1. Packages
  2. Zscaler Internet Access (ZIA)
  3. API Docs
  4. DLPWebRules
Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler

zia.DLPWebRules

Explore with Pulumi AI

zia logo
Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler

    The zia_dlp_web_rules resource allows the creation and management of ZIA DLP Web Rules in the Zscaler Internet Access cloud or via the API.

    ⚠️ WARNING: Zscaler Internet Access DLP supports a maximum of 127 Web DLP Rules to be created via API.

    Example Usage

    “ALL_OUTBOUND” File Type"

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const thisDLPEngines = zia.getDLPEngines({
        predefinedEngineName: "EXTERNAL",
    });
    const thisDLPWebRules = new zia.DLPWebRules("thisDLPWebRules", {
        description: "Example",
        action: "BLOCK",
        order: 1,
        rank: 7,
        state: "ENABLED",
        protocols: [
            "FTP_RULE",
            "HTTPS_RULE",
            "HTTP_RULE",
        ],
        fileTypes: ["ALL_OUTBOUND"],
        zscalerIncidentReceiver: false,
        withoutContentInspection: false,
        userRiskScoreLevels: [
            "LOW",
            "MEDIUM",
            "HIGH",
            "CRITICAL",
        ],
        severity: "RULE_SEVERITY_HIGH",
        dlpEngines: {
            ids: [thisDLPEngines.then(thisDLPEngines => thisDLPEngines.id)],
        },
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    this_dlp_engines = zia.get_dlp_engines(predefined_engine_name="EXTERNAL")
    this_dlp_web_rules = zia.DLPWebRules("thisDLPWebRules",
        description="Example",
        action="BLOCK",
        order=1,
        rank=7,
        state="ENABLED",
        protocols=[
            "FTP_RULE",
            "HTTPS_RULE",
            "HTTP_RULE",
        ],
        file_types=["ALL_OUTBOUND"],
        zscaler_incident_receiver=False,
        without_content_inspection=False,
        user_risk_score_levels=[
            "LOW",
            "MEDIUM",
            "HIGH",
            "CRITICAL",
        ],
        severity="RULE_SEVERITY_HIGH",
        dlp_engines=zia.DLPWebRulesDlpEnginesArgs(
            ids=[this_dlp_engines.id],
        ))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		thisDLPEngines, err := zia.LookupDLPEngines(ctx, &zia.LookupDLPEnginesArgs{
    			PredefinedEngineName: pulumi.StringRef("EXTERNAL"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		_, err = zia.NewDLPWebRules(ctx, "thisDLPWebRules", &zia.DLPWebRulesArgs{
    			Description: pulumi.String("Example"),
    			Action:      pulumi.String("BLOCK"),
    			Order:       pulumi.Int(1),
    			Rank:        pulumi.Int(7),
    			State:       pulumi.String("ENABLED"),
    			Protocols: pulumi.StringArray{
    				pulumi.String("FTP_RULE"),
    				pulumi.String("HTTPS_RULE"),
    				pulumi.String("HTTP_RULE"),
    			},
    			FileTypes: pulumi.StringArray{
    				pulumi.String("ALL_OUTBOUND"),
    			},
    			ZscalerIncidentReceiver:  pulumi.Bool(false),
    			WithoutContentInspection: pulumi.Bool(false),
    			UserRiskScoreLevels: pulumi.StringArray{
    				pulumi.String("LOW"),
    				pulumi.String("MEDIUM"),
    				pulumi.String("HIGH"),
    				pulumi.String("CRITICAL"),
    			},
    			Severity: pulumi.String("RULE_SEVERITY_HIGH"),
    			DlpEngines: &zia.DLPWebRulesDlpEnginesArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(thisDLPEngines.Id),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var thisDLPEngines = Zia.GetDLPEngines.Invoke(new()
        {
            PredefinedEngineName = "EXTERNAL",
        });
    
        var thisDLPWebRules = new Zia.DLPWebRules("thisDLPWebRules", new()
        {
            Description = "Example",
            Action = "BLOCK",
            Order = 1,
            Rank = 7,
            State = "ENABLED",
            Protocols = new[]
            {
                "FTP_RULE",
                "HTTPS_RULE",
                "HTTP_RULE",
            },
            FileTypes = new[]
            {
                "ALL_OUTBOUND",
            },
            ZscalerIncidentReceiver = false,
            WithoutContentInspection = false,
            UserRiskScoreLevels = new[]
            {
                "LOW",
                "MEDIUM",
                "HIGH",
                "CRITICAL",
            },
            Severity = "RULE_SEVERITY_HIGH",
            DlpEngines = new Zia.Inputs.DLPWebRulesDlpEnginesArgs
            {
                Ids = new[]
                {
                    thisDLPEngines.Apply(getDLPEnginesResult => getDLPEnginesResult.Id),
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetDLPEnginesArgs;
    import com.pulumi.zia.DLPWebRules;
    import com.pulumi.zia.DLPWebRulesArgs;
    import com.pulumi.zia.inputs.DLPWebRulesDlpEnginesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var thisDLPEngines = ZiaFunctions.getDLPEngines(GetDLPEnginesArgs.builder()
                .predefinedEngineName("EXTERNAL")
                .build());
    
            var thisDLPWebRules = new DLPWebRules("thisDLPWebRules", DLPWebRulesArgs.builder()
                .description("Example")
                .action("BLOCK")
                .order(1)
                .rank(7)
                .state("ENABLED")
                .protocols(            
                    "FTP_RULE",
                    "HTTPS_RULE",
                    "HTTP_RULE")
                .fileTypes("ALL_OUTBOUND")
                .zscalerIncidentReceiver(false)
                .withoutContentInspection(false)
                .userRiskScoreLevels(            
                    "LOW",
                    "MEDIUM",
                    "HIGH",
                    "CRITICAL")
                .severity("RULE_SEVERITY_HIGH")
                .dlpEngines(DLPWebRulesDlpEnginesArgs.builder()
                    .ids(thisDLPEngines.applyValue(getDLPEnginesResult -> getDLPEnginesResult.id()))
                    .build())
                .build());
    
        }
    }
    
    resources:
      thisDLPWebRules:
        type: zia:DLPWebRules
        properties:
          description: Example
          action: BLOCK
          order: 1
          rank: 7
          state: ENABLED
          protocols:
            - FTP_RULE
            - HTTPS_RULE
            - HTTP_RULE
          fileTypes:
            - ALL_OUTBOUND
          zscalerIncidentReceiver: false
          withoutContentInspection: false
          userRiskScoreLevels:
            - LOW
            - MEDIUM
            - HIGH
            - CRITICAL
          severity: RULE_SEVERITY_HIGH
          dlpEngines:
            ids:
              - ${thisDLPEngines.id}
    variables:
      thisDLPEngines:
        fn::invoke:
          Function: zia:getDLPEngines
          Arguments:
            predefinedEngineName: EXTERNAL
    
    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const thisURLCategories = zia.getURLCategories({
        configuredName: "Example",
    });
    const thisIcapServers = zia.getIcapServers({
        name: "ZS_ICAP_01",
    });
    const thisDLPWebRules = new zia.DLPWebRules("thisDLPWebRules", {
        description: "Terraform_Test",
        action: "BLOCK",
        order: 1,
        protocols: [
            "FTP_RULE",
            "HTTPS_RULE",
            "HTTP_RULE",
        ],
        rank: 7,
        state: "ENABLED",
        zscalerIncidentReceiver: true,
        withoutContentInspection: false,
        urlCategories: {
            ids: [thisURLCategories.then(thisURLCategories => thisURLCategories.val)],
        },
        icapServers: [{
            id: thisIcapServers.then(thisIcapServers => thisIcapServers.id),
        }],
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    this_url_categories = zia.get_url_categories(configured_name="Example")
    this_icap_servers = zia.get_icap_servers(name="ZS_ICAP_01")
    this_dlp_web_rules = zia.DLPWebRules("thisDLPWebRules",
        description="Terraform_Test",
        action="BLOCK",
        order=1,
        protocols=[
            "FTP_RULE",
            "HTTPS_RULE",
            "HTTP_RULE",
        ],
        rank=7,
        state="ENABLED",
        zscaler_incident_receiver=True,
        without_content_inspection=False,
        url_categories=zia.DLPWebRulesUrlCategoriesArgs(
            ids=[this_url_categories.val],
        ),
        icap_servers=[zia.DLPWebRulesIcapServerArgs(
            id=this_icap_servers.id,
        )])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		thisURLCategories, err := zia.LookupURLCategories(ctx, &zia.LookupURLCategoriesArgs{
    			ConfiguredName: pulumi.StringRef("Example"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		thisIcapServers, err := zia.GetIcapServers(ctx, &zia.GetIcapServersArgs{
    			Name: pulumi.StringRef("ZS_ICAP_01"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		_, err = zia.NewDLPWebRules(ctx, "thisDLPWebRules", &zia.DLPWebRulesArgs{
    			Description: pulumi.String("Terraform_Test"),
    			Action:      pulumi.String("BLOCK"),
    			Order:       pulumi.Int(1),
    			Protocols: pulumi.StringArray{
    				pulumi.String("FTP_RULE"),
    				pulumi.String("HTTPS_RULE"),
    				pulumi.String("HTTP_RULE"),
    			},
    			Rank:                     pulumi.Int(7),
    			State:                    pulumi.String("ENABLED"),
    			ZscalerIncidentReceiver:  pulumi.Bool(true),
    			WithoutContentInspection: pulumi.Bool(false),
    			UrlCategories: &zia.DLPWebRulesUrlCategoriesArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(thisURLCategories.Val),
    				},
    			},
    			IcapServers: zia.DLPWebRulesIcapServerArray{
    				&zia.DLPWebRulesIcapServerArgs{
    					Id: pulumi.Int(thisIcapServers.Id),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var thisURLCategories = Zia.GetURLCategories.Invoke(new()
        {
            ConfiguredName = "Example",
        });
    
        var thisIcapServers = Zia.GetIcapServers.Invoke(new()
        {
            Name = "ZS_ICAP_01",
        });
    
        var thisDLPWebRules = new Zia.DLPWebRules("thisDLPWebRules", new()
        {
            Description = "Terraform_Test",
            Action = "BLOCK",
            Order = 1,
            Protocols = new[]
            {
                "FTP_RULE",
                "HTTPS_RULE",
                "HTTP_RULE",
            },
            Rank = 7,
            State = "ENABLED",
            ZscalerIncidentReceiver = true,
            WithoutContentInspection = false,
            UrlCategories = new Zia.Inputs.DLPWebRulesUrlCategoriesArgs
            {
                Ids = new[]
                {
                    thisURLCategories.Apply(getURLCategoriesResult => getURLCategoriesResult.Val),
                },
            },
            IcapServers = new[]
            {
                new Zia.Inputs.DLPWebRulesIcapServerArgs
                {
                    Id = thisIcapServers.Apply(getIcapServersResult => getIcapServersResult.Id),
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetURLCategoriesArgs;
    import com.pulumi.zia.inputs.GetIcapServersArgs;
    import com.pulumi.zia.DLPWebRules;
    import com.pulumi.zia.DLPWebRulesArgs;
    import com.pulumi.zia.inputs.DLPWebRulesUrlCategoriesArgs;
    import com.pulumi.zia.inputs.DLPWebRulesIcapServerArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var thisURLCategories = ZiaFunctions.getURLCategories(GetURLCategoriesArgs.builder()
                .configuredName("Example")
                .build());
    
            final var thisIcapServers = ZiaFunctions.getIcapServers(GetIcapServersArgs.builder()
                .name("ZS_ICAP_01")
                .build());
    
            var thisDLPWebRules = new DLPWebRules("thisDLPWebRules", DLPWebRulesArgs.builder()
                .description("Terraform_Test")
                .action("BLOCK")
                .order(1)
                .protocols(            
                    "FTP_RULE",
                    "HTTPS_RULE",
                    "HTTP_RULE")
                .rank(7)
                .state("ENABLED")
                .zscalerIncidentReceiver(true)
                .withoutContentInspection(false)
                .urlCategories(DLPWebRulesUrlCategoriesArgs.builder()
                    .ids(thisURLCategories.applyValue(getURLCategoriesResult -> getURLCategoriesResult.val()))
                    .build())
                .icapServers(DLPWebRulesIcapServerArgs.builder()
                    .id(thisIcapServers.applyValue(getIcapServersResult -> getIcapServersResult.id()))
                    .build())
                .build());
    
        }
    }
    
    resources:
      thisDLPWebRules:
        type: zia:DLPWebRules
        properties:
          description: Terraform_Test
          action: BLOCK
          order: 1
          protocols:
            - FTP_RULE
            - HTTPS_RULE
            - HTTP_RULE
          rank: 7
          state: ENABLED
          zscalerIncidentReceiver: true
          withoutContentInspection: false
          urlCategories:
            ids:
              - ${thisURLCategories.val}
          icapServers:
            - id: ${thisIcapServers.id}
    variables:
      thisURLCategories:
        fn::invoke:
          Function: zia:getURLCategories
          Arguments:
            configuredName: Example
      thisIcapServers:
        fn::invoke:
          Function: zia:getIcapServers
          Arguments:
            name: ZS_ICAP_01
    

    “Specify Incident Receiver Setting”

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    import * as zia from "@pulumi/zia";
    
    const thisURLCategories = zia.getURLCategories({
        configuredName: "Example",
    });
    const thisDLPIncidentReceiverServers = zia.getDLPIncidentReceiverServers({
        name: "ZS_INC_RECEIVER_01",
    });
    const thisDLPWebRules = new zia.DLPWebRules("thisDLPWebRules", {
        description: "Terraform_Test",
        action: "BLOCK",
        order: 1,
        protocols: [
            "FTP_RULE",
            "HTTPS_RULE",
            "HTTP_RULE",
        ],
        rank: 7,
        state: "ENABLED",
        zscalerIncidentReceiver: true,
        withoutContentInspection: false,
        urlCategories: {
            ids: [thisURLCategories.then(thisURLCategories => thisURLCategories.val)],
        },
        icapServers: [{
            id: thisDLPIncidentReceiverServers.then(thisDLPIncidentReceiverServers => thisDLPIncidentReceiverServers.id),
        }],
    });
    
    import pulumi
    import pulumi_zia as zia
    import zscaler_pulumi_zia as zia
    
    this_url_categories = zia.get_url_categories(configured_name="Example")
    this_dlp_incident_receiver_servers = zia.get_dlp_incident_receiver_servers(name="ZS_INC_RECEIVER_01")
    this_dlp_web_rules = zia.DLPWebRules("thisDLPWebRules",
        description="Terraform_Test",
        action="BLOCK",
        order=1,
        protocols=[
            "FTP_RULE",
            "HTTPS_RULE",
            "HTTP_RULE",
        ],
        rank=7,
        state="ENABLED",
        zscaler_incident_receiver=True,
        without_content_inspection=False,
        url_categories=zia.DLPWebRulesUrlCategoriesArgs(
            ids=[this_url_categories.val],
        ),
        icap_servers=[zia.DLPWebRulesIcapServerArgs(
            id=this_dlp_incident_receiver_servers.id,
        )])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		thisURLCategories, err := zia.LookupURLCategories(ctx, &zia.LookupURLCategoriesArgs{
    			ConfiguredName: pulumi.StringRef("Example"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		thisDLPIncidentReceiverServers, err := zia.GetDLPIncidentReceiverServers(ctx, &zia.GetDLPIncidentReceiverServersArgs{
    			Name: pulumi.StringRef("ZS_INC_RECEIVER_01"),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		_, err = zia.NewDLPWebRules(ctx, "thisDLPWebRules", &zia.DLPWebRulesArgs{
    			Description: pulumi.String("Terraform_Test"),
    			Action:      pulumi.String("BLOCK"),
    			Order:       pulumi.Int(1),
    			Protocols: pulumi.StringArray{
    				pulumi.String("FTP_RULE"),
    				pulumi.String("HTTPS_RULE"),
    				pulumi.String("HTTP_RULE"),
    			},
    			Rank:                     pulumi.Int(7),
    			State:                    pulumi.String("ENABLED"),
    			ZscalerIncidentReceiver:  pulumi.Bool(true),
    			WithoutContentInspection: pulumi.Bool(false),
    			UrlCategories: &zia.DLPWebRulesUrlCategoriesArgs{
    				Ids: pulumi.IntArray{
    					pulumi.Int(thisURLCategories.Val),
    				},
    			},
    			IcapServers: zia.DLPWebRulesIcapServerArray{
    				&zia.DLPWebRulesIcapServerArgs{
    					Id: pulumi.Int(thisDLPIncidentReceiverServers.Id),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = Pulumi.Zia;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var thisURLCategories = Zia.GetURLCategories.Invoke(new()
        {
            ConfiguredName = "Example",
        });
    
        var thisDLPIncidentReceiverServers = Zia.GetDLPIncidentReceiverServers.Invoke(new()
        {
            Name = "ZS_INC_RECEIVER_01",
        });
    
        var thisDLPWebRules = new Zia.DLPWebRules("thisDLPWebRules", new()
        {
            Description = "Terraform_Test",
            Action = "BLOCK",
            Order = 1,
            Protocols = new[]
            {
                "FTP_RULE",
                "HTTPS_RULE",
                "HTTP_RULE",
            },
            Rank = 7,
            State = "ENABLED",
            ZscalerIncidentReceiver = true,
            WithoutContentInspection = false,
            UrlCategories = new Zia.Inputs.DLPWebRulesUrlCategoriesArgs
            {
                Ids = new[]
                {
                    thisURLCategories.Apply(getURLCategoriesResult => getURLCategoriesResult.Val),
                },
            },
            IcapServers = new[]
            {
                new Zia.Inputs.DLPWebRulesIcapServerArgs
                {
                    Id = thisDLPIncidentReceiverServers.Apply(getDLPIncidentReceiverServersResult => getDLPIncidentReceiverServersResult.Id),
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.ZiaFunctions;
    import com.pulumi.zia.inputs.GetURLCategoriesArgs;
    import com.pulumi.zia.inputs.GetDLPIncidentReceiverServersArgs;
    import com.pulumi.zia.DLPWebRules;
    import com.pulumi.zia.DLPWebRulesArgs;
    import com.pulumi.zia.inputs.DLPWebRulesUrlCategoriesArgs;
    import com.pulumi.zia.inputs.DLPWebRulesIcapServerArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var thisURLCategories = ZiaFunctions.getURLCategories(GetURLCategoriesArgs.builder()
                .configuredName("Example")
                .build());
    
            final var thisDLPIncidentReceiverServers = ZiaFunctions.getDLPIncidentReceiverServers(GetDLPIncidentReceiverServersArgs.builder()
                .name("ZS_INC_RECEIVER_01")
                .build());
    
            var thisDLPWebRules = new DLPWebRules("thisDLPWebRules", DLPWebRulesArgs.builder()
                .description("Terraform_Test")
                .action("BLOCK")
                .order(1)
                .protocols(            
                    "FTP_RULE",
                    "HTTPS_RULE",
                    "HTTP_RULE")
                .rank(7)
                .state("ENABLED")
                .zscalerIncidentReceiver(true)
                .withoutContentInspection(false)
                .urlCategories(DLPWebRulesUrlCategoriesArgs.builder()
                    .ids(thisURLCategories.applyValue(getURLCategoriesResult -> getURLCategoriesResult.val()))
                    .build())
                .icapServers(DLPWebRulesIcapServerArgs.builder()
                    .id(thisDLPIncidentReceiverServers.applyValue(getDLPIncidentReceiverServersResult -> getDLPIncidentReceiverServersResult.id()))
                    .build())
                .build());
    
        }
    }
    
    resources:
      thisDLPWebRules:
        type: zia:DLPWebRules
        properties:
          description: Terraform_Test
          action: BLOCK
          order: 1
          protocols:
            - FTP_RULE
            - HTTPS_RULE
            - HTTP_RULE
          rank: 7
          state: ENABLED
          zscalerIncidentReceiver: true
          withoutContentInspection: false
          urlCategories:
            ids:
              - ${thisURLCategories.val}
          icapServers:
            - id: ${thisDLPIncidentReceiverServers.id}
    variables:
      thisURLCategories:
        fn::invoke:
          Function: zia:getURLCategories
          Arguments:
            configuredName: Example
      thisDLPIncidentReceiverServers:
        fn::invoke:
          Function: zia:getDLPIncidentReceiverServers
          Arguments:
            name: ZS_INC_RECEIVER_01
    

    “Creating Parent Rules And SubRules”

    ⚠️ WARNING: Destroying a parent rule will also destroy all subrules

    NOTE Exception rules can be configured only when the inline DLP rule evaluation type is set to evaluate all DLP rules in the DLP Advanced Settings. To learn more, see Configuring DLP Advanced Settings

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    
    const parentRule = new zia.DLPWebRules("parentRule", {
        description: "ParentRule1",
        action: "ALLOW",
        state: "ENABLED",
        order: 1,
        rank: 0,
        protocols: [
            "FTP_RULE",
            "HTTPS_RULE",
            "HTTP_RULE",
        ],
        cloudApplications: [
            "GOOGLE_WEBMAIL",
            "WINDOWS_LIVE_HOTMAIL",
        ],
        withoutContentInspection: false,
        matchOnly: false,
        minSize: 20,
        zscalerIncidentReceiver: true,
    });
    const subrule1 = new zia.DLPWebRules("subrule1", {
        description: "SubRule1",
        action: "ALLOW",
        state: "ENABLED",
        order: 1,
        rank: 0,
        protocols: [
            "FTP_RULE",
            "HTTPS_RULE",
            "HTTP_RULE",
        ],
        cloudApplications: [
            "GOOGLE_WEBMAIL",
            "WINDOWS_LIVE_HOTMAIL",
        ],
        withoutContentInspection: false,
        matchOnly: false,
        parentRule: parentRule.id,
    });
    
    import pulumi
    import zscaler_pulumi_zia as zia
    
    parent_rule = zia.DLPWebRules("parentRule",
        description="ParentRule1",
        action="ALLOW",
        state="ENABLED",
        order=1,
        rank=0,
        protocols=[
            "FTP_RULE",
            "HTTPS_RULE",
            "HTTP_RULE",
        ],
        cloud_applications=[
            "GOOGLE_WEBMAIL",
            "WINDOWS_LIVE_HOTMAIL",
        ],
        without_content_inspection=False,
        match_only=False,
        min_size=20,
        zscaler_incident_receiver=True)
    subrule1 = zia.DLPWebRules("subrule1",
        description="SubRule1",
        action="ALLOW",
        state="ENABLED",
        order=1,
        rank=0,
        protocols=[
            "FTP_RULE",
            "HTTPS_RULE",
            "HTTP_RULE",
        ],
        cloud_applications=[
            "GOOGLE_WEBMAIL",
            "WINDOWS_LIVE_HOTMAIL",
        ],
        without_content_inspection=False,
        match_only=False,
        parent_rule=parent_rule.id)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		parentRule, err := zia.NewDLPWebRules(ctx, "parentRule", &zia.DLPWebRulesArgs{
    			Description: pulumi.String("ParentRule1"),
    			Action:      pulumi.String("ALLOW"),
    			State:       pulumi.String("ENABLED"),
    			Order:       pulumi.Int(1),
    			Rank:        pulumi.Int(0),
    			Protocols: pulumi.StringArray{
    				pulumi.String("FTP_RULE"),
    				pulumi.String("HTTPS_RULE"),
    				pulumi.String("HTTP_RULE"),
    			},
    			CloudApplications: pulumi.StringArray{
    				pulumi.String("GOOGLE_WEBMAIL"),
    				pulumi.String("WINDOWS_LIVE_HOTMAIL"),
    			},
    			WithoutContentInspection: pulumi.Bool(false),
    			MatchOnly:                pulumi.Bool(false),
    			MinSize:                  pulumi.Int(20),
    			ZscalerIncidentReceiver:  pulumi.Bool(true),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = zia.NewDLPWebRules(ctx, "subrule1", &zia.DLPWebRulesArgs{
    			Description: pulumi.String("SubRule1"),
    			Action:      pulumi.String("ALLOW"),
    			State:       pulumi.String("ENABLED"),
    			Order:       pulumi.Int(1),
    			Rank:        pulumi.Int(0),
    			Protocols: pulumi.StringArray{
    				pulumi.String("FTP_RULE"),
    				pulumi.String("HTTPS_RULE"),
    				pulumi.String("HTTP_RULE"),
    			},
    			CloudApplications: pulumi.StringArray{
    				pulumi.String("GOOGLE_WEBMAIL"),
    				pulumi.String("WINDOWS_LIVE_HOTMAIL"),
    			},
    			WithoutContentInspection: pulumi.Bool(false),
    			MatchOnly:                pulumi.Bool(false),
    			ParentRule:               parentRule.ID(),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        var parentRule = new Zia.DLPWebRules("parentRule", new()
        {
            Description = "ParentRule1",
            Action = "ALLOW",
            State = "ENABLED",
            Order = 1,
            Rank = 0,
            Protocols = new[]
            {
                "FTP_RULE",
                "HTTPS_RULE",
                "HTTP_RULE",
            },
            CloudApplications = new[]
            {
                "GOOGLE_WEBMAIL",
                "WINDOWS_LIVE_HOTMAIL",
            },
            WithoutContentInspection = false,
            MatchOnly = false,
            MinSize = 20,
            ZscalerIncidentReceiver = true,
        });
    
        var subrule1 = new Zia.DLPWebRules("subrule1", new()
        {
            Description = "SubRule1",
            Action = "ALLOW",
            State = "ENABLED",
            Order = 1,
            Rank = 0,
            Protocols = new[]
            {
                "FTP_RULE",
                "HTTPS_RULE",
                "HTTP_RULE",
            },
            CloudApplications = new[]
            {
                "GOOGLE_WEBMAIL",
                "WINDOWS_LIVE_HOTMAIL",
            },
            WithoutContentInspection = false,
            MatchOnly = false,
            ParentRule = parentRule.Id,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.DLPWebRules;
    import com.pulumi.zia.DLPWebRulesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var parentRule = new DLPWebRules("parentRule", DLPWebRulesArgs.builder()
                .description("ParentRule1")
                .action("ALLOW")
                .state("ENABLED")
                .order(1)
                .rank(0)
                .protocols(            
                    "FTP_RULE",
                    "HTTPS_RULE",
                    "HTTP_RULE")
                .cloudApplications(            
                    "GOOGLE_WEBMAIL",
                    "WINDOWS_LIVE_HOTMAIL")
                .withoutContentInspection(false)
                .matchOnly(false)
                .minSize(20)
                .zscalerIncidentReceiver(true)
                .build());
    
            var subrule1 = new DLPWebRules("subrule1", DLPWebRulesArgs.builder()
                .description("SubRule1")
                .action("ALLOW")
                .state("ENABLED")
                .order(1)
                .rank(0)
                .protocols(            
                    "FTP_RULE",
                    "HTTPS_RULE",
                    "HTTP_RULE")
                .cloudApplications(            
                    "GOOGLE_WEBMAIL",
                    "WINDOWS_LIVE_HOTMAIL")
                .withoutContentInspection(false)
                .matchOnly(false)
                .parentRule(parentRule.id())
                .build());
    
        }
    }
    
    resources:
      parentRule:
        type: zia:DLPWebRules
        properties:
          description: ParentRule1
          action: ALLOW
          state: ENABLED
          order: 1
          rank: 0
          protocols:
            - FTP_RULE
            - HTTPS_RULE
            - HTTP_RULE
          cloudApplications:
            - GOOGLE_WEBMAIL
            - WINDOWS_LIVE_HOTMAIL
          withoutContentInspection: false
          matchOnly: false
          minSize: 20
          zscalerIncidentReceiver: true
      subrule1:
        type: zia:DLPWebRules
        properties:
          description: SubRule1
          action: ALLOW
          state: ENABLED
          order: 1
          rank: 0
          protocols:
            - FTP_RULE
            - HTTPS_RULE
            - HTTP_RULE
          cloudApplications:
            - GOOGLE_WEBMAIL
            - WINDOWS_LIVE_HOTMAIL
          withoutContentInspection: false
          matchOnly: false
          parentRule: ${parentRule.id}
    

    Create DLPWebRules Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new DLPWebRules(name: string, args?: DLPWebRulesArgs, opts?: CustomResourceOptions);
    @overload
    def DLPWebRules(resource_name: str,
                    args: Optional[DLPWebRulesArgs] = None,
                    opts: Optional[ResourceOptions] = None)
    
    @overload
    def DLPWebRules(resource_name: str,
                    opts: Optional[ResourceOptions] = None,
                    action: Optional[str] = None,
                    auditors: Optional[Sequence[DLPWebRulesAuditorArgs]] = None,
                    cloud_applications: Optional[Sequence[str]] = None,
                    departments: Optional[DLPWebRulesDepartmentsArgs] = None,
                    description: Optional[str] = None,
                    dlp_download_scan_enabled: Optional[bool] = None,
                    dlp_engines: Optional[DLPWebRulesDlpEnginesArgs] = None,
                    excluded_departments: Optional[DLPWebRulesExcludedDepartmentsArgs] = None,
                    excluded_domain_profiles: Optional[DLPWebRulesExcludedDomainProfilesArgs] = None,
                    excluded_groups: Optional[DLPWebRulesExcludedGroupsArgs] = None,
                    excluded_users: Optional[DLPWebRulesExcludedUsersArgs] = None,
                    external_auditor_email: Optional[str] = None,
                    file_types: Optional[Sequence[str]] = None,
                    groups: Optional[DLPWebRulesGroupsArgs] = None,
                    icap_servers: Optional[Sequence[DLPWebRulesIcapServerArgs]] = None,
                    included_domain_profiles: Optional[DLPWebRulesIncludedDomainProfilesArgs] = None,
                    labels: Optional[DLPWebRulesLabelsArgs] = None,
                    location_groups: Optional[DLPWebRulesLocationGroupsArgs] = None,
                    locations: Optional[DLPWebRulesLocationsArgs] = None,
                    match_only: Optional[bool] = None,
                    min_size: Optional[int] = None,
                    name: Optional[str] = None,
                    notification_templates: Optional[Sequence[DLPWebRulesNotificationTemplateArgs]] = None,
                    order: Optional[int] = None,
                    parent_rule: Optional[int] = None,
                    protocols: Optional[Sequence[str]] = None,
                    rank: Optional[int] = None,
                    severity: Optional[str] = None,
                    source_ip_groups: Optional[DLPWebRulesSourceIpGroupsArgs] = None,
                    state: Optional[str] = None,
                    sub_rules: Optional[Sequence[str]] = None,
                    time_windows: Optional[DLPWebRulesTimeWindowsArgs] = None,
                    url_categories: Optional[DLPWebRulesUrlCategoriesArgs] = None,
                    user_risk_score_levels: Optional[Sequence[str]] = None,
                    users: Optional[DLPWebRulesUsersArgs] = None,
                    without_content_inspection: Optional[bool] = None,
                    workload_groups: Optional[Sequence[DLPWebRulesWorkloadGroupArgs]] = None,
                    zcc_notifications_enabled: Optional[bool] = None,
                    zscaler_incident_receiver: Optional[bool] = None)
    func NewDLPWebRules(ctx *Context, name string, args *DLPWebRulesArgs, opts ...ResourceOption) (*DLPWebRules, error)
    public DLPWebRules(string name, DLPWebRulesArgs? args = null, CustomResourceOptions? opts = null)
    public DLPWebRules(String name, DLPWebRulesArgs args)
    public DLPWebRules(String name, DLPWebRulesArgs args, CustomResourceOptions options)
    
