policy on immediately

Security & Governance

  • None identified

Design

Configuration

  • None identified

References

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra