zia.DLPWebRules
Explore with Pulumi AI
The zia_dlp_web_rules resource allows the creation and management of ZIA DLP Web Rules in the Zscaler Internet Access cloud or via the API.
⚠️ WARNING: Zscaler Internet Access DLP supports a maximum of 127 Web DLP Rules to be created via API.
Example Usage
“ALL_OUTBOUND” File Type"
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const thisDLPEngines = zia.getDLPEngines({
predefinedEngineName: "EXTERNAL",
});
const thisDLPWebRules = new zia.DLPWebRules("thisDLPWebRules", {
description: "Example",
action: "BLOCK",
order: 1,
rank: 7,
state: "ENABLED",
protocols: [
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
fileTypes: ["ALL_OUTBOUND"],
zscalerIncidentReceiver: false,
withoutContentInspection: false,
userRiskScoreLevels: [
"LOW",
"MEDIUM",
"HIGH",
"CRITICAL",
],
severity: "RULE_SEVERITY_HIGH",
dlpEngines: {
ids: [thisDLPEngines.then(thisDLPEngines => thisDLPEngines.id)],
},
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
this_dlp_engines = zia.get_dlp_engines(predefined_engine_name="EXTERNAL")
this_dlp_web_rules = zia.DLPWebRules("thisDLPWebRules",
description="Example",
action="BLOCK",
order=1,
rank=7,
state="ENABLED",
protocols=[
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
file_types=["ALL_OUTBOUND"],
zscaler_incident_receiver=False,
without_content_inspection=False,
user_risk_score_levels=[
"LOW",
"MEDIUM",
"HIGH",
"CRITICAL",
],
severity="RULE_SEVERITY_HIGH",
dlp_engines=zia.DLPWebRulesDlpEnginesArgs(
ids=[this_dlp_engines.id],
))
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
thisDLPEngines, err := zia.LookupDLPEngines(ctx, &zia.LookupDLPEnginesArgs{
PredefinedEngineName: pulumi.StringRef("EXTERNAL"),
}, nil)
if err != nil {
return err
}
_, err = zia.NewDLPWebRules(ctx, "thisDLPWebRules", &zia.DLPWebRulesArgs{
Description: pulumi.String("Example"),
Action: pulumi.String("BLOCK"),
Order: pulumi.Int(1),
Rank: pulumi.Int(7),
State: pulumi.String("ENABLED"),
Protocols: pulumi.StringArray{
pulumi.String("FTP_RULE"),
pulumi.String("HTTPS_RULE"),
pulumi.String("HTTP_RULE"),
},
FileTypes: pulumi.StringArray{
pulumi.String("ALL_OUTBOUND"),
},
ZscalerIncidentReceiver: pulumi.Bool(false),
WithoutContentInspection: pulumi.Bool(false),
UserRiskScoreLevels: pulumi.StringArray{
pulumi.String("LOW"),
pulumi.String("MEDIUM"),
pulumi.String("HIGH"),
pulumi.String("CRITICAL"),
},
Severity: pulumi.String("RULE_SEVERITY_HIGH"),
DlpEngines: &zia.DLPWebRulesDlpEnginesArgs{
Ids: pulumi.IntArray{
pulumi.Int(thisDLPEngines.Id),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var thisDLPEngines = Zia.GetDLPEngines.Invoke(new()
{
PredefinedEngineName = "EXTERNAL",
});
var thisDLPWebRules = new Zia.DLPWebRules("thisDLPWebRules", new()
{
Description = "Example",
Action = "BLOCK",
Order = 1,
Rank = 7,
State = "ENABLED",
Protocols = new[]
{
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
},
FileTypes = new[]
{
"ALL_OUTBOUND",
},
ZscalerIncidentReceiver = false,
WithoutContentInspection = false,
UserRiskScoreLevels = new[]
{
"LOW",
"MEDIUM",
"HIGH",
"CRITICAL",
},
Severity = "RULE_SEVERITY_HIGH",
DlpEngines = new Zia.Inputs.DLPWebRulesDlpEnginesArgs
{
Ids = new[]
{
thisDLPEngines.Apply(getDLPEnginesResult => getDLPEnginesResult.Id),
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetDLPEnginesArgs;
import com.pulumi.zia.DLPWebRules;
import com.pulumi.zia.DLPWebRulesArgs;
import com.pulumi.zia.inputs.DLPWebRulesDlpEnginesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var thisDLPEngines = ZiaFunctions.getDLPEngines(GetDLPEnginesArgs.builder()
.predefinedEngineName("EXTERNAL")
.build());
var thisDLPWebRules = new DLPWebRules("thisDLPWebRules", DLPWebRulesArgs.builder()
.description("Example")
.action("BLOCK")
.order(1)
.rank(7)
.state("ENABLED")
.protocols(
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE")
.fileTypes("ALL_OUTBOUND")
.zscalerIncidentReceiver(false)
.withoutContentInspection(false)
.userRiskScoreLevels(
"LOW",
"MEDIUM",
"HIGH",
"CRITICAL")
.severity("RULE_SEVERITY_HIGH")
.dlpEngines(DLPWebRulesDlpEnginesArgs.builder()
.ids(thisDLPEngines.applyValue(getDLPEnginesResult -> getDLPEnginesResult.id()))
.build())
.build());
}
}
resources:
thisDLPWebRules:
type: zia:DLPWebRules
properties:
description: Example
action: BLOCK
order: 1
rank: 7
state: ENABLED
protocols:
- FTP_RULE
- HTTPS_RULE
- HTTP_RULE
fileTypes:
- ALL_OUTBOUND
zscalerIncidentReceiver: false
withoutContentInspection: false
userRiskScoreLevels:
- LOW
- MEDIUM
- HIGH
- CRITICAL
severity: RULE_SEVERITY_HIGH
dlpEngines:
ids:
- ${thisDLPEngines.id}
variables:
thisDLPEngines:
fn::invoke:
Function: zia:getDLPEngines
Arguments:
predefinedEngineName: EXTERNAL
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const thisURLCategories = zia.getURLCategories({
configuredName: "Example",
});
const thisIcapServers = zia.getIcapServers({
name: "ZS_ICAP_01",
});
const thisDLPWebRules = new zia.DLPWebRules("thisDLPWebRules", {
description: "Terraform_Test",
action: "BLOCK",
order: 1,
protocols: [
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
rank: 7,
state: "ENABLED",
zscalerIncidentReceiver: true,
withoutContentInspection: false,
urlCategories: {
ids: [thisURLCategories.then(thisURLCategories => thisURLCategories.val)],
},
icapServers: [{
id: thisIcapServers.then(thisIcapServers => thisIcapServers.id),
}],
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
this_url_categories = zia.get_url_categories(configured_name="Example")
this_icap_servers = zia.get_icap_servers(name="ZS_ICAP_01")
this_dlp_web_rules = zia.DLPWebRules("thisDLPWebRules",
description="Terraform_Test",
action="BLOCK",
order=1,
protocols=[
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
rank=7,
state="ENABLED",
zscaler_incident_receiver=True,
without_content_inspection=False,
url_categories=zia.DLPWebRulesUrlCategoriesArgs(
ids=[this_url_categories.val],
),
icap_servers=[zia.DLPWebRulesIcapServerArgs(
id=this_icap_servers.id,
)])
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
thisURLCategories, err := zia.LookupURLCategories(ctx, &zia.LookupURLCategoriesArgs{
ConfiguredName: pulumi.StringRef("Example"),
}, nil)
if err != nil {
return err
}
thisIcapServers, err := zia.GetIcapServers(ctx, &zia.GetIcapServersArgs{
Name: pulumi.StringRef("ZS_ICAP_01"),
}, nil)
if err != nil {
return err
}
_, err = zia.NewDLPWebRules(ctx, "thisDLPWebRules", &zia.DLPWebRulesArgs{
Description: pulumi.String("Terraform_Test"),
Action: pulumi.String("BLOCK"),
Order: pulumi.Int(1),
Protocols: pulumi.StringArray{
pulumi.String("FTP_RULE"),
pulumi.String("HTTPS_RULE"),
pulumi.String("HTTP_RULE"),
},
Rank: pulumi.Int(7),
State: pulumi.String("ENABLED"),
ZscalerIncidentReceiver: pulumi.Bool(true),
WithoutContentInspection: pulumi.Bool(false),
UrlCategories: &zia.DLPWebRulesUrlCategoriesArgs{
Ids: pulumi.IntArray{
pulumi.Int(thisURLCategories.Val),
},
},
IcapServers: zia.DLPWebRulesIcapServerArray{
&zia.DLPWebRulesIcapServerArgs{
Id: pulumi.Int(thisIcapServers.Id),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var thisURLCategories = Zia.GetURLCategories.Invoke(new()
{
ConfiguredName = "Example",
});
var thisIcapServers = Zia.GetIcapServers.Invoke(new()
{
Name = "ZS_ICAP_01",
});
var thisDLPWebRules = new Zia.DLPWebRules("thisDLPWebRules", new()
{
Description = "Terraform_Test",
Action = "BLOCK",
Order = 1,
Protocols = new[]
{
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
},
Rank = 7,
State = "ENABLED",
ZscalerIncidentReceiver = true,
WithoutContentInspection = false,
UrlCategories = new Zia.Inputs.DLPWebRulesUrlCategoriesArgs
{
Ids = new[]
{
thisURLCategories.Apply(getURLCategoriesResult => getURLCategoriesResult.Val),
},
},
IcapServers = new[]
{
new Zia.Inputs.DLPWebRulesIcapServerArgs
{
Id = thisIcapServers.Apply(getIcapServersResult => getIcapServersResult.Id),
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetURLCategoriesArgs;
import com.pulumi.zia.inputs.GetIcapServersArgs;
import com.pulumi.zia.DLPWebRules;
import com.pulumi.zia.DLPWebRulesArgs;
import com.pulumi.zia.inputs.DLPWebRulesUrlCategoriesArgs;
import com.pulumi.zia.inputs.DLPWebRulesIcapServerArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var thisURLCategories = ZiaFunctions.getURLCategories(GetURLCategoriesArgs.builder()
.configuredName("Example")
.build());
final var thisIcapServers = ZiaFunctions.getIcapServers(GetIcapServersArgs.builder()
.name("ZS_ICAP_01")
.build());
var thisDLPWebRules = new DLPWebRules("thisDLPWebRules", DLPWebRulesArgs.builder()
.description("Terraform_Test")
.action("BLOCK")
.order(1)
.protocols(
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE")
.rank(7)
.state("ENABLED")
.zscalerIncidentReceiver(true)
.withoutContentInspection(false)
.urlCategories(DLPWebRulesUrlCategoriesArgs.builder()
.ids(thisURLCategories.applyValue(getURLCategoriesResult -> getURLCategoriesResult.val()))
.build())
.icapServers(DLPWebRulesIcapServerArgs.builder()
.id(thisIcapServers.applyValue(getIcapServersResult -> getIcapServersResult.id()))
.build())
.build());
}
}
resources:
thisDLPWebRules:
type: zia:DLPWebRules
properties:
description: Terraform_Test
action: BLOCK
order: 1
protocols:
- FTP_RULE
- HTTPS_RULE
- HTTP_RULE
rank: 7
state: ENABLED
zscalerIncidentReceiver: true
withoutContentInspection: false
urlCategories:
ids:
- ${thisURLCategories.val}
icapServers:
- id: ${thisIcapServers.id}
variables:
thisURLCategories:
fn::invoke:
Function: zia:getURLCategories
Arguments:
configuredName: Example
thisIcapServers:
fn::invoke:
Function: zia:getIcapServers
Arguments:
name: ZS_ICAP_01
“Specify Incident Receiver Setting”
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const thisURLCategories = zia.getURLCategories({
configuredName: "Example",
});
const thisDLPIncidentReceiverServers = zia.getDLPIncidentReceiverServers({
name: "ZS_INC_RECEIVER_01",
});
const thisDLPWebRules = new zia.DLPWebRules("thisDLPWebRules", {
description: "Terraform_Test",
action: "BLOCK",
order: 1,
protocols: [
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
rank: 7,
state: "ENABLED",
zscalerIncidentReceiver: true,
withoutContentInspection: false,
urlCategories: {
ids: [thisURLCategories.then(thisURLCategories => thisURLCategories.val)],
},
icapServers: [{
id: thisDLPIncidentReceiverServers.then(thisDLPIncidentReceiverServers => thisDLPIncidentReceiverServers.id),
}],
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
this_url_categories = zia.get_url_categories(configured_name="Example")
this_dlp_incident_receiver_servers = zia.get_dlp_incident_receiver_servers(name="ZS_INC_RECEIVER_01")
this_dlp_web_rules = zia.DLPWebRules("thisDLPWebRules",
description="Terraform_Test",
action="BLOCK",
order=1,
protocols=[
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
rank=7,
state="ENABLED",
zscaler_incident_receiver=True,
without_content_inspection=False,
url_categories=zia.DLPWebRulesUrlCategoriesArgs(
ids=[this_url_categories.val],
),
icap_servers=[zia.DLPWebRulesIcapServerArgs(
id=this_dlp_incident_receiver_servers.id,
)])
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
thisURLCategories, err := zia.LookupURLCategories(ctx, &zia.LookupURLCategoriesArgs{
ConfiguredName: pulumi.StringRef("Example"),
}, nil)
if err != nil {
return err
}
thisDLPIncidentReceiverServers, err := zia.GetDLPIncidentReceiverServers(ctx, &zia.GetDLPIncidentReceiverServersArgs{
Name: pulumi.StringRef("ZS_INC_RECEIVER_01"),
}, nil)
if err != nil {
return err
}
_, err = zia.NewDLPWebRules(ctx, "thisDLPWebRules", &zia.DLPWebRulesArgs{
Description: pulumi.String("Terraform_Test"),
Action: pulumi.String("BLOCK"),
Order: pulumi.Int(1),
Protocols: pulumi.StringArray{
pulumi.String("FTP_RULE"),
pulumi.String("HTTPS_RULE"),
pulumi.String("HTTP_RULE"),
},
Rank: pulumi.Int(7),
State: pulumi.String("ENABLED"),
ZscalerIncidentReceiver: pulumi.Bool(true),
WithoutContentInspection: pulumi.Bool(false),
UrlCategories: &zia.DLPWebRulesUrlCategoriesArgs{
Ids: pulumi.IntArray{
pulumi.Int(thisURLCategories.Val),
},
},
IcapServers: zia.DLPWebRulesIcapServerArray{
&zia.DLPWebRulesIcapServerArgs{
Id: pulumi.Int(thisDLPIncidentReceiverServers.Id),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var thisURLCategories = Zia.GetURLCategories.Invoke(new()
{
ConfiguredName = "Example",
});
var thisDLPIncidentReceiverServers = Zia.GetDLPIncidentReceiverServers.Invoke(new()
{
Name = "ZS_INC_RECEIVER_01",
});
var thisDLPWebRules = new Zia.DLPWebRules("thisDLPWebRules", new()
{
Description = "Terraform_Test",
Action = "BLOCK",
Order = 1,
Protocols = new[]
{
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
},
Rank = 7,
State = "ENABLED",
ZscalerIncidentReceiver = true,
WithoutContentInspection = false,
UrlCategories = new Zia.Inputs.DLPWebRulesUrlCategoriesArgs
{
Ids = new[]
{
thisURLCategories.Apply(getURLCategoriesResult => getURLCategoriesResult.Val),
},
},
IcapServers = new[]
{
new Zia.Inputs.DLPWebRulesIcapServerArgs
{
Id = thisDLPIncidentReceiverServers.Apply(getDLPIncidentReceiverServersResult => getDLPIncidentReceiverServersResult.Id),
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetURLCategoriesArgs;
import com.pulumi.zia.inputs.GetDLPIncidentReceiverServersArgs;
import com.pulumi.zia.DLPWebRules;
import com.pulumi.zia.DLPWebRulesArgs;
import com.pulumi.zia.inputs.DLPWebRulesUrlCategoriesArgs;
import com.pulumi.zia.inputs.DLPWebRulesIcapServerArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var thisURLCategories = ZiaFunctions.getURLCategories(GetURLCategoriesArgs.builder()
.configuredName("Example")
.build());
final var thisDLPIncidentReceiverServers = ZiaFunctions.getDLPIncidentReceiverServers(GetDLPIncidentReceiverServersArgs.builder()
.name("ZS_INC_RECEIVER_01")
.build());
var thisDLPWebRules = new DLPWebRules("thisDLPWebRules", DLPWebRulesArgs.builder()
.description("Terraform_Test")
.action("BLOCK")
.order(1)
.protocols(
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE")
.rank(7)
.state("ENABLED")
.zscalerIncidentReceiver(true)
.withoutContentInspection(false)
.urlCategories(DLPWebRulesUrlCategoriesArgs.builder()
.ids(thisURLCategories.applyValue(getURLCategoriesResult -> getURLCategoriesResult.val()))
.build())
.icapServers(DLPWebRulesIcapServerArgs.builder()
.id(thisDLPIncidentReceiverServers.applyValue(getDLPIncidentReceiverServersResult -> getDLPIncidentReceiverServersResult.id()))
.build())
.build());
}
}
resources:
thisDLPWebRules:
type: zia:DLPWebRules
properties:
description: Terraform_Test
action: BLOCK
order: 1
protocols:
- FTP_RULE
- HTTPS_RULE
- HTTP_RULE
rank: 7
state: ENABLED
zscalerIncidentReceiver: true
withoutContentInspection: false
urlCategories:
ids:
- ${thisURLCategories.val}
icapServers:
- id: ${thisDLPIncidentReceiverServers.id}
variables:
thisURLCategories:
fn::invoke:
Function: zia:getURLCategories
Arguments:
configuredName: Example
thisDLPIncidentReceiverServers:
fn::invoke:
Function: zia:getDLPIncidentReceiverServers
Arguments:
name: ZS_INC_RECEIVER_01
“Creating Parent Rules And SubRules”
⚠️ WARNING: Destroying a parent rule will also destroy all subrules
NOTE Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings. To learn more, see Configuring DLP Advanced Settings
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
const parentRule = new zia.DLPWebRules("parentRule", {
description: "ParentRule1",
action: "ALLOW",
state: "ENABLED",
order: 1,
rank: 0,
protocols: [
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
cloudApplications: [
"GOOGLE_WEBMAIL",
"WINDOWS_LIVE_HOTMAIL",
],
withoutContentInspection: false,
matchOnly: false,
minSize: 20,
zscalerIncidentReceiver: true,
});
const subrule1 = new zia.DLPWebRules("subrule1", {
description: "SubRule1",
action: "ALLOW",
state: "ENABLED",
order: 1,
rank: 0,
protocols: [
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
cloudApplications: [
"GOOGLE_WEBMAIL",
"WINDOWS_LIVE_HOTMAIL",
],
withoutContentInspection: false,
matchOnly: false,
parentRule: parentRule.id,
});
import pulumi
import zscaler_pulumi_zia as zia
parent_rule = zia.DLPWebRules("parentRule",
description="ParentRule1",
action="ALLOW",
state="ENABLED",
order=1,
rank=0,
protocols=[
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
cloud_applications=[
"GOOGLE_WEBMAIL",
"WINDOWS_LIVE_HOTMAIL",
],
without_content_inspection=False,
match_only=False,
min_size=20,
zscaler_incident_receiver=True)
subrule1 = zia.DLPWebRules("subrule1",
description="SubRule1",
action="ALLOW",
state="ENABLED",
order=1,
rank=0,
protocols=[
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
],
cloud_applications=[
"GOOGLE_WEBMAIL",
"WINDOWS_LIVE_HOTMAIL",
],
without_content_inspection=False,
match_only=False,
parent_rule=parent_rule.id)
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
parentRule, err := zia.NewDLPWebRules(ctx, "parentRule", &zia.DLPWebRulesArgs{
Description: pulumi.String("ParentRule1"),
Action: pulumi.String("ALLOW"),
State: pulumi.String("ENABLED"),
Order: pulumi.Int(1),
Rank: pulumi.Int(0),
Protocols: pulumi.StringArray{
pulumi.String("FTP_RULE"),
pulumi.String("HTTPS_RULE"),
pulumi.String("HTTP_RULE"),
},
CloudApplications: pulumi.StringArray{
pulumi.String("GOOGLE_WEBMAIL"),
pulumi.String("WINDOWS_LIVE_HOTMAIL"),
},
WithoutContentInspection: pulumi.Bool(false),
MatchOnly: pulumi.Bool(false),
MinSize: pulumi.Int(20),
ZscalerIncidentReceiver: pulumi.Bool(true),
})
if err != nil {
return err
}
_, err = zia.NewDLPWebRules(ctx, "subrule1", &zia.DLPWebRulesArgs{
Description: pulumi.String("SubRule1"),
Action: pulumi.String("ALLOW"),
State: pulumi.String("ENABLED"),
Order: pulumi.Int(1),
Rank: pulumi.Int(0),
Protocols: pulumi.StringArray{
pulumi.String("FTP_RULE"),
pulumi.String("HTTPS_RULE"),
pulumi.String("HTTP_RULE"),
},
CloudApplications: pulumi.StringArray{
pulumi.String("GOOGLE_WEBMAIL"),
pulumi.String("WINDOWS_LIVE_HOTMAIL"),
},
WithoutContentInspection: pulumi.Bool(false),
MatchOnly: pulumi.Bool(false),
ParentRule: parentRule.ID(),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var parentRule = new Zia.DLPWebRules("parentRule", new()
{
Description = "ParentRule1",
Action = "ALLOW",
State = "ENABLED",
Order = 1,
Rank = 0,
Protocols = new[]
{
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
},
CloudApplications = new[]
{
"GOOGLE_WEBMAIL",
"WINDOWS_LIVE_HOTMAIL",
},
WithoutContentInspection = false,
MatchOnly = false,
MinSize = 20,
ZscalerIncidentReceiver = true,
});
var subrule1 = new Zia.DLPWebRules("subrule1", new()
{
Description = "SubRule1",
Action = "ALLOW",
State = "ENABLED",
Order = 1,
Rank = 0,
Protocols = new[]
{
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE",
},
CloudApplications = new[]
{
"GOOGLE_WEBMAIL",
"WINDOWS_LIVE_HOTMAIL",
},
WithoutContentInspection = false,
MatchOnly = false,
ParentRule = parentRule.Id,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.DLPWebRules;
import com.pulumi.zia.DLPWebRulesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var parentRule = new DLPWebRules("parentRule", DLPWebRulesArgs.builder()
.description("ParentRule1")
.action("ALLOW")
.state("ENABLED")
.order(1)
.rank(0)
.protocols(
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE")
.cloudApplications(
"GOOGLE_WEBMAIL",
"WINDOWS_LIVE_HOTMAIL")
.withoutContentInspection(false)
.matchOnly(false)
.minSize(20)
.zscalerIncidentReceiver(true)
.build());
var subrule1 = new DLPWebRules("subrule1", DLPWebRulesArgs.builder()
.description("SubRule1")
.action("ALLOW")
.state("ENABLED")
.order(1)
.rank(0)
.protocols(
"FTP_RULE",
"HTTPS_RULE",
"HTTP_RULE")
.cloudApplications(
"GOOGLE_WEBMAIL",
"WINDOWS_LIVE_HOTMAIL")
.withoutContentInspection(false)
.matchOnly(false)
.parentRule(parentRule.id())
.build());
}
}
resources:
parentRule:
type: zia:DLPWebRules
properties:
description: ParentRule1
action: ALLOW
state: ENABLED
order: 1
rank: 0
protocols:
- FTP_RULE
- HTTPS_RULE
- HTTP_RULE
cloudApplications:
- GOOGLE_WEBMAIL
- WINDOWS_LIVE_HOTMAIL
withoutContentInspection: false
matchOnly: false
minSize: 20
zscalerIncidentReceiver: true
subrule1:
type: zia:DLPWebRules
properties:
description: SubRule1
action: ALLOW
state: ENABLED
order: 1
rank: 0
protocols:
- FTP_RULE
- HTTPS_RULE
- HTTP_RULE
cloudApplications:
- GOOGLE_WEBMAIL
- WINDOWS_LIVE_HOTMAIL
withoutContentInspection: false
matchOnly: false
parentRule: ${parentRule.id}
Create DLPWebRules Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new DLPWebRules(name: string, args?: DLPWebRulesArgs, opts?: CustomResourceOptions);
@overload
def DLPWebRules(resource_name: str,
args: Optional[DLPWebRulesArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def DLPWebRules(resource_name: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
auditors: Optional[Sequence[DLPWebRulesAuditorArgs]] = None,
cloud_applications: Optional[Sequence[str]] = None,
departments: Optional[DLPWebRulesDepartmentsArgs] = None,
description: Optional[str] = None,
dlp_download_scan_enabled: Optional[bool] = None,
dlp_engines: Optional[DLPWebRulesDlpEnginesArgs] = None,
excluded_departments: Optional[DLPWebRulesExcludedDepartmentsArgs] = None,
excluded_domain_profiles: Optional[DLPWebRulesExcludedDomainProfilesArgs] = None,
excluded_groups: Optional[DLPWebRulesExcludedGroupsArgs] = None,
excluded_users: Optional[DLPWebRulesExcludedUsersArgs] = None,
external_auditor_email: Optional[str] = None,
file_types: Optional[Sequence[str]] = None,
groups: Optional[DLPWebRulesGroupsArgs] = None,
icap_servers: Optional[Sequence[DLPWebRulesIcapServerArgs]] = None,
included_domain_profiles: Optional[DLPWebRulesIncludedDomainProfilesArgs] = None,
labels: Optional[DLPWebRulesLabelsArgs] = None,
location_groups: Optional[DLPWebRulesLocationGroupsArgs] = None,
locations: Optional[DLPWebRulesLocationsArgs] = None,
match_only: Optional[bool] = None,
min_size: Optional[int] = None,
name: Optional[str] = None,
notification_templates: Optional[Sequence[DLPWebRulesNotificationTemplateArgs]] = None,
order: Optional[int] = None,
parent_rule: Optional[int] = None,
protocols: Optional[Sequence[str]] = None,
rank: Optional[int] = None,
severity: Optional[str] = None,
source_ip_groups: Optional[DLPWebRulesSourceIpGroupsArgs] = None,
state: Optional[str] = None,
sub_rules: Optional[Sequence[str]] = None,
time_windows: Optional[DLPWebRulesTimeWindowsArgs] = None,
url_categories: Optional[DLPWebRulesUrlCategoriesArgs] = None,
user_risk_score_levels: Optional[Sequence[str]] = None,
users: Optional[DLPWebRulesUsersArgs] = None,
without_content_inspection: Optional[bool] = None,
workload_groups: Optional[Sequence[DLPWebRulesWorkloadGroupArgs]] = None,
zcc_notifications_enabled: Optional[bool] = None,
zscaler_incident_receiver: Optional[bool] = None)
func NewDLPWebRules(ctx *Context, name string, args *DLPWebRulesArgs, opts ...ResourceOption) (*DLPWebRules, error)
public DLPWebRules(string name, DLPWebRulesArgs? args = null, CustomResourceOptions? opts = null)
public DLPWebRules(String name, DLPWebRulesArgs args)
public DLPWebRules(String name, DLPWebRulesArgs args, CustomResourceOptions options)
type: zia:DLPWebRules
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args DLPWebRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args DLPWebRulesArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args DLPWebRulesArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args DLPWebRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args DLPWebRulesArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var dlpwebRulesResource = new Zia.DLPWebRules("dlpwebRulesResource", new()
{
Action = "string",
Auditors = new[]
{
new Zia.Inputs.DLPWebRulesAuditorArgs
{
Id = 0,
},
},
CloudApplications = new[]
{
"string",
},
Departments = new Zia.Inputs.DLPWebRulesDepartmentsArgs
{
Ids = new[]
{
0,
},
},
Description = "string",
DlpDownloadScanEnabled = false,
DlpEngines = new Zia.Inputs.DLPWebRulesDlpEnginesArgs
{
Ids = new[]
{
0,
},
},
ExcludedDepartments = new Zia.Inputs.DLPWebRulesExcludedDepartmentsArgs
{
Ids = new[]
{
0,
},
},
ExcludedDomainProfiles = new Zia.Inputs.DLPWebRulesExcludedDomainProfilesArgs
{
Ids = new[]
{
0,
},
},
ExcludedGroups = new Zia.Inputs.DLPWebRulesExcludedGroupsArgs
{
Ids = new[]
{
0,
},
},
ExcludedUsers = new Zia.Inputs.DLPWebRulesExcludedUsersArgs
{
Ids = new[]
{
0,
},
},
ExternalAuditorEmail = "string",
FileTypes = new[]
{
"string",
},
Groups = new Zia.Inputs.DLPWebRulesGroupsArgs
{
Ids = new[]
{
0,
},
},
IcapServers = new[]
{
new Zia.Inputs.DLPWebRulesIcapServerArgs
{
Id = 0,
},
},
IncludedDomainProfiles = new Zia.Inputs.DLPWebRulesIncludedDomainProfilesArgs
{
Ids = new[]
{
0,
},
},
Labels = new Zia.Inputs.DLPWebRulesLabelsArgs
{
Id = 0,
},
LocationGroups = new Zia.Inputs.DLPWebRulesLocationGroupsArgs
{
Ids = new[]
{
0,
},
},
Locations = new Zia.Inputs.DLPWebRulesLocationsArgs
{
Ids = new[]
{
0,
},
},
MatchOnly = false,
MinSize = 0,
Name = "string",
NotificationTemplates = new[]
{
new Zia.Inputs.DLPWebRulesNotificationTemplateArgs
{
Id = 0,
},
},
Order = 0,
ParentRule = 0,
Protocols = new[]
{
"string",
},
Rank = 0,
Severity = "string",
SourceIpGroups = new Zia.Inputs.DLPWebRulesSourceIpGroupsArgs
{
Ids = new[]
{
0,
},
},
State = "string",
SubRules = new[]
{
"string",
},
TimeWindows = new Zia.Inputs.DLPWebRulesTimeWindowsArgs
{
Ids = new[]
{
0,
},
},
UrlCategories = new Zia.Inputs.DLPWebRulesUrlCategoriesArgs
{
Ids = new[]
{
0,
},
},
UserRiskScoreLevels = new[]
{
"string",
},
Users = new Zia.Inputs.DLPWebRulesUsersArgs
{
Ids = new[]
{
0,
},
},
WithoutContentInspection = false,
WorkloadGroups = new[]
{
new Zia.Inputs.DLPWebRulesWorkloadGroupArgs
{
Id = 0,
Name = "string",
},
},
ZccNotificationsEnabled = false,
ZscalerIncidentReceiver = false,
});
example, err := zia.NewDLPWebRules(ctx, "dlpwebRulesResource", &zia.DLPWebRulesArgs{
Action: pulumi.String("string"),
Auditors: zia.DLPWebRulesAuditorArray{
&zia.DLPWebRulesAuditorArgs{
Id: pulumi.Int(0),
},
},
CloudApplications: pulumi.StringArray{
pulumi.String("string"),
},
Departments: &zia.DLPWebRulesDepartmentsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Description: pulumi.String("string"),
DlpDownloadScanEnabled: pulumi.Bool(false),
DlpEngines: &zia.DLPWebRulesDlpEnginesArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ExcludedDepartments: &zia.DLPWebRulesExcludedDepartmentsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ExcludedDomainProfiles: &zia.DLPWebRulesExcludedDomainProfilesArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ExcludedGroups: &zia.DLPWebRulesExcludedGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ExcludedUsers: &zia.DLPWebRulesExcludedUsersArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ExternalAuditorEmail: pulumi.String("string"),
FileTypes: pulumi.StringArray{
pulumi.String("string"),
},
Groups: &zia.DLPWebRulesGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
IcapServers: zia.DLPWebRulesIcapServerArray{
&zia.DLPWebRulesIcapServerArgs{
Id: pulumi.Int(0),
},
},
IncludedDomainProfiles: &zia.DLPWebRulesIncludedDomainProfilesArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Labels: &zia.DLPWebRulesLabelsArgs{
Id: pulumi.Int(0),
},
LocationGroups: &zia.DLPWebRulesLocationGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Locations: &zia.DLPWebRulesLocationsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
MatchOnly: pulumi.Bool(false),
MinSize: pulumi.Int(0),
Name: pulumi.String("string"),
NotificationTemplates: zia.DLPWebRulesNotificationTemplateArray{
&zia.DLPWebRulesNotificationTemplateArgs{
Id: pulumi.Int(0),
},
},
Order: pulumi.Int(0),
ParentRule: pulumi.Int(0),
Protocols: pulumi.StringArray{
pulumi.String("string"),
},
Rank: pulumi.Int(0),
Severity: pulumi.String("string"),
SourceIpGroups: &zia.DLPWebRulesSourceIpGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
State: pulumi.String("string"),
SubRules: pulumi.StringArray{
pulumi.String("string"),
},
TimeWindows: &zia.DLPWebRulesTimeWindowsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
UrlCategories: &zia.DLPWebRulesUrlCategoriesArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
UserRiskScoreLevels: pulumi.StringArray{
pulumi.String("string"),
},
Users: &zia.DLPWebRulesUsersArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
WithoutContentInspection: pulumi.Bool(false),
WorkloadGroups: zia.DLPWebRulesWorkloadGroupArray{
&zia.DLPWebRulesWorkloadGroupArgs{
Id: pulumi.Int(0),
Name: pulumi.String("string"),
},
},
ZccNotificationsEnabled: pulumi.Bool(false),
ZscalerIncidentReceiver: pulumi.Bool(false),
})
var dlpwebRulesResource = new DLPWebRules("dlpwebRulesResource", DLPWebRulesArgs.builder()
.action("string")
.auditors(DLPWebRulesAuditorArgs.builder()
.id(0)
.build())
.cloudApplications("string")
.departments(DLPWebRulesDepartmentsArgs.builder()
.ids(0)
.build())
.description("string")
.dlpDownloadScanEnabled(false)
.dlpEngines(DLPWebRulesDlpEnginesArgs.builder()
.ids(0)
.build())
.excludedDepartments(DLPWebRulesExcludedDepartmentsArgs.builder()
.ids(0)
.build())
.excludedDomainProfiles(DLPWebRulesExcludedDomainProfilesArgs.builder()
.ids(0)
.build())
.excludedGroups(DLPWebRulesExcludedGroupsArgs.builder()
.ids(0)
.build())
.excludedUsers(DLPWebRulesExcludedUsersArgs.builder()
.ids(0)
.build())
.externalAuditorEmail("string")
.fileTypes("string")
.groups(DLPWebRulesGroupsArgs.builder()
.ids(0)
.build())
.icapServers(DLPWebRulesIcapServerArgs.builder()
.id(0)
.build())
.includedDomainProfiles(DLPWebRulesIncludedDomainProfilesArgs.builder()
.ids(0)
.build())
.labels(DLPWebRulesLabelsArgs.builder()
.id(0)
.build())
.locationGroups(DLPWebRulesLocationGroupsArgs.builder()
.ids(0)
.build())
.locations(DLPWebRulesLocationsArgs.builder()
.ids(0)
.build())
.matchOnly(false)
.minSize(0)
.name("string")
.notificationTemplates(DLPWebRulesNotificationTemplateArgs.builder()
.id(0)
.build())
.order(0)
.parentRule(0)
.protocols("string")
.rank(0)
.severity("string")
.sourceIpGroups(DLPWebRulesSourceIpGroupsArgs.builder()
.ids(0)
.build())
.state("string")
.subRules("string")
.timeWindows(DLPWebRulesTimeWindowsArgs.builder()
.ids(0)
.build())
.urlCategories(DLPWebRulesUrlCategoriesArgs.builder()
.ids(0)
.build())
.userRiskScoreLevels("string")
.users(DLPWebRulesUsersArgs.builder()
.ids(0)
.build())
.withoutContentInspection(false)
.workloadGroups(DLPWebRulesWorkloadGroupArgs.builder()
.id(0)
.name("string")
.build())
.zccNotificationsEnabled(false)
.zscalerIncidentReceiver(false)
.build());
dlpweb_rules_resource = zia.DLPWebRules("dlpwebRulesResource",
action="string",
auditors=[{
"id": 0,
}],
cloud_applications=["string"],
departments={
"ids": [0],
},
description="string",
dlp_download_scan_enabled=False,
dlp_engines={
"ids": [0],
},
excluded_departments={
"ids": [0],
},
excluded_domain_profiles={
"ids": [0],
},
excluded_groups={
"ids": [0],
},
excluded_users={
"ids": [0],
},
external_auditor_email="string",
file_types=["string"],
groups={
"ids": [0],
},
icap_servers=[{
"id": 0,
}],
included_domain_profiles={
"ids": [0],
},
labels={
"id": 0,
},
location_groups={
"ids": [0],
},
locations={
"ids": [0],
},
match_only=False,
min_size=0,
name="string",
notification_templates=[{
"id": 0,
}],
order=0,
parent_rule=0,
protocols=["string"],
rank=0,
severity="string",
source_ip_groups={
"ids": [0],
},
state="string",
sub_rules=["string"],
time_windows={
"ids": [0],
},
url_categories={
"ids": [0],
},
user_risk_score_levels=["string"],
users={
"ids": [0],
},
without_content_inspection=False,
workload_groups=[{
"id": 0,
"name": "string",
}],
zcc_notifications_enabled=False,
zscaler_incident_receiver=False)
const dlpwebRulesResource = new zia.DLPWebRules("dlpwebRulesResource", {
action: "string",
auditors: [{
id: 0,
}],
cloudApplications: ["string"],
departments: {
ids: [0],
},
description: "string",
dlpDownloadScanEnabled: false,
dlpEngines: {
ids: [0],
},
excludedDepartments: {
ids: [0],
},
excludedDomainProfiles: {
ids: [0],
},
excludedGroups: {
ids: [0],
},
excludedUsers: {
ids: [0],
},
externalAuditorEmail: "string",
fileTypes: ["string"],
groups: {
ids: [0],
},
icapServers: [{
id: 0,
}],
includedDomainProfiles: {
ids: [0],
},
labels: {
id: 0,
},
locationGroups: {
ids: [0],
},
locations: {
ids: [0],
},
matchOnly: false,
minSize: 0,
name: "string",
notificationTemplates: [{
id: 0,
}],
order: 0,
parentRule: 0,
protocols: ["string"],
rank: 0,
severity: "string",
sourceIpGroups: {
ids: [0],
},
state: "string",
subRules: ["string"],
timeWindows: {
ids: [0],
},
urlCategories: {
ids: [0],
},
userRiskScoreLevels: ["string"],
users: {
ids: [0],
},
withoutContentInspection: false,
workloadGroups: [{
id: 0,
name: "string",
}],
zccNotificationsEnabled: false,
zscalerIncidentReceiver: false,
});
type: zia:DLPWebRules
properties:
action: string
auditors:
- id: 0
cloudApplications:
- string
departments:
ids:
- 0
description: string
dlpDownloadScanEnabled: false
dlpEngines:
ids:
- 0
excludedDepartments:
ids:
- 0
excludedDomainProfiles:
ids:
- 0
excludedGroups:
ids:
- 0
excludedUsers:
ids:
- 0
externalAuditorEmail: string
fileTypes:
- string
groups:
ids:
- 0
icapServers:
- id: 0
includedDomainProfiles:
ids:
- 0
labels:
id: 0
locationGroups:
ids:
- 0
locations:
ids:
- 0
matchOnly: false
minSize: 0
name: string
notificationTemplates:
- id: 0
order: 0
parentRule: 0
protocols:
- string
rank: 0
severity: string
sourceIpGroups:
ids:
- 0
state: string
subRules:
- string
timeWindows:
ids:
- 0
urlCategories:
ids:
- 0
userRiskScoreLevels:
- string
users:
ids:
- 0
withoutContentInspection: false
workloadGroups:
- id: 0
name: string
zccNotificationsEnabled: false
zscalerIncidentReceiver: false
DLPWebRules Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The DLPWebRules resource accepts the following input properties:
- Action string