    type: zia:DLPWebRules
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args DLPWebRulesArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args DLPWebRulesArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args DLPWebRulesArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args DLPWebRulesArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args DLPWebRulesArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var dlpwebRulesResource = new Zia.DLPWebRules("dlpwebRulesResource", new()
    {
        Action = "string",
        Auditors = new[]
        {
            new Zia.Inputs.DLPWebRulesAuditorArgs
            {
                Id = 0,
            },
        },
        CloudApplications = new[]
        {
            "string",
        },
        Departments = new Zia.Inputs.DLPWebRulesDepartmentsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        Description = "string",
        DlpDownloadScanEnabled = false,
        DlpEngines = new Zia.Inputs.DLPWebRulesDlpEnginesArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        ExcludedDepartments = new Zia.Inputs.DLPWebRulesExcludedDepartmentsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        ExcludedDomainProfiles = new Zia.Inputs.DLPWebRulesExcludedDomainProfilesArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        ExcludedGroups = new Zia.Inputs.DLPWebRulesExcludedGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        ExcludedUsers = new Zia.Inputs.DLPWebRulesExcludedUsersArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        ExternalAuditorEmail = "string",
        FileTypes = new[]
        {
            "string",
        },
        Groups = new Zia.Inputs.DLPWebRulesGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        IcapServers = new[]
        {
            new Zia.Inputs.DLPWebRulesIcapServerArgs
            {
                Id = 0,
            },
        },
        IncludedDomainProfiles = new Zia.Inputs.DLPWebRulesIncludedDomainProfilesArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        Labels = new Zia.Inputs.DLPWebRulesLabelsArgs
        {
            Id = 0,
        },
        LocationGroups = new Zia.Inputs.DLPWebRulesLocationGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        Locations = new Zia.Inputs.DLPWebRulesLocationsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        MatchOnly = false,
        MinSize = 0,
        Name = "string",
        NotificationTemplates = new[]
        {
            new Zia.Inputs.DLPWebRulesNotificationTemplateArgs
            {
                Id = 0,
            },
        },
        Order = 0,
        ParentRule = 0,
        Protocols = new[]
        {
            "string",
        },
        Rank = 0,
        Severity = "string",
        SourceIpGroups = new Zia.Inputs.DLPWebRulesSourceIpGroupsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        State = "string",
        SubRules = new[]
        {
            "string",
        },
        TimeWindows = new Zia.Inputs.DLPWebRulesTimeWindowsArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        UrlCategories = new Zia.Inputs.DLPWebRulesUrlCategoriesArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        UserRiskScoreLevels = new[]
        {
            "string",
        },
        Users = new Zia.Inputs.DLPWebRulesUsersArgs
        {
            Ids = new[]
            {
                0,
            },
        },
        WithoutContentInspection = false,
        WorkloadGroups = new[]
        {
            new Zia.Inputs.DLPWebRulesWorkloadGroupArgs
            {
                Id = 0,
                Name = "string",
            },
        },
        ZccNotificationsEnabled = false,
        ZscalerIncidentReceiver = false,
    });
    
    example, err := zia.NewDLPWebRules(ctx, "dlpwebRulesResource", &zia.DLPWebRulesArgs{
    	Action: pulumi.String("string"),
    	Auditors: zia.DLPWebRulesAuditorArray{
    		&zia.DLPWebRulesAuditorArgs{
    			Id: pulumi.Int(0),
    		},
    	},
    	CloudApplications: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Departments: &zia.DLPWebRulesDepartmentsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	Description:            pulumi.String("string"),
    	DlpDownloadScanEnabled: pulumi.Bool(false),
    	DlpEngines: &zia.DLPWebRulesDlpEnginesArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	ExcludedDepartments: &zia.DLPWebRulesExcludedDepartmentsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	ExcludedDomainProfiles: &zia.DLPWebRulesExcludedDomainProfilesArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	ExcludedGroups: &zia.DLPWebRulesExcludedGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	ExcludedUsers: &zia.DLPWebRulesExcludedUsersArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	ExternalAuditorEmail: pulumi.String("string"),
    	FileTypes: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Groups: &zia.DLPWebRulesGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	IcapServers: zia.DLPWebRulesIcapServerArray{
    		&zia.DLPWebRulesIcapServerArgs{
    			Id: pulumi.Int(0),
    		},
    	},
    	IncludedDomainProfiles: &zia.DLPWebRulesIncludedDomainProfilesArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	Labels: &zia.DLPWebRulesLabelsArgs{
    		Id: pulumi.Int(0),
    	},
    	LocationGroups: &zia.DLPWebRulesLocationGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	Locations: &zia.DLPWebRulesLocationsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	MatchOnly: pulumi.Bool(false),
    	MinSize:   pulumi.Int(0),
    	Name:      pulumi.String("string"),
    	NotificationTemplates: zia.DLPWebRulesNotificationTemplateArray{
    		&zia.DLPWebRulesNotificationTemplateArgs{
    			Id: pulumi.Int(0),
    		},
    	},
    	Order:      pulumi.Int(0),
    	ParentRule: pulumi.Int(0),
    	Protocols: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Rank:     pulumi.Int(0),
    	Severity: pulumi.String("string"),
    	SourceIpGroups: &zia.DLPWebRulesSourceIpGroupsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	State: pulumi.String("string"),
    	SubRules: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	TimeWindows: &zia.DLPWebRulesTimeWindowsArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	UrlCategories: &zia.DLPWebRulesUrlCategoriesArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	UserRiskScoreLevels: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Users: &zia.DLPWebRulesUsersArgs{
    		Ids: pulumi.IntArray{
    			pulumi.Int(0),
    		},
    	},
    	WithoutContentInspection: pulumi.Bool(false),
    	WorkloadGroups: zia.DLPWebRulesWorkloadGroupArray{
    		&zia.DLPWebRulesWorkloadGroupArgs{
    			Id:   pulumi.Int(0),
    			Name: pulumi.String("string"),
    		},
    	},
    	ZccNotificationsEnabled: pulumi.Bool(false),
    	ZscalerIncidentReceiver: pulumi.Bool(false),
    })
    
    var dlpwebRulesResource = new DLPWebRules("dlpwebRulesResource", DLPWebRulesArgs.builder()
        .action("string")
        .auditors(DLPWebRulesAuditorArgs.builder()
            .id(0)
            .build())
        .cloudApplications("string")
        .departments(DLPWebRulesDepartmentsArgs.builder()
            .ids(0)
            .build())
        .description("string")
        .dlpDownloadScanEnabled(false)
        .dlpEngines(DLPWebRulesDlpEnginesArgs.builder()
            .ids(0)
            .build())
        .excludedDepartments(DLPWebRulesExcludedDepartmentsArgs.builder()
            .ids(0)
            .build())
        .excludedDomainProfiles(DLPWebRulesExcludedDomainProfilesArgs.builder()
            .ids(0)
            .build())
        .excludedGroups(DLPWebRulesExcludedGroupsArgs.builder()
            .ids(0)
            .build())
        .excludedUsers(DLPWebRulesExcludedUsersArgs.builder()
            .ids(0)
            .build())
        .externalAuditorEmail("string")
        .fileTypes("string")
        .groups(DLPWebRulesGroupsArgs.builder()
            .ids(0)
            .build())
        .icapServers(DLPWebRulesIcapServerArgs.builder()
            .id(0)
            .build())
        .includedDomainProfiles(DLPWebRulesIncludedDomainProfilesArgs.builder()
            .ids(0)
            .build())
        .labels(DLPWebRulesLabelsArgs.builder()
            .id(0)
            .build())
        .locationGroups(DLPWebRulesLocationGroupsArgs.builder()
            .ids(0)
            .build())
        .locations(DLPWebRulesLocationsArgs.builder()
            .ids(0)
            .build())
        .matchOnly(false)
        .minSize(0)
        .name("string")
        .notificationTemplates(DLPWebRulesNotificationTemplateArgs.builder()
            .id(0)
            .build())
        .order(0)
        .parentRule(0)
        .protocols("string")
        .rank(0)
        .severity("string")
        .sourceIpGroups(DLPWebRulesSourceIpGroupsArgs.builder()
            .ids(0)
            .build())
        .state("string")
        .subRules("string")
        .timeWindows(DLPWebRulesTimeWindowsArgs.builder()
            .ids(0)
            .build())
        .urlCategories(DLPWebRulesUrlCategoriesArgs.builder()
            .ids(0)
            .build())
        .userRiskScoreLevels("string")
        .users(DLPWebRulesUsersArgs.builder()
            .ids(0)
            .build())
        .withoutContentInspection(false)
        .workloadGroups(DLPWebRulesWorkloadGroupArgs.builder()
            .id(0)
            .name("string")
            .build())
        .zccNotificationsEnabled(false)
        .zscalerIncidentReceiver(false)
        .build());
    
