Symantec DLP 14.0 Admin Guide
Symantec DLP 14.0 Admin Guide
Symantec DLP 14.0 Admin Guide
Prevention Administration
Guide
Version 14
Symantec Data Loss Prevention Administration Guide
Documentation version: 14.0e
Legal Notice
Copyright 2015 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to
provide attribution to the third party (Third Party Programs). Some of the Third Party Programs
are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under those
open source or free software licenses. Please see the Third Party Legal Notice Appendix to
this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Symantec as on premises
or hosted services. Any use, modification, reproduction release, performance, display or
disclosure of the Licensed Software and Documentation by the U.S. Government shall be
solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical Supports
primary role is to respond to specific queries about product features and functionality.
The Technical Support group also creates content for our online Knowledge Base.
The Technical Support group works collaboratively with the other functional areas
within Symantec to answer your questions in a timely fashion. For example, the
Technical Support group works with Product Engineering and Symantec Security
Response to provide alerting services and virus definition updates.
Symantecs support offerings include the following:
A range of support options that give you the flexibility to select the right amount
of service for any size organization
Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
Upgrade assurance that delivers software upgrades
Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
Premium service offerings that include Account Management Services
For information about Symantecs support offerings, you can visit our website at
the following URL:
www.symantec.com/business/support/
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
Questions regarding product licensing or serialization
Product registration updates, such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade assurance and support