- The action taken when traffic matches the DLP policy rule criteria.
- Auditors
List<zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Auditor> - The auditor to which the DLP policy rule must be applied.
- Cloud
Applications List<string> - The list of cloud applications to which the DLP policy rule must be applied.
- Departments
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Departments - The Name-ID pairs of departments to which the DLP policy rule must be applied.
- Description string
- The description of the DLP policy rule.
- Dlp
Download boolScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Dlp
Engines zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- Excluded
Departments zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Departments - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Domain zscaler.Profiles Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Groups zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Groups - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Users zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- External
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- File
Types List<string> - The list of file types for which the DLP policy rule must be applied.
- Groups
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied.
- Icap
Servers List<zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Icap Server> - The DLP server, using ICAP, to which the transaction content is forwarded.
- Included
Domain zscaler.Profiles Pulumi Package. Zia. Inputs. DLPWeb Rules Included Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Labels
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Labels - list of Labels that are applicable to the rule.
- Location
Groups zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- Locations
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied.
- Match
Only bool - The match only criteria for DLP engines.
- Min
Size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- Name string
- The DLP policy rule name.
- Notification
Templates List<zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Notification Template> - The template used for DLP notification emails.
- Order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- Parent
Rule int - The unique identifier of the parent rule under which an exception rule is added
- Protocols List<string>
- The protocol criteria specified for the DLP policy rule.
- Rank int
- Admin rank of the admin who creates this rule
- Severity string
- Indicates the severity selected for the DLP rule violation
- Source
Ip zscaler.Groups Pulumi Package. Zia. Inputs. DLPWeb Rules Source Ip Groups - list of source ip groups
- State string
- Enables or disables the DLP policy rule.
- Sub
Rules List<string> - The list of exception rules added to a parent rule
- Time
Windows zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Time Windows - list of time interval during which rule must be enforced.
- Url
Categories zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- User
Risk List<string>Score Levels - Users
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Without
Content boolInspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Workload
Groups List<zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Workload Group> - The list of preconfigured workload groups to which the policy must be applied
- Zcc
Notifications boolEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Zscaler
Incident boolReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- Action string
- The action taken when traffic matches the DLP policy rule criteria.
- Auditors
[]DLPWeb
Rules Auditor Args - The auditor to which the DLP policy rule must be applied.
- Cloud
Applications []string - The list of cloud applications to which the DLP policy rule must be applied.
- Departments
DLPWeb
Rules Departments Args - The Name-ID pairs of departments to which the DLP policy rule must be applied.
- Description string
- The description of the DLP policy rule.
- Dlp
Download boolScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Dlp
Engines DLPWebRules Dlp Engines Args - The list of DLP engines to which the DLP policy rule must be applied.
- Excluded
Departments DLPWebRules Excluded Departments Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Domain DLPWebProfiles Rules Excluded Domain Profiles Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Groups DLPWebRules Excluded Groups Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Users DLPWebRules Excluded Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- External
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- File
Types []string - The list of file types for which the DLP policy rule must be applied.
- Groups
DLPWeb
Rules Groups Args - The Name-ID pairs of groups to which the DLP policy rule must be applied.
- Icap
Servers []DLPWebRules Icap Server Args - The DLP server, using ICAP, to which the transaction content is forwarded.
- Included
Domain DLPWebProfiles Rules Included Domain Profiles Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Labels
DLPWeb
Rules Labels Args - list of Labels that are applicable to the rule.
- Location
Groups DLPWebRules Location Groups Args - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- Locations
DLPWeb
Rules Locations Args - The Name-ID pairs of locations to which the DLP policy rule must be applied.
- Match
Only bool - The match only criteria for DLP engines.
- Min
Size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- Name string
- The DLP policy rule name.
- Notification
Templates []DLPWebRules Notification Template Args - The template used for DLP notification emails.
- Order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- Parent
Rule int - The unique identifier of the parent rule under which an exception rule is added
- Protocols []string
- The protocol criteria specified for the DLP policy rule.
- Rank int
- Admin rank of the admin who creates this rule
- Severity string
- Indicates the severity selected for the DLP rule violation
- Source
Ip DLPWebGroups Rules Source Ip Groups Args - list of source ip groups
- State string
- Enables or disables the DLP policy rule.
- Sub
Rules []string - The list of exception rules added to a parent rule
- Time
Windows DLPWebRules Time Windows Args - list of time interval during which rule must be enforced.
- Url
Categories DLPWebRules Url Categories Args - The list of URL categories to which the DLP policy rule must be applied.
- User
Risk []stringScore Levels - Users
DLPWeb
Rules Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Without
Content boolInspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Workload
Groups []DLPWebRules Workload Group Args - The list of preconfigured workload groups to which the policy must be applied
- Zcc
Notifications boolEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Zscaler
Incident boolReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action String
- The action taken when traffic matches the DLP policy rule criteria.
- auditors
List<DLPWeb
Rules Auditor> - The auditor to which the DLP policy rule must be applied.
- cloud
Applications List<String> - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments - The Name-ID pairs of departments to which the DLP policy rule must be applied.
- description String
- The description of the DLP policy rule.
- dlp
Download BooleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines DLPWebRules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments DLPWebRules Excluded Departments - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Domain DLPWebProfiles Rules Excluded Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Groups DLPWebRules Excluded Groups - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Users DLPWebRules Excluded Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- external
Auditor StringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types List<String> - The list of file types for which the DLP policy rule must be applied.
- groups
DLPWeb
Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied.
- icap
Servers List<DLPWebRules Icap Server> - The DLP server, using ICAP, to which the transaction content is forwarded.
- included
Domain DLPWebProfiles Rules Included Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- labels
DLPWeb
Rules Labels - list of Labels that are applicable to the rule.