    dlpweb_rules_resource = zia.DLPWebRules("dlpwebRulesResource",
        action="string",
        auditors=[{
            "id": 0,
        }],
        cloud_applications=["string"],
        departments={
            "ids": [0],
        },
        description="string",
        dlp_download_scan_enabled=False,
        dlp_engines={
            "ids": [0],
        },
        excluded_departments={
            "ids": [0],
        },
        excluded_domain_profiles={
            "ids": [0],
        },
        excluded_groups={
            "ids": [0],
        },
        excluded_users={
            "ids": [0],
        },
        external_auditor_email="string",
        file_types=["string"],
        groups={
            "ids": [0],
        },
        icap_servers=[{
            "id": 0,
        }],
        included_domain_profiles={
            "ids": [0],
        },
        labels={
            "id": 0,
        },
        location_groups={
            "ids": [0],
        },
        locations={
            "ids": [0],
        },
        match_only=False,
        min_size=0,
        name="string",
        notification_templates=[{
            "id": 0,
        }],
        order=0,
        parent_rule=0,
        protocols=["string"],
        rank=0,
        severity="string",
        source_ip_groups={
            "ids": [0],
        },
        state="string",
        sub_rules=["string"],
        time_windows={
            "ids": [0],
        },
        url_categories={
            "ids": [0],
        },
        user_risk_score_levels=["string"],
        users={
            "ids": [0],
        },
        without_content_inspection=False,
        workload_groups=[{
            "id": 0,
            "name": "string",
        }],
        zcc_notifications_enabled=False,
        zscaler_incident_receiver=False)
    
    const dlpwebRulesResource = new zia.DLPWebRules("dlpwebRulesResource", {
        action: "string",
        auditors: [{
            id: 0,
        }],
        cloudApplications: ["string"],
        departments: {
            ids: [0],
        },
        description: "string",
        dlpDownloadScanEnabled: false,
        dlpEngines: {
            ids: [0],
        },
        excludedDepartments: {
            ids: [0],
        },
        excludedDomainProfiles: {
            ids: [0],
        },
        excludedGroups: {
            ids: [0],
        },
        excludedUsers: {
            ids: [0],
        },
        externalAuditorEmail: "string",
        fileTypes: ["string"],
        groups: {
            ids: [0],
        },
        icapServers: [{
            id: 0,
        }],
        includedDomainProfiles: {
            ids: [0],
        },
        labels: {
            id: 0,
        },
        locationGroups: {
            ids: [0],
        },
        locations: {
            ids: [0],
        },
        matchOnly: false,
        minSize: 0,
        name: "string",
        notificationTemplates: [{
            id: 0,
        }],
        order: 0,
        parentRule: 0,
        protocols: ["string"],
        rank: 0,
        severity: "string",
        sourceIpGroups: {
            ids: [0],
        },
        state: "string",
        subRules: ["string"],
        timeWindows: {
            ids: [0],
        },
        urlCategories: {
            ids: [0],
        },
        userRiskScoreLevels: ["string"],
        users: {
            ids: [0],
        },
        withoutContentInspection: false,
        workloadGroups: [{
            id: 0,
            name: "string",
        }],
        zccNotificationsEnabled: false,
        zscalerIncidentReceiver: false,
    });
    
    type: zia:DLPWebRules
    properties:
        action: string
        auditors:
            - id: 0
        cloudApplications:
            - string
        departments:
            ids:
                - 0
        description: string
        dlpDownloadScanEnabled: false
        dlpEngines:
            ids:
                - 0
        excludedDepartments:
            ids:
                - 0
        excludedDomainProfiles:
            ids:
                - 0
        excludedGroups:
            ids:
                - 0
        excludedUsers:
            ids:
                - 0
        externalAuditorEmail: string
        fileTypes:
            - string
        groups:
            ids:
                - 0
        icapServers:
            - id: 0
        includedDomainProfiles:
            ids:
                - 0
        labels:
            id: 0
        locationGroups:
            ids:
                - 0
        locations:
            ids:
                - 0
        matchOnly: false
        minSize: 0
        name: string
        notificationTemplates:
            - id: 0
        order: 0
        parentRule: 0
        protocols:
            - string
        rank: 0
        severity: string
        sourceIpGroups:
            ids:
                - 0
        state: string
        subRules:
            - string
        timeWindows:
            ids:
                - 0
        urlCategories:
            ids:
                - 0
        userRiskScoreLevels:
            - string
        users:
            ids:
                - 0
        withoutContentInspection: false
        workloadGroups:
            - id: 0
              name: string
        zccNotificationsEnabled: false
        zscalerIncidentReceiver: false
    

    DLPWebRules Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The DLPWebRules resource accepts the following input properties:

