Skip to content
Cloudflare Docs

Troubleshoot DLP

Use this guide to troubleshoot common issues with Data Loss Prevention (DLP).

DLP policy does not trigger or block content

DLP not inspecting or blocking content is the most common issue reported. If you have configured a DLP policy but it fails to inspect or block traffic, the cause is almost always that the traffic is not being decrypted. To use DLP to scan the content of HTTPS requests, you must turn on TLS decryption.

To turn on TLS decryption:

  1. In Cloudflare One, go to Traffic policies > Traffic settings.
  2. In Proxy and inspection, turn on Inspect HTTPS requests with TLS decryption.

Once you turn on TLS decryption, you can create a DLP policy to inspect the content of HTTPS requests. For example:

SelectorOperatorValueLogicAction
Domaininbox.comAndBlock
DLP ProfileinCredit card numbers

DLP scans trigger false positives or block legitimate sites

If your DLP policy is blocking access to business-critical applications (such as Zoho, Google, or internal domains) or generating a high number of false positives, your DLP policy is likely too broad. Profiles such as Credentials and Secrets are powerful but can be overly aggressive if not scoped correctly.

Problematic configuration

Applying a sensitive profile to all traffic causes unnecessary blocks. For example:

SelectorOperatorValueAction
DLP ProfileinCredentials and SecretsBlock

Make your policies more specific. Instead of a catch-all block, create granular policies that target high-risk destinations or user groups.

This policy only blocks uploads of financial data to file-sharing websites for a specific user group, reducing the risk of false positives on other sites.

SelectorOperatorValueLogicAction
Destination Domainindropbox.com, wetransfer.comAndBlock
DLP ProfileinFinancial InformationAnd
User Group NamesinFinance Team

You can also create policies that match trusted applications using the Do Not Scan action.

DLP detections are inconsistent

If DLP detects sensitive data in plain text but not within images or certain applications, check for the following issues:

  • OCR is turned on: For DLP to scan text within images (such as a picture of a credit card), you must turn on Optical Character Recognition (OCR) in the corresponding DLP profile.
  • Application-specific behavior: Some applications, such as WhatsApp Web, use protocols or encryption methods (such as WebSockets) that Gateway may not be able to fully inspect with HTTP policies.
  • Supported file types: Content must be in a supported file type for DLP inspection.

DLP options are missing or you cannot create custom profiles

If you cannot use the DLP Profile selector when creating an HTTP policy or are blocked from creating a custom DLP profile, it typically means one of two things:

  1. Incorrect plan. These features require a Zero Trust Enterprise plan. If you believe your account should have this entitlement, contact your account team to confirm your subscription details.
  2. Permissions issue. You may not have the required administrative privileges to configure DLP settings. Check with your Cloudflare account administrator.