- location
Groups DLPWebRules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- locations
DLPWeb
Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied.
- match
Only Boolean - The match only criteria for DLP engines.
- min
Size Integer - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name String
- The DLP policy rule name.
- notification
Templates List<DLPWebRules Notification Template> - The template used for DLP notification emails.
- order Integer
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule Integer - The unique identifier of the parent rule under which an exception rule is added
- protocols List<String>
- The protocol criteria specified for the DLP policy rule.
- rank Integer
- Admin rank of the admin who creates this rule
- severity String
- Indicates the severity selected for the DLP rule violation
- source
Ip DLPWebGroups Rules Source Ip Groups - list of source ip groups
- state String
- Enables or disables the DLP policy rule.
- sub
Rules List<String> - The list of exception rules added to a parent rule
- time
Windows DLPWebRules Time Windows - list of time interval during which rule must be enforced.
- url
Categories DLPWebRules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk List<String>Score Levels - users
DLPWeb
Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- without
Content BooleanInspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- workload
Groups List<DLPWebRules Workload Group> - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications BooleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident BooleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action string
- The action taken when traffic matches the DLP policy rule criteria.
- auditors
DLPWeb
Rules Auditor[] - The auditor to which the DLP policy rule must be applied.
- cloud
Applications string[] - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments - The Name-ID pairs of departments to which the DLP policy rule must be applied.
- description string
- The description of the DLP policy rule.
- dlp
Download booleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines DLPWebRules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments DLPWebRules Excluded Departments - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Domain DLPWebProfiles Rules Excluded Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Groups DLPWebRules Excluded Groups - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Users DLPWebRules Excluded Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- external
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types string[] - The list of file types for which the DLP policy rule must be applied.
- groups
DLPWeb
Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied.
- icap
Servers DLPWebRules Icap Server[] - The DLP server, using ICAP, to which the transaction content is forwarded.
- included
Domain DLPWebProfiles Rules Included Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- labels
DLPWeb
Rules Labels - list of Labels that are applicable to the rule.
- location
Groups DLPWebRules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- locations
DLPWeb
Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied.
- match
Only boolean - The match only criteria for DLP engines.
- min
Size number - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name string
- The DLP policy rule name.
- notification
Templates DLPWebRules Notification Template[] - The template used for DLP notification emails.
- order number
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule number - The unique identifier of the parent rule under which an exception rule is added
- protocols string[]
- The protocol criteria specified for the DLP policy rule.
- rank number
- Admin rank of the admin who creates this rule
- severity string
- Indicates the severity selected for the DLP rule violation
- source
Ip DLPWebGroups Rules Source Ip Groups - list of source ip groups
- state string
- Enables or disables the DLP policy rule.
- sub
Rules string[] - The list of exception rules added to a parent rule
- time
Windows DLPWebRules Time Windows - list of time interval during which rule must be enforced.
- url
Categories DLPWebRules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk string[]Score Levels - users
DLPWeb
Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- without
Content booleanInspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- workload
Groups DLPWebRules Workload Group[] - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications booleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident booleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action str
- The action taken when traffic matches the DLP policy rule criteria.
- auditors
Sequence[DLPWeb
Rules Auditor Args] - The auditor to which the DLP policy rule must be applied.
- cloud_
applications Sequence[str] - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments Args - The Name-ID pairs of departments to which the DLP policy rule must be applied.
- description str
- The description of the DLP policy rule.
- dlp_
download_ boolscan_ enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp_
engines DLPWebRules Dlp Engines Args - The list of DLP engines to which the DLP policy rule must be applied.
- excluded_
departments DLPWebRules Excluded Departments Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded_
domain_ DLPWebprofiles Rules Excluded Domain Profiles Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded_
groups DLPWebRules Excluded Groups Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded_
users DLPWebRules Excluded Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- external_
auditor_ stremail - The email address of an external auditor to whom DLP email notifications are sent.
- file_
types Sequence[str] - The list of file types for which the DLP policy rule must be applied.
- groups
DLPWeb
Rules Groups Args - The Name-ID pairs of groups to which the DLP policy rule must be applied.
- icap_
servers Sequence[DLPWebRules Icap Server Args] - The DLP server, using ICAP, to which the transaction content is forwarded.
- included_
domain_ DLPWebprofiles Rules Included Domain Profiles Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- labels
DLPWeb
Rules Labels Args - list of Labels that are applicable to the rule.
- location_
groups DLPWebRules Location Groups Args - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- locations
DLPWeb
Rules Locations Args - The Name-ID pairs of locations to which the DLP policy rule must be applied.
- match_
only bool - The match only criteria for DLP engines.
- min_
size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name str
- The DLP policy rule name.
- notification_
templates Sequence[DLPWebRules Notification Template Args] - The template used for DLP notification emails.
- order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent_
rule int - The unique identifier of the parent rule under which an exception rule is added
- protocols Sequence[str]
- The protocol criteria specified for the DLP policy rule.
- rank int
- Admin rank of the admin who creates this rule
- severity str
- Indicates the severity selected for the DLP rule violation
- source_
ip_ DLPWebgroups Rules Source Ip Groups Args - list of source ip groups
- state str
- Enables or disables the DLP policy rule.
- sub_
rules Sequence[str] - The list of exception rules added to a parent rule
- time_
windows DLPWebRules Time Windows Args - list of time interval during which rule must be enforced.
- url_
categories DLPWebRules Url Categories Args - The list of URL categories to which the DLP policy rule must be applied.
- user_
risk_ Sequence[str]score_ levels - users
DLPWeb
Rules Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- without_
content_ boolinspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- workload_
groups Sequence[DLPWebRules Workload Group Args] - The list of preconfigured workload groups to which the policy must be applied
- zcc_
notifications_ boolenabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler_
incident_ boolreceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action String
- The action taken when traffic matches the DLP policy rule criteria.
- auditors List<Property Map>
- The auditor to which the DLP policy rule must be applied.
- cloud
Applications List<String> - The list of cloud applications to which the DLP policy rule must be applied.
- departments Property Map
- The Name-ID pairs of departments to which the DLP policy rule must be applied.
- description String
- The description of the DLP policy rule.
- dlp
Download BooleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines Property Map - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments Property Map - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Domain Property MapProfiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Groups Property Map - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Users Property Map - The Name-ID pairs of users to which the DLP policy rule must be applied.
- external
Auditor StringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types List<String> - The list of file types for which the DLP policy rule must be applied.
- groups Property Map
- The Name-ID pairs of groups to which the DLP policy rule must be applied.
- icap
Servers List<Property Map> - The DLP server, using ICAP, to which the transaction content is forwarded.
- included
Domain Property MapProfiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- labels Property Map
- list of Labels that are applicable to the rule.
- location
Groups Property Map - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- locations Property Map
- The Name-ID pairs of locations to which the DLP policy rule must be applied.
- match
Only Boolean - The match only criteria for DLP engines.
- min
Size Number - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name String
- The DLP policy rule name.
- notification
Templates List<Property Map> - The template used for DLP notification emails.
- order Number
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule Number - The unique identifier of the parent rule under which an exception rule is added
- protocols List<String>
- The protocol criteria specified for the DLP policy rule.
- rank Number
- Admin rank of the admin who creates this rule
- severity String
- Indicates the severity selected for the DLP rule violation
- source
Ip Property MapGroups - list of source ip groups
- state String
- Enables or disables the DLP policy rule.
- sub
Rules List<String> - The list of exception rules added to a parent rule
- time
Windows Property Map - list of time interval during which rule must be enforced.
- url
Categories Property Map - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk List<String>Score Levels - users Property Map
- The Name-ID pairs of users to which the DLP policy rule must be applied.
- without
Content BooleanInspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- workload
Groups List<Property Map> - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications BooleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident BooleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
Outputs
All input properties are implicitly available as output properties. Additionally, the DLPWebRules resource produces the following output properties:
Look up Existing DLPWebRules Resource
Get an existing DLPWebRules resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: DLPWebRulesState, opts?: CustomResourceOptions): DLPWebRules
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
auditors: Optional[Sequence[DLPWebRulesAuditorArgs]] = None,
cloud_applications: Optional[Sequence[str]] = None,
departments: Optional[DLPWebRulesDepartmentsArgs] = None,
description: Optional[str] = None,
dlp_download_scan_enabled: Optional[bool] = None,
dlp_engines: Optional[DLPWebRulesDlpEnginesArgs] = None,
excluded_departments: Optional[DLPWebRulesExcludedDepartmentsArgs] = None,
excluded_domain_profiles: Optional[DLPWebRulesExcludedDomainProfilesArgs] = None,
excluded_groups: Optional[DLPWebRulesExcludedGroupsArgs] = None,
excluded_users: Optional[DLPWebRulesExcludedUsersArgs] = None,
external_auditor_email: Optional[str] = None,
file_types: Optional[Sequence[str]] = None,
groups: Optional[DLPWebRulesGroupsArgs] = None,
icap_servers: Optional[Sequence[DLPWebRulesIcapServerArgs]] = None,
included_domain_profiles: Optional[DLPWebRulesIncludedDomainProfilesArgs] = None,
labels: Optional[DLPWebRulesLabelsArgs] = None,
location_groups: Optional[DLPWebRulesLocationGroupsArgs] = None,
locations: Optional[DLPWebRulesLocationsArgs] = None,
match_only: Optional[bool] = None,
min_size: Optional[int] = None,
name: Optional[str] = None,
notification_templates: Optional[Sequence[DLPWebRulesNotificationTemplateArgs]] = None,
order: Optional[int] = None,
parent_rule: Optional[int] = None,
protocols: Optional[Sequence[str]] = None,
rank: Optional[int] = None,
rule_id: Optional[int] = None,
severity: Optional[str] = None,
source_ip_groups: Optional[DLPWebRulesSourceIpGroupsArgs] = None,
state: Optional[str] = None,
sub_rules: Optional[Sequence[str]] = None,
time_windows: Optional[DLPWebRulesTimeWindowsArgs] = None,
url_categories: Optional[DLPWebRulesUrlCategoriesArgs] = None,
user_risk_score_levels: Optional[Sequence[str]] = None,
users: Optional[DLPWebRulesUsersArgs] = None,
without_content_inspection: Optional[bool] = None,
workload_groups: Optional[Sequence[DLPWebRulesWorkloadGroupArgs]] = None,
zcc_notifications_enabled: Optional[bool] = None,
zscaler_incident_receiver: Optional[bool] = None) -> DLPWebRules
func GetDLPWebRules(ctx *Context, name string, id IDInput, state *DLPWebRulesState, opts ...ResourceOption) (*DLPWebRules, error)
public static DLPWebRules Get(string name, Input<string> id, DLPWebRulesState? state, CustomResourceOptions? opts = null)
public static DLPWebRules get(String name, Output<String> id, DLPWebRulesState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- The action taken when traffic matches the DLP policy rule criteria.