    Action string
    The action taken when traffic matches the DLP policy rule criteria.
    Auditors List<zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesAuditor>
    The auditor to which the DLP policy rule must be applied.
    CloudApplications List<string>
    The list of cloud applications to which the DLP policy rule must be applied.
    Departments zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesDepartments
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    Description string
    The description of the DLP policy rule.
    DlpDownloadScanEnabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    DlpEngines zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesDlpEngines
    The list of DLP engines to which the DLP policy rule must be applied.
    ExcludedDepartments zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesExcludedDepartments
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedDomainProfiles zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesExcludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedGroups zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesExcludedGroups
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedUsers zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesExcludedUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExternalAuditorEmail string
    The email address of an external auditor to whom DLP email notifications are sent.
    FileTypes List<string>
    The list of file types for which the DLP policy rule must be applied.
    Groups zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesGroups
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    IcapServers List<zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesIcapServer>
    The DLP server, using ICAP, to which the transaction content is forwarded.
    IncludedDomainProfiles zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesIncludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    Labels zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesLabels
    list of Labels that are applicable to the rule.
    LocationGroups zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesLocationGroups
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    Locations zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesLocations
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    MatchOnly bool
    The match only criteria for DLP engines.
    MinSize int
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    Name string
    The DLP policy rule name.
    NotificationTemplates List<zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesNotificationTemplate>
    The template used for DLP notification emails.
    Order int
    The rule order of execution for the DLP policy rule with respect to other rules.
    ParentRule int
    The unique identifier of the parent rule under which an exception rule is added
    Protocols List<string>
    The protocol criteria specified for the DLP policy rule.
    Rank int
    Admin rank of the admin who creates this rule
    Severity string
    Indicates the severity selected for the DLP rule violation
    SourceIpGroups zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesSourceIpGroups
    list of source ip groups
    State string
    Enables or disables the DLP policy rule.
    SubRules List<string>
    The list of exception rules added to a parent rule
    TimeWindows zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesTimeWindows
    list of time interval during which rule must be enforced.
    UrlCategories zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesUrlCategories
    The list of URL categories to which the DLP policy rule must be applied.
    UserRiskScoreLevels List<string>
    Users zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    WithoutContentInspection bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    WorkloadGroups List<zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesWorkloadGroup>
    The list of preconfigured workload groups to which the policy must be applied
    ZccNotificationsEnabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    ZscalerIncidentReceiver bool
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
    Action string
    The action taken when traffic matches the DLP policy rule criteria.
    Auditors []DLPWebRulesAuditorArgs
    The auditor to which the DLP policy rule must be applied.
    CloudApplications []string
    The list of cloud applications to which the DLP policy rule must be applied.
    Departments DLPWebRulesDepartmentsArgs
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    Description string
    The description of the DLP policy rule.
    DlpDownloadScanEnabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    DlpEngines DLPWebRulesDlpEnginesArgs
    The list of DLP engines to which the DLP policy rule must be applied.
    ExcludedDepartments DLPWebRulesExcludedDepartmentsArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedDomainProfiles DLPWebRulesExcludedDomainProfilesArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedGroups DLPWebRulesExcludedGroupsArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedUsers DLPWebRulesExcludedUsersArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExternalAuditorEmail string
    The email address of an external auditor to whom DLP email notifications are sent.
    FileTypes []string
    The list of file types for which the DLP policy rule must be applied.
    Groups DLPWebRulesGroupsArgs
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    IcapServers []DLPWebRulesIcapServerArgs
    The DLP server, using ICAP, to which the transaction content is forwarded.
    IncludedDomainProfiles DLPWebRulesIncludedDomainProfilesArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    Labels DLPWebRulesLabelsArgs
    list of Labels that are applicable to the rule.
    LocationGroups DLPWebRulesLocationGroupsArgs
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    Locations DLPWebRulesLocationsArgs
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    MatchOnly bool
    The match only criteria for DLP engines.
    MinSize int
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    Name string
    The DLP policy rule name.
    NotificationTemplates []DLPWebRulesNotificationTemplateArgs
    The template used for DLP notification emails.
    Order int
    The rule order of execution for the DLP policy rule with respect to other rules.
    ParentRule int
    The unique identifier of the parent rule under which an exception rule is added
    Protocols []string
    The protocol criteria specified for the DLP policy rule.
    Rank int
    Admin rank of the admin who creates this rule
    Severity string
    Indicates the severity selected for the DLP rule violation
    SourceIpGroups DLPWebRulesSourceIpGroupsArgs
    list of source ip groups
    State string
    Enables or disables the DLP policy rule.
    SubRules []string
    The list of exception rules added to a parent rule
    TimeWindows DLPWebRulesTimeWindowsArgs
    list of time interval during which rule must be enforced.
    UrlCategories DLPWebRulesUrlCategoriesArgs
    The list of URL categories to which the DLP policy rule must be applied.
    UserRiskScoreLevels []string
    Users DLPWebRulesUsersArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    WithoutContentInspection bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    WorkloadGroups []DLPWebRulesWorkloadGroupArgs
    The list of preconfigured workload groups to which the policy must be applied
    ZccNotificationsEnabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    ZscalerIncidentReceiver bool
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
    action String
    The action taken when traffic matches the DLP policy rule criteria.
    auditors List<DLPWebRulesAuditor>
    The auditor to which the DLP policy rule must be applied.
    cloudApplications List<String>
    The list of cloud applications to which the DLP policy rule must be applied.
    departments DLPWebRulesDepartments
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    description String
    The description of the DLP policy rule.
    dlpDownloadScanEnabled Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    dlpEngines DLPWebRulesDlpEngines
    The list of DLP engines to which the DLP policy rule must be applied.
    excludedDepartments DLPWebRulesExcludedDepartments
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedDomainProfiles DLPWebRulesExcludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedGroups DLPWebRulesExcludedGroups
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedUsers DLPWebRulesExcludedUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    externalAuditorEmail String
    The email address of an external auditor to whom DLP email notifications are sent.
    fileTypes List<String>
    The list of file types for which the DLP policy rule must be applied.
    groups DLPWebRulesGroups
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    icapServers List<DLPWebRulesIcapServer>
    The DLP server, using ICAP, to which the transaction content is forwarded.
    includedDomainProfiles DLPWebRulesIncludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    labels DLPWebRulesLabels
    list of Labels that are applicable to the rule.
    locationGroups DLPWebRulesLocationGroups
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    locations DLPWebRulesLocations
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    matchOnly Boolean
    The match only criteria for DLP engines.
    minSize Integer
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    name String
    The DLP policy rule name.
    notificationTemplates List<DLPWebRulesNotificationTemplate>
    The template used for DLP notification emails.
    order Integer
    The rule order of execution for the DLP policy rule with respect to other rules.
    parentRule Integer
    The unique identifier of the parent rule under which an exception rule is added
    protocols List<String>
    The protocol criteria specified for the DLP policy rule.
    rank Integer
    Admin rank of the admin who creates this rule
    severity String
    Indicates the severity selected for the DLP rule violation
    sourceIpGroups DLPWebRulesSourceIpGroups
    list of source ip groups
    state String
    Enables or disables the DLP policy rule.
    subRules List<String>
    The list of exception rules added to a parent rule
    timeWindows DLPWebRulesTimeWindows
    list of time interval during which rule must be enforced.
    urlCategories DLPWebRulesUrlCategories
    The list of URL categories to which the DLP policy rule must be applied.
    userRiskScoreLevels List<String>
    users DLPWebRulesUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    withoutContentInspection Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    workloadGroups List<DLPWebRulesWorkloadGroup>
    The list of preconfigured workload groups to which the policy must be applied
    zccNotificationsEnabled Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    zscalerIncidentReceiver Boolean
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
    action string
    The action taken when traffic matches the DLP policy rule criteria.
    auditors DLPWebRulesAuditor[]
    The auditor to which the DLP policy rule must be applied.
    cloudApplications string[]
    The list of cloud applications to which the DLP policy rule must be applied.
    departments DLPWebRulesDepartments
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    description string
    The description of the DLP policy rule.
    dlpDownloadScanEnabled boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    dlpEngines DLPWebRulesDlpEngines
    The list of DLP engines to which the DLP policy rule must be applied.
    excludedDepartments DLPWebRulesExcludedDepartments
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedDomainProfiles DLPWebRulesExcludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedGroups DLPWebRulesExcludedGroups
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedUsers DLPWebRulesExcludedUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    externalAuditorEmail string
    The email address of an external auditor to whom DLP email notifications are sent.
    fileTypes string[]
    The list of file types for which the DLP policy rule must be applied.
    groups DLPWebRulesGroups
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    icapServers DLPWebRulesIcapServer[]
    The DLP server, using ICAP, to which the transaction content is forwarded.
    includedDomainProfiles DLPWebRulesIncludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    labels DLPWebRulesLabels
    list of Labels that are applicable to the rule.
    locationGroups DLPWebRulesLocationGroups
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    locations DLPWebRulesLocations
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    matchOnly boolean
    The match only criteria for DLP engines.
    minSize number
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    name string
    The DLP policy rule name.
    notificationTemplates DLPWebRulesNotificationTemplate[]
    The template used for DLP notification emails.
    order number
    The rule order of execution for the DLP policy rule with respect to other rules.
    parentRule number
    The unique identifier of the parent rule under which an exception rule is added
    protocols string[]
    The protocol criteria specified for the DLP policy rule.
    rank number
    Admin rank of the admin who creates this rule
    severity string
    Indicates the severity selected for the DLP rule violation
    sourceIpGroups DLPWebRulesSourceIpGroups
    list of source ip groups
    state string
    Enables or disables the DLP policy rule.
    subRules string[]
    The list of exception rules added to a parent rule
    timeWindows DLPWebRulesTimeWindows
    list of time interval during which rule must be enforced.
    urlCategories DLPWebRulesUrlCategories
    The list of URL categories to which the DLP policy rule must be applied.
    userRiskScoreLevels string[]
    users DLPWebRulesUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    withoutContentInspection boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    workloadGroups DLPWebRulesWorkloadGroup[]
    The list of preconfigured workload groups to which the policy must be applied
    zccNotificationsEnabled boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    zscalerIncidentReceiver boolean
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
    action str
    The action taken when traffic matches the DLP policy rule criteria.
    auditors Sequence[DLPWebRulesAuditorArgs]
    The auditor to which the DLP policy rule must be applied.
    cloud_applications Sequence[str]
    The list of cloud applications to which the DLP policy rule must be applied.
    departments DLPWebRulesDepartmentsArgs
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    description str
    The description of the DLP policy rule.
    dlp_download_scan_enabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    dlp_engines DLPWebRulesDlpEnginesArgs
    The list of DLP engines to which the DLP policy rule must be applied.
    excluded_departments DLPWebRulesExcludedDepartmentsArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excluded_domain_profiles DLPWebRulesExcludedDomainProfilesArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excluded_groups DLPWebRulesExcludedGroupsArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excluded_users DLPWebRulesExcludedUsersArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    external_auditor_email str
    The email address of an external auditor to whom DLP email notifications are sent.
    file_types Sequence[str]
    The list of file types for which the DLP policy rule must be applied.
    groups DLPWebRulesGroupsArgs
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    icap_servers Sequence[DLPWebRulesIcapServerArgs]
    The DLP server, using ICAP, to which the transaction content is forwarded.
    included_domain_profiles DLPWebRulesIncludedDomainProfilesArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    labels DLPWebRulesLabelsArgs
    list of Labels that are applicable to the rule.
    location_groups DLPWebRulesLocationGroupsArgs
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    locations DLPWebRulesLocationsArgs
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    match_only bool
    The match only criteria for DLP engines.
    min_size int
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    name str
    The DLP policy rule name.
    notification_templates Sequence[DLPWebRulesNotificationTemplateArgs]
    The template used for DLP notification emails.
    order int
    The rule order of execution for the DLP policy rule with respect to other rules.
    parent_rule int
    The unique identifier of the parent rule under which an exception rule is added
    protocols Sequence[str]
    The protocol criteria specified for the DLP policy rule.
    rank int
    Admin rank of the admin who creates this rule
    severity str
    Indicates the severity selected for the DLP rule violation
    source_ip_groups DLPWebRulesSourceIpGroupsArgs
    list of source ip groups
    state str
    Enables or disables the DLP policy rule.
    sub_rules Sequence[str]
    The list of exception rules added to a parent rule
    time_windows DLPWebRulesTimeWindowsArgs
    list of time interval during which rule must be enforced.
    url_categories DLPWebRulesUrlCategoriesArgs
    The list of URL categories to which the DLP policy rule must be applied.
    user_risk_score_levels Sequence[str]
    users DLPWebRulesUsersArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    without_content_inspection bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    workload_groups Sequence[DLPWebRulesWorkloadGroupArgs]
    The list of preconfigured workload groups to which the policy must be applied
    zcc_notifications_enabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    zscaler_incident_receiver bool
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
    action String
    The action taken when traffic matches the DLP policy rule criteria.
    auditors List<Property Map>
    The auditor to which the DLP policy rule must be applied.
    cloudApplications List<String>
    The list of cloud applications to which the DLP policy rule must be applied.
    departments Property Map
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    description String
    The description of the DLP policy rule.
    dlpDownloadScanEnabled Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    dlpEngines Property Map
    The list of DLP engines to which the DLP policy rule must be applied.
    excludedDepartments Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedDomainProfiles Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedGroups Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedUsers Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    externalAuditorEmail String
    The email address of an external auditor to whom DLP email notifications are sent.
    fileTypes List<String>
    The list of file types for which the DLP policy rule must be applied.
    groups Property Map
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    icapServers List<Property Map>
    The DLP server, using ICAP, to which the transaction content is forwarded.
    includedDomainProfiles Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    labels Property Map
    list of Labels that are applicable to the rule.
    locationGroups Property Map
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    locations Property Map
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    matchOnly Boolean
    The match only criteria for DLP engines.
    minSize Number
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    name String
    The DLP policy rule name.
    notificationTemplates List<Property Map>
    The template used for DLP notification emails.
    order Number
    The rule order of execution for the DLP policy rule with respect to other rules.
    parentRule Number
    The unique identifier of the parent rule under which an exception rule is added
    protocols List<String>
    The protocol criteria specified for the DLP policy rule.
    rank Number
    Admin rank of the admin who creates this rule
    severity String
    Indicates the severity selected for the DLP rule violation
    sourceIpGroups Property Map
    list of source ip groups
    state String
    Enables or disables the DLP policy rule.
    subRules List<String>
    The list of exception rules added to a parent rule
    timeWindows Property Map
    list of time interval during which rule must be enforced.
    urlCategories Property Map
    The list of URL categories to which the DLP policy rule must be applied.
    userRiskScoreLevels List<String>
    users Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    withoutContentInspection Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    workloadGroups List<Property Map>
    The list of preconfigured workload groups to which the policy must be applied
    zccNotificationsEnabled Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    zscalerIncidentReceiver Boolean
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the DLPWebRules resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    RuleId int
    Id string
    The provider-assigned unique ID for this managed resource.
    RuleId int
    id String
    The provider-assigned unique ID for this managed resource.
    ruleId Integer
    id string
    The provider-assigned unique ID for this managed resource.
    ruleId number
    id str
    The provider-assigned unique ID for this managed resource.
    rule_id int
    id String
    The provider-assigned unique ID for this managed resource.
    ruleId Number

