SSL/TLS Inspection Required: For your DLP to inspect HTTPS traffic, SSL/TLS interception must be enabled on your proxy or next-gen firewall. Without it, the encrypted payload cannot be inspected, and DLP policies will not trigger on HTTPS traffic.

Submit Test Data via HTTPS POST

This test works identically to the HTTP test but over an encrypted channel. Your DLP needs SSL inspection to detect this data.

File Upload Test

Upload files containing sensitive data via HTTPS POST. Your DLP needs SSL inspection to detect file content over encrypted channels.

📤

Drag & drop files here, or click to browse

Files are uploaded to the server and immediately discarded. Nothing is stored.

HTTPS vs HTTP DLP Testing

Without SSL Inspection

  • DLP cannot see encrypted payload content
  • Only metadata (destination, size) visible
  • Content-based policies will NOT trigger
  • This is a common gap in DLP deployments

With SSL Inspection

  • Proxy decrypts, inspects, re-encrypts traffic
  • DLP can apply full content inspection
  • Content-based policies trigger normally
  • Requires trusted CA cert on endpoints