- Auditors
List<zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Auditor> - The auditor to which the DLP policy rule must be applied.
- Cloud
Applications List<string> - The list of cloud applications to which the DLP policy rule must be applied.
- Departments
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Departments - The Name-ID pairs of departments to which the DLP policy rule must be applied.
- Description string
- The description of the DLP policy rule.
- Dlp
Download boolScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Dlp
Engines zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- Excluded
Departments zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Departments - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Domain zscaler.Profiles Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Groups zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Groups - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Users zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Excluded Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- External
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- File
Types List<string> - The list of file types for which the DLP policy rule must be applied.
- Groups
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied.
- Icap
Servers List<zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Icap Server> - The DLP server, using ICAP, to which the transaction content is forwarded.
- Included
Domain zscaler.Profiles Pulumi Package. Zia. Inputs. DLPWeb Rules Included Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Labels
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Labels - list of Labels that are applicable to the rule.
- Location
Groups zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- Locations
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied.
- Match
Only bool - The match only criteria for DLP engines.
- Min
Size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- Name string
- The DLP policy rule name.
- Notification
Templates List<zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Notification Template> - The template used for DLP notification emails.
- Order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- Parent
Rule int - The unique identifier of the parent rule under which an exception rule is added
- Protocols List<string>
- The protocol criteria specified for the DLP policy rule.
- Rank int
- Admin rank of the admin who creates this rule
- Rule
Id int - Severity string
- Indicates the severity selected for the DLP rule violation
- Source
Ip zscaler.Groups Pulumi Package. Zia. Inputs. DLPWeb Rules Source Ip Groups - list of source ip groups
- State string
- Enables or disables the DLP policy rule.
- Sub
Rules List<string> - The list of exception rules added to a parent rule
- Time
Windows zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Time Windows - list of time interval during which rule must be enforced.
- Url
Categories zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- User
Risk List<string>Score Levels - Users
zscaler.
Pulumi Package. Zia. Inputs. DLPWeb Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Without
Content boolInspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Workload
Groups List<zscaler.Pulumi Package. Zia. Inputs. DLPWeb Rules Workload Group> - The list of preconfigured workload groups to which the policy must be applied
- Zcc
Notifications boolEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Zscaler
Incident boolReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- Action string
- The action taken when traffic matches the DLP policy rule criteria.
- Auditors
[]DLPWeb
Rules Auditor Args - The auditor to which the DLP policy rule must be applied.
- Cloud
Applications []string - The list of cloud applications to which the DLP policy rule must be applied.
- Departments
DLPWeb
Rules Departments Args - The Name-ID pairs of departments to which the DLP policy rule must be applied.
- Description string
- The description of the DLP policy rule.
- Dlp
Download boolScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Dlp
Engines DLPWebRules Dlp Engines Args - The list of DLP engines to which the DLP policy rule must be applied.
- Excluded
Departments DLPWebRules Excluded Departments Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Domain DLPWebProfiles Rules Excluded Domain Profiles Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Groups DLPWebRules Excluded Groups Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Excluded
Users DLPWebRules Excluded Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- External
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- File
Types []string - The list of file types for which the DLP policy rule must be applied.
- Groups
DLPWeb
Rules Groups Args - The Name-ID pairs of groups to which the DLP policy rule must be applied.
- Icap
Servers []DLPWebRules Icap Server Args - The DLP server, using ICAP, to which the transaction content is forwarded.
- Included
Domain DLPWebProfiles Rules Included Domain Profiles Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Labels
DLPWeb
Rules Labels Args - list of Labels that are applicable to the rule.
- Location
Groups DLPWebRules Location Groups Args - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- Locations
DLPWeb
Rules Locations Args - The Name-ID pairs of locations to which the DLP policy rule must be applied.
- Match
Only bool - The match only criteria for DLP engines.
- Min
Size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- Name string
- The DLP policy rule name.
- Notification
Templates []DLPWebRules Notification Template Args - The template used for DLP notification emails.
- Order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- Parent
Rule int - The unique identifier of the parent rule under which an exception rule is added
- Protocols []string
- The protocol criteria specified for the DLP policy rule.
- Rank int
- Admin rank of the admin who creates this rule
- Rule
Id int - Severity string
- Indicates the severity selected for the DLP rule violation
- Source
Ip DLPWebGroups Rules Source Ip Groups Args - list of source ip groups
- State string
- Enables or disables the DLP policy rule.
- Sub
Rules []string - The list of exception rules added to a parent rule
- Time
Windows DLPWebRules Time Windows Args - list of time interval during which rule must be enforced.
- Url
Categories DLPWebRules Url Categories Args - The list of URL categories to which the DLP policy rule must be applied.
- User
Risk []stringScore Levels - Users
DLPWeb
Rules Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- Without
Content boolInspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Workload
Groups []DLPWebRules Workload Group Args - The list of preconfigured workload groups to which the policy must be applied
- Zcc
Notifications boolEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- Zscaler
Incident boolReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action String
- The action taken when traffic matches the DLP policy rule criteria.
- auditors
List<DLPWeb
Rules Auditor> - The auditor to which the DLP policy rule must be applied.
- cloud
Applications List<String> - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments - The Name-ID pairs of departments to which the DLP policy rule must be applied.
- description String
- The description of the DLP policy rule.
- dlp
Download BooleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines DLPWebRules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments DLPWebRules Excluded Departments - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Domain DLPWebProfiles Rules Excluded Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Groups DLPWebRules Excluded Groups - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Users DLPWebRules Excluded Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- external
Auditor StringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types List<String> - The list of file types for which the DLP policy rule must be applied.
- groups
DLPWeb
Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied.
- icap
Servers List<DLPWebRules Icap Server> - The DLP server, using ICAP, to which the transaction content is forwarded.
- included
Domain DLPWebProfiles Rules Included Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- labels
DLPWeb
Rules Labels - list of Labels that are applicable to the rule.
- location
Groups DLPWebRules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- locations
DLPWeb
Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied.
- match
Only Boolean - The match only criteria for DLP engines.
- min
Size Integer - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name String
- The DLP policy rule name.
- notification
Templates List<DLPWebRules Notification Template> - The template used for DLP notification emails.
- order Integer
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule Integer - The unique identifier of the parent rule under which an exception rule is added
- protocols List<String>
- The protocol criteria specified for the DLP policy rule.
- rank Integer
- Admin rank of the admin who creates this rule
- rule
Id Integer - severity String
- Indicates the severity selected for the DLP rule violation
- source
Ip DLPWebGroups Rules Source Ip Groups - list of source ip groups
- state String
- Enables or disables the DLP policy rule.
- sub
Rules List<String> - The list of exception rules added to a parent rule
- time
Windows DLPWebRules Time Windows - list of time interval during which rule must be enforced.
- url
Categories DLPWebRules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk List<String>Score Levels - users
DLPWeb
Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- without
Content BooleanInspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- workload
Groups List<DLPWebRules Workload Group> - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications BooleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident BooleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action string
- The action taken when traffic matches the DLP policy rule criteria.
- auditors
DLPWeb
Rules Auditor[] - The auditor to which the DLP policy rule must be applied.
- cloud
Applications string[] - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments - The Name-ID pairs of departments to which the DLP policy rule must be applied.
- description string
- The description of the DLP policy rule.
- dlp
Download booleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines DLPWebRules Dlp Engines - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments DLPWebRules Excluded Departments - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Domain DLPWebProfiles Rules Excluded Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Groups DLPWebRules Excluded Groups - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Users DLPWebRules Excluded Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- external
Auditor stringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types string[] - The list of file types for which the DLP policy rule must be applied.
- groups
DLPWeb
Rules Groups - The Name-ID pairs of groups to which the DLP policy rule must be applied.
- icap
Servers DLPWebRules Icap Server[] - The DLP server, using ICAP, to which the transaction content is forwarded.
- included
Domain DLPWebProfiles Rules Included Domain Profiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- labels
DLPWeb
Rules Labels - list of Labels that are applicable to the rule.
- location
Groups DLPWebRules Location Groups - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- locations
DLPWeb
Rules Locations - The Name-ID pairs of locations to which the DLP policy rule must be applied.
- match
Only boolean - The match only criteria for DLP engines.
- min
Size number - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name string
- The DLP policy rule name.
- notification
Templates DLPWebRules Notification Template[] - The template used for DLP notification emails.
- order number
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule number - The unique identifier of the parent rule under which an exception rule is added
- protocols string[]
- The protocol criteria specified for the DLP policy rule.
- rank number
- Admin rank of the admin who creates this rule
- rule
Id number - severity string
- Indicates the severity selected for the DLP rule violation
- source
Ip DLPWebGroups Rules Source Ip Groups - list of source ip groups
- state string
- Enables or disables the DLP policy rule.
- sub
Rules string[] - The list of exception rules added to a parent rule
- time
Windows DLPWebRules Time Windows - list of time interval during which rule must be enforced.
- url
Categories DLPWebRules Url Categories - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk string[]Score Levels - users
DLPWeb
Rules Users - The Name-ID pairs of users to which the DLP policy rule must be applied.
- without
Content booleanInspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- workload
Groups DLPWebRules Workload Group[] - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications booleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident booleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action str
- The action taken when traffic matches the DLP policy rule criteria.
- auditors
Sequence[DLPWeb
Rules Auditor Args] - The auditor to which the DLP policy rule must be applied.
- cloud_
applications Sequence[str] - The list of cloud applications to which the DLP policy rule must be applied.
- departments
DLPWeb
Rules Departments Args - The Name-ID pairs of departments to which the DLP policy rule must be applied.
- description str
- The description of the DLP policy rule.
- dlp_
download_ boolscan_ enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp_
engines DLPWebRules Dlp Engines Args - The list of DLP engines to which the DLP policy rule must be applied.
- excluded_
departments DLPWebRules Excluded Departments Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded_
domain_ DLPWebprofiles Rules Excluded Domain Profiles Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded_
groups DLPWebRules Excluded Groups Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded_
users DLPWebRules Excluded Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- external_
auditor_ stremail - The email address of an external auditor to whom DLP email notifications are sent.
- file_
types Sequence[str] - The list of file types for which the DLP policy rule must be applied.
- groups
DLPWeb
Rules Groups Args - The Name-ID pairs of groups to which the DLP policy rule must be applied.
- icap_
servers Sequence[DLPWebRules Icap Server Args] - The DLP server, using ICAP, to which the transaction content is forwarded.
- included_
domain_ DLPWebprofiles Rules Included Domain Profiles Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- labels
DLPWeb
Rules Labels Args - list of Labels that are applicable to the rule.
- location_
groups DLPWebRules Location Groups Args - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- locations
DLPWeb
Rules Locations Args - The Name-ID pairs of locations to which the DLP policy rule must be applied.
- match_
only bool - The match only criteria for DLP engines.
- min_
size int - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name str
- The DLP policy rule name.
- notification_
templates Sequence[DLPWebRules Notification Template Args] - The template used for DLP notification emails.
- order int
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent_
rule int - The unique identifier of the parent rule under which an exception rule is added
- protocols Sequence[str]
- The protocol criteria specified for the DLP policy rule.
- rank int
- Admin rank of the admin who creates this rule
- rule_
id int - severity str
- Indicates the severity selected for the DLP rule violation
- source_
ip_ DLPWebgroups Rules Source Ip Groups Args - list of source ip groups
- state str
- Enables or disables the DLP policy rule.
- sub_
rules Sequence[str] - The list of exception rules added to a parent rule
- time_
windows DLPWebRules Time Windows Args - list of time interval during which rule must be enforced.
- url_
categories DLPWebRules Url Categories Args - The list of URL categories to which the DLP policy rule must be applied.
- user_
risk_ Sequence[str]score_ levels - users
DLPWeb
Rules Users Args - The Name-ID pairs of users to which the DLP policy rule must be applied.
- without_
content_ boolinspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- workload_
groups Sequence[DLPWebRules Workload Group Args] - The list of preconfigured workload groups to which the policy must be applied
- zcc_
notifications_ boolenabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler_
incident_ boolreceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
- action String
- The action taken when traffic matches the DLP policy rule criteria.
- auditors List<Property Map>
- The auditor to which the DLP policy rule must be applied.
- cloud
Applications List<String> - The list of cloud applications to which the DLP policy rule must be applied.
- departments Property Map
- The Name-ID pairs of departments to which the DLP policy rule must be applied.
- description String
- The description of the DLP policy rule.
- dlp
Download BooleanScan Enabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- dlp
Engines Property Map - The list of DLP engines to which the DLP policy rule must be applied.
- excluded
Departments Property Map - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Domain Property MapProfiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Groups Property Map - The Name-ID pairs of users to which the DLP policy rule must be applied.
- excluded
Users Property Map - The Name-ID pairs of users to which the DLP policy rule must be applied.
- external
Auditor StringEmail - The email address of an external auditor to whom DLP email notifications are sent.
- file
Types List<String> - The list of file types for which the DLP policy rule must be applied.
- groups Property Map
- The Name-ID pairs of groups to which the DLP policy rule must be applied.
- icap
Servers List<Property Map> - The DLP server, using ICAP, to which the transaction content is forwarded.
- included
Domain Property MapProfiles - The Name-ID pairs of users to which the DLP policy rule must be applied.
- labels Property Map
- list of Labels that are applicable to the rule.
- location
Groups Property Map - The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
- locations Property Map
- The Name-ID pairs of locations to which the DLP policy rule must be applied.
- match
Only Boolean - The match only criteria for DLP engines.
- min
Size Number - The minimum file size (in KB) used for evaluation of the DLP policy rule.
- name String
- The DLP policy rule name.
- notification
Templates List<Property Map> - The template used for DLP notification emails.
- order Number
- The rule order of execution for the DLP policy rule with respect to other rules.
- parent
Rule Number - The unique identifier of the parent rule under which an exception rule is added
- protocols List<String>
- The protocol criteria specified for the DLP policy rule.
- rank Number
- Admin rank of the admin who creates this rule
- rule
Id Number - severity String
- Indicates the severity selected for the DLP rule violation
- source
Ip Property MapGroups - list of source ip groups
- state String
- Enables or disables the DLP policy rule.
- sub
Rules List<String> - The list of exception rules added to a parent rule
- time
Windows Property Map - list of time interval during which rule must be enforced.
- url
Categories Property Map - The list of URL categories to which the DLP policy rule must be applied.
- user
Risk List<String>Score Levels - users Property Map
- The Name-ID pairs of users to which the DLP policy rule must be applied.
- without
Content BooleanInspection - Indicates a DLP policy rule without content inspection, when the value is set to true.
- workload
Groups List<Property Map> - The list of preconfigured workload groups to which the policy must be applied
- zcc
Notifications BooleanEnabled - Indicates a DLP policy rule without content inspection, when the value is set to true.
- zscaler
Incident BooleanReceiver - Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
Supporting Types
DLPWebRulesAuditor, DLPWebRulesAuditorArgs
- Id int
- Id int
- id Integer
- id number
- id int
- id Number
DLPWebRulesDepartments, DLPWebRulesDepartmentsArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesDlpEngines, DLPWebRulesDlpEnginesArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesExcludedDepartments, DLPWebRulesExcludedDepartmentsArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesExcludedDomainProfiles, DLPWebRulesExcludedDomainProfilesArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesExcludedGroups, DLPWebRulesExcludedGroupsArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesExcludedUsers, DLPWebRulesExcludedUsersArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesGroups, DLPWebRulesGroupsArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesIcapServer, DLPWebRulesIcapServerArgs
- Id int
- Id int
- id Integer
- id number
- id int
- id Number
DLPWebRulesIncludedDomainProfiles, DLPWebRulesIncludedDomainProfilesArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesLabels, DLPWebRulesLabelsArgs
- Id int
- Id int
- id Integer
- id number
- id int
- id Number
DLPWebRulesLocationGroups, DLPWebRulesLocationGroupsArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesLocations, DLPWebRulesLocationsArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesNotificationTemplate, DLPWebRulesNotificationTemplateArgs
- Id int
- Id int
- id Integer
- id number
- id int
- id Number
DLPWebRulesSourceIpGroups, DLPWebRulesSourceIpGroupsArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesTimeWindows, DLPWebRulesTimeWindowsArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesUrlCategories, DLPWebRulesUrlCategoriesArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesUsers, DLPWebRulesUsersArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
DLPWebRulesWorkloadGroup, DLPWebRulesWorkloadGroupArgs
Import
Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.
Visit
zia_dlp_web_rules can be imported by using <RULE ID>
or <RULE NAME>
as the import ID.
For example:
$ pulumi import zia:index/dLPWebRules:DLPWebRules example <rule_id>
or
$ pulumi import zia:index/dLPWebRules:DLPWebRules example <rule_name>
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
- This Pulumi package is based on the
zia
Terraform Provider.