    Look up Existing DLPWebRules Resource

    Get an existing DLPWebRules resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: DLPWebRulesState, opts?: CustomResourceOptions): DLPWebRules
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            action: Optional[str] = None,
            auditors: Optional[Sequence[DLPWebRulesAuditorArgs]] = None,
            cloud_applications: Optional[Sequence[str]] = None,
            departments: Optional[DLPWebRulesDepartmentsArgs] = None,
            description: Optional[str] = None,
            dlp_download_scan_enabled: Optional[bool] = None,
            dlp_engines: Optional[DLPWebRulesDlpEnginesArgs] = None,
            excluded_departments: Optional[DLPWebRulesExcludedDepartmentsArgs] = None,
            excluded_domain_profiles: Optional[DLPWebRulesExcludedDomainProfilesArgs] = None,
            excluded_groups: Optional[DLPWebRulesExcludedGroupsArgs] = None,
            excluded_users: Optional[DLPWebRulesExcludedUsersArgs] = None,
            external_auditor_email: Optional[str] = None,
            file_types: Optional[Sequence[str]] = None,
            groups: Optional[DLPWebRulesGroupsArgs] = None,
            icap_servers: Optional[Sequence[DLPWebRulesIcapServerArgs]] = None,
            included_domain_profiles: Optional[DLPWebRulesIncludedDomainProfilesArgs] = None,
            labels: Optional[DLPWebRulesLabelsArgs] = None,
            location_groups: Optional[DLPWebRulesLocationGroupsArgs] = None,
            locations: Optional[DLPWebRulesLocationsArgs] = None,
            match_only: Optional[bool] = None,
            min_size: Optional[int] = None,
            name: Optional[str] = None,
            notification_templates: Optional[Sequence[DLPWebRulesNotificationTemplateArgs]] = None,
            order: Optional[int] = None,
            parent_rule: Optional[int] = None,
            protocols: Optional[Sequence[str]] = None,
            rank: Optional[int] = None,
            rule_id: Optional[int] = None,
            severity: Optional[str] = None,
            source_ip_groups: Optional[DLPWebRulesSourceIpGroupsArgs] = None,
            state: Optional[str] = None,
            sub_rules: Optional[Sequence[str]] = None,
            time_windows: Optional[DLPWebRulesTimeWindowsArgs] = None,
            url_categories: Optional[DLPWebRulesUrlCategoriesArgs] = None,
            user_risk_score_levels: Optional[Sequence[str]] = None,
            users: Optional[DLPWebRulesUsersArgs] = None,
            without_content_inspection: Optional[bool] = None,
            workload_groups: Optional[Sequence[DLPWebRulesWorkloadGroupArgs]] = None,
            zcc_notifications_enabled: Optional[bool] = None,
            zscaler_incident_receiver: Optional[bool] = None) -> DLPWebRules
    func GetDLPWebRules(ctx *Context, name string, id IDInput, state *DLPWebRulesState, opts ...ResourceOption) (*DLPWebRules, error)
    public static DLPWebRules Get(string name, Input<string> id, DLPWebRulesState? state, CustomResourceOptions? opts = null)
    public static DLPWebRules get(String name, Output<String> id, DLPWebRulesState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Action string
    The action taken when traffic matches the DLP policy rule criteria.
    Auditors List<zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesAuditor>
    The auditor to which the DLP policy rule must be applied.
    CloudApplications List<string>
    The list of cloud applications to which the DLP policy rule must be applied.
    Departments zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesDepartments
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    Description string
    The description of the DLP policy rule.
    DlpDownloadScanEnabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    DlpEngines zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesDlpEngines
    The list of DLP engines to which the DLP policy rule must be applied.
    ExcludedDepartments zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesExcludedDepartments
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedDomainProfiles zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesExcludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedGroups zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesExcludedGroups
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedUsers zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesExcludedUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExternalAuditorEmail string
    The email address of an external auditor to whom DLP email notifications are sent.
    FileTypes List<string>
    The list of file types for which the DLP policy rule must be applied.
    Groups zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesGroups
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    IcapServers List<zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesIcapServer>
    The DLP server, using ICAP, to which the transaction content is forwarded.
    IncludedDomainProfiles zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesIncludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    Labels zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesLabels
    list of Labels that are applicable to the rule.
    LocationGroups zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesLocationGroups
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    Locations zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesLocations
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    MatchOnly bool
    The match only criteria for DLP engines.
    MinSize int
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    Name string
    The DLP policy rule name.
    NotificationTemplates List<zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesNotificationTemplate>
    The template used for DLP notification emails.
    Order int
    The rule order of execution for the DLP policy rule with respect to other rules.
    ParentRule int
    The unique identifier of the parent rule under which an exception rule is added
    Protocols List<string>
    The protocol criteria specified for the DLP policy rule.
    Rank int
    Admin rank of the admin who creates this rule
    RuleId int
    Severity string
    Indicates the severity selected for the DLP rule violation
    SourceIpGroups zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesSourceIpGroups
    list of source ip groups
    State string
    Enables or disables the DLP policy rule.
    SubRules List<string>
    The list of exception rules added to a parent rule
    TimeWindows zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesTimeWindows
    list of time interval during which rule must be enforced.
    UrlCategories zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesUrlCategories
    The list of URL categories to which the DLP policy rule must be applied.
    UserRiskScoreLevels List<string>
    Users zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    WithoutContentInspection bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    WorkloadGroups List<zscaler.PulumiPackage.Zia.Inputs.DLPWebRulesWorkloadGroup>
    The list of preconfigured workload groups to which the policy must be applied
    ZccNotificationsEnabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    ZscalerIncidentReceiver bool
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
    Action string
    The action taken when traffic matches the DLP policy rule criteria.
    Auditors []DLPWebRulesAuditorArgs
    The auditor to which the DLP policy rule must be applied.
    CloudApplications []string
    The list of cloud applications to which the DLP policy rule must be applied.
    Departments DLPWebRulesDepartmentsArgs
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    Description string
    The description of the DLP policy rule.
    DlpDownloadScanEnabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    DlpEngines DLPWebRulesDlpEnginesArgs
    The list of DLP engines to which the DLP policy rule must be applied.
    ExcludedDepartments DLPWebRulesExcludedDepartmentsArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedDomainProfiles DLPWebRulesExcludedDomainProfilesArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedGroups DLPWebRulesExcludedGroupsArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExcludedUsers DLPWebRulesExcludedUsersArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    ExternalAuditorEmail string
    The email address of an external auditor to whom DLP email notifications are sent.
    FileTypes []string
    The list of file types for which the DLP policy rule must be applied.
    Groups DLPWebRulesGroupsArgs
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    IcapServers []DLPWebRulesIcapServerArgs
    The DLP server, using ICAP, to which the transaction content is forwarded.
    IncludedDomainProfiles DLPWebRulesIncludedDomainProfilesArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    Labels DLPWebRulesLabelsArgs
    list of Labels that are applicable to the rule.
    LocationGroups DLPWebRulesLocationGroupsArgs
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    Locations DLPWebRulesLocationsArgs
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    MatchOnly bool
    The match only criteria for DLP engines.
    MinSize int
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    Name string
    The DLP policy rule name.
    NotificationTemplates []DLPWebRulesNotificationTemplateArgs
    The template used for DLP notification emails.
    Order int
    The rule order of execution for the DLP policy rule with respect to other rules.
    ParentRule int
    The unique identifier of the parent rule under which an exception rule is added
    Protocols []string
    The protocol criteria specified for the DLP policy rule.
    Rank int
    Admin rank of the admin who creates this rule
    RuleId int
    Severity string
    Indicates the severity selected for the DLP rule violation
    SourceIpGroups DLPWebRulesSourceIpGroupsArgs
    list of source ip groups
    State string
    Enables or disables the DLP policy rule.
    SubRules []string
    The list of exception rules added to a parent rule
    TimeWindows DLPWebRulesTimeWindowsArgs
    list of time interval during which rule must be enforced.
    UrlCategories DLPWebRulesUrlCategoriesArgs
    The list of URL categories to which the DLP policy rule must be applied.
    UserRiskScoreLevels []string
    Users DLPWebRulesUsersArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    WithoutContentInspection bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    WorkloadGroups []DLPWebRulesWorkloadGroupArgs
    The list of preconfigured workload groups to which the policy must be applied
    ZccNotificationsEnabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    ZscalerIncidentReceiver bool
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
    action String
    The action taken when traffic matches the DLP policy rule criteria.
    auditors List<DLPWebRulesAuditor>
    The auditor to which the DLP policy rule must be applied.
    cloudApplications List<String>
    The list of cloud applications to which the DLP policy rule must be applied.
    departments DLPWebRulesDepartments
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    description String
    The description of the DLP policy rule.
    dlpDownloadScanEnabled Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    dlpEngines DLPWebRulesDlpEngines
    The list of DLP engines to which the DLP policy rule must be applied.
    excludedDepartments DLPWebRulesExcludedDepartments
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedDomainProfiles DLPWebRulesExcludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedGroups DLPWebRulesExcludedGroups
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedUsers DLPWebRulesExcludedUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    externalAuditorEmail String
    The email address of an external auditor to whom DLP email notifications are sent.
    fileTypes List<String>
    The list of file types for which the DLP policy rule must be applied.
    groups DLPWebRulesGroups
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    icapServers List<DLPWebRulesIcapServer>
    The DLP server, using ICAP, to which the transaction content is forwarded.
    includedDomainProfiles DLPWebRulesIncludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    labels DLPWebRulesLabels
    list of Labels that are applicable to the rule.
    locationGroups DLPWebRulesLocationGroups
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    locations DLPWebRulesLocations
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    matchOnly Boolean
    The match only criteria for DLP engines.
    minSize Integer
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    name String
    The DLP policy rule name.
    notificationTemplates List<DLPWebRulesNotificationTemplate>
    The template used for DLP notification emails.
    order Integer
    The rule order of execution for the DLP policy rule with respect to other rules.
    parentRule Integer
    The unique identifier of the parent rule under which an exception rule is added
    protocols List<String>
    The protocol criteria specified for the DLP policy rule.
    rank Integer
    Admin rank of the admin who creates this rule
    ruleId Integer
    severity String
    Indicates the severity selected for the DLP rule violation
    sourceIpGroups DLPWebRulesSourceIpGroups
    list of source ip groups
    state String
    Enables or disables the DLP policy rule.
    subRules List<String>
    The list of exception rules added to a parent rule
    timeWindows DLPWebRulesTimeWindows
    list of time interval during which rule must be enforced.
    urlCategories DLPWebRulesUrlCategories
    The list of URL categories to which the DLP policy rule must be applied.
    userRiskScoreLevels List<String>
    users DLPWebRulesUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    withoutContentInspection Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    workloadGroups List<DLPWebRulesWorkloadGroup>
    The list of preconfigured workload groups to which the policy must be applied
    zccNotificationsEnabled Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    zscalerIncidentReceiver Boolean
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
    action string
    The action taken when traffic matches the DLP policy rule criteria.
    auditors DLPWebRulesAuditor[]
    The auditor to which the DLP policy rule must be applied.
    cloudApplications string[]
    The list of cloud applications to which the DLP policy rule must be applied.
    departments DLPWebRulesDepartments
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    description string
    The description of the DLP policy rule.
    dlpDownloadScanEnabled boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    dlpEngines DLPWebRulesDlpEngines
    The list of DLP engines to which the DLP policy rule must be applied.
    excludedDepartments DLPWebRulesExcludedDepartments
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedDomainProfiles DLPWebRulesExcludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedGroups DLPWebRulesExcludedGroups
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedUsers DLPWebRulesExcludedUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    externalAuditorEmail string
    The email address of an external auditor to whom DLP email notifications are sent.
    fileTypes string[]
    The list of file types for which the DLP policy rule must be applied.
    groups DLPWebRulesGroups
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    icapServers DLPWebRulesIcapServer[]
    The DLP server, using ICAP, to which the transaction content is forwarded.
    includedDomainProfiles DLPWebRulesIncludedDomainProfiles
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    labels DLPWebRulesLabels
    list of Labels that are applicable to the rule.
    locationGroups DLPWebRulesLocationGroups
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    locations DLPWebRulesLocations
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    matchOnly boolean
    The match only criteria for DLP engines.
    minSize number
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    name string
    The DLP policy rule name.
    notificationTemplates DLPWebRulesNotificationTemplate[]
    The template used for DLP notification emails.
    order number
    The rule order of execution for the DLP policy rule with respect to other rules.
    parentRule number
    The unique identifier of the parent rule under which an exception rule is added
    protocols string[]
    The protocol criteria specified for the DLP policy rule.
    rank number
    Admin rank of the admin who creates this rule
    ruleId number
    severity string
    Indicates the severity selected for the DLP rule violation
    sourceIpGroups DLPWebRulesSourceIpGroups
    list of source ip groups
    state string
    Enables or disables the DLP policy rule.
    subRules string[]
    The list of exception rules added to a parent rule
    timeWindows DLPWebRulesTimeWindows
    list of time interval during which rule must be enforced.
    urlCategories DLPWebRulesUrlCategories
    The list of URL categories to which the DLP policy rule must be applied.
    userRiskScoreLevels string[]
    users DLPWebRulesUsers
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    withoutContentInspection boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    workloadGroups DLPWebRulesWorkloadGroup[]
    The list of preconfigured workload groups to which the policy must be applied
    zccNotificationsEnabled boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    zscalerIncidentReceiver boolean
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
    action str
    The action taken when traffic matches the DLP policy rule criteria.
    auditors Sequence[DLPWebRulesAuditorArgs]
    The auditor to which the DLP policy rule must be applied.
    cloud_applications Sequence[str]
    The list of cloud applications to which the DLP policy rule must be applied.
    departments DLPWebRulesDepartmentsArgs
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    description str
    The description of the DLP policy rule.
    dlp_download_scan_enabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    dlp_engines DLPWebRulesDlpEnginesArgs
    The list of DLP engines to which the DLP policy rule must be applied.
    excluded_departments DLPWebRulesExcludedDepartmentsArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excluded_domain_profiles DLPWebRulesExcludedDomainProfilesArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excluded_groups DLPWebRulesExcludedGroupsArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excluded_users DLPWebRulesExcludedUsersArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    external_auditor_email str
    The email address of an external auditor to whom DLP email notifications are sent.
    file_types Sequence[str]
    The list of file types for which the DLP policy rule must be applied.
    groups DLPWebRulesGroupsArgs
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    icap_servers Sequence[DLPWebRulesIcapServerArgs]
    The DLP server, using ICAP, to which the transaction content is forwarded.
    included_domain_profiles DLPWebRulesIncludedDomainProfilesArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    labels DLPWebRulesLabelsArgs
    list of Labels that are applicable to the rule.
    location_groups DLPWebRulesLocationGroupsArgs
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    locations DLPWebRulesLocationsArgs
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    match_only bool
    The match only criteria for DLP engines.
    min_size int
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    name str
    The DLP policy rule name.
    notification_templates Sequence[DLPWebRulesNotificationTemplateArgs]
    The template used for DLP notification emails.
    order int
    The rule order of execution for the DLP policy rule with respect to other rules.
    parent_rule int
    The unique identifier of the parent rule under which an exception rule is added
    protocols Sequence[str]
    The protocol criteria specified for the DLP policy rule.
    rank int
    Admin rank of the admin who creates this rule
    rule_id int
    severity str
    Indicates the severity selected for the DLP rule violation
    source_ip_groups DLPWebRulesSourceIpGroupsArgs
    list of source ip groups
    state str
    Enables or disables the DLP policy rule.
    sub_rules Sequence[str]
    The list of exception rules added to a parent rule
    time_windows DLPWebRulesTimeWindowsArgs
    list of time interval during which rule must be enforced.
    url_categories DLPWebRulesUrlCategoriesArgs
    The list of URL categories to which the DLP policy rule must be applied.
    user_risk_score_levels Sequence[str]
    users DLPWebRulesUsersArgs
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    without_content_inspection bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    workload_groups Sequence[DLPWebRulesWorkloadGroupArgs]
    The list of preconfigured workload groups to which the policy must be applied
    zcc_notifications_enabled bool
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    zscaler_incident_receiver bool
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.
    action String
    The action taken when traffic matches the DLP policy rule criteria.
    auditors List<Property Map>
    The auditor to which the DLP policy rule must be applied.
    cloudApplications List<String>
    The list of cloud applications to which the DLP policy rule must be applied.
    departments Property Map
    The Name-ID pairs of departments to which the DLP policy rule must be applied.
    description String
    The description of the DLP policy rule.
    dlpDownloadScanEnabled Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    dlpEngines Property Map
    The list of DLP engines to which the DLP policy rule must be applied.
    excludedDepartments Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedDomainProfiles Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedGroups Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    excludedUsers Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    externalAuditorEmail String
    The email address of an external auditor to whom DLP email notifications are sent.
    fileTypes List<String>
    The list of file types for which the DLP policy rule must be applied.
    groups Property Map
    The Name-ID pairs of groups to which the DLP policy rule must be applied.
    icapServers List<Property Map>
    The DLP server, using ICAP, to which the transaction content is forwarded.
    includedDomainProfiles Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    labels Property Map
    list of Labels that are applicable to the rule.
    locationGroups Property Map
    The Name-ID pairs of locations groups to which the DLP policy rule must be applied.
    locations Property Map
    The Name-ID pairs of locations to which the DLP policy rule must be applied.
    matchOnly Boolean
    The match only criteria for DLP engines.
    minSize Number
    The minimum file size (in KB) used for evaluation of the DLP policy rule.
    name String
    The DLP policy rule name.
    notificationTemplates List<Property Map>
    The template used for DLP notification emails.
    order Number
    The rule order of execution for the DLP policy rule with respect to other rules.
    parentRule Number
    The unique identifier of the parent rule under which an exception rule is added
    protocols List<String>
    The protocol criteria specified for the DLP policy rule.
    rank Number
    Admin rank of the admin who creates this rule
    ruleId Number
    severity String
    Indicates the severity selected for the DLP rule violation
    sourceIpGroups Property Map
    list of source ip groups
    state String
    Enables or disables the DLP policy rule.
    subRules List<String>
    The list of exception rules added to a parent rule
    timeWindows Property Map
    list of time interval during which rule must be enforced.
    urlCategories Property Map
    The list of URL categories to which the DLP policy rule must be applied.
    userRiskScoreLevels List<String>
    users Property Map
    The Name-ID pairs of users to which the DLP policy rule must be applied.
    withoutContentInspection Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    workloadGroups List<Property Map>
    The list of preconfigured workload groups to which the policy must be applied
    zccNotificationsEnabled Boolean
    Indicates a DLP policy rule without content inspection, when the value is set to true.
    zscalerIncidentReceiver Boolean
    Indicates whether a Zscaler Incident Receiver is associated to the DLP policy rule.

    Supporting Types

    DLPWebRulesAuditor, DLPWebRulesAuditorArgs

    Id int
    Id int
    id Integer
    id number
    id int
    id Number

    DLPWebRulesDepartments, DLPWebRulesDepartmentsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesDlpEngines, DLPWebRulesDlpEnginesArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesExcludedDepartments, DLPWebRulesExcludedDepartmentsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesExcludedDomainProfiles, DLPWebRulesExcludedDomainProfilesArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesExcludedGroups, DLPWebRulesExcludedGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesExcludedUsers, DLPWebRulesExcludedUsersArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesGroups, DLPWebRulesGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesIcapServer, DLPWebRulesIcapServerArgs

    Id int
    Id int
    id Integer
    id number
    id int
    id Number

    DLPWebRulesIncludedDomainProfiles, DLPWebRulesIncludedDomainProfilesArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesLabels, DLPWebRulesLabelsArgs

    Id int
    Id int
    id Integer
    id number
    id int
    id Number

    DLPWebRulesLocationGroups, DLPWebRulesLocationGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesLocations, DLPWebRulesLocationsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesNotificationTemplate, DLPWebRulesNotificationTemplateArgs

    Id int
    Id int
    id Integer
    id number
    id int
    id Number

    DLPWebRulesSourceIpGroups, DLPWebRulesSourceIpGroupsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesTimeWindows, DLPWebRulesTimeWindowsArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesUrlCategories, DLPWebRulesUrlCategoriesArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesUsers, DLPWebRulesUsersArgs

    Ids List<int>
    Ids []int
    ids List<Integer>
    ids number[]
    ids Sequence[int]
    ids List<Number>

    DLPWebRulesWorkloadGroup, DLPWebRulesWorkloadGroupArgs

    Id int
    The unique identifier for the resource.
    Name string
    The name of the resource.
    Id int
    The unique identifier for the resource.
    Name string
    The name of the resource.
    id Integer
    The unique identifier for the resource.
    name String
    The name of the resource.
    id number
    The unique identifier for the resource.
    name string
    The name of the resource.
    id int
    The unique identifier for the resource.
    name str
    The name of the resource.
    id Number
    The unique identifier for the resource.
    name String
    The name of the resource.

    Import

    Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.

    Visit

    zia_dlp_web_rules can be imported by using <RULE ID> or <RULE NAME> as the import ID.

    For example:

    $ pulumi import zia:index/dLPWebRules:DLPWebRules example <rule_id>
    

    or

    $ pulumi import zia:index/dLPWebRules:DLPWebRules example <rule_name>
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    zia zscaler/pulumi-zia
    License
    MIT
    Notes
    This Pulumi package is based on the zia Terraform Provider.
    zia logo
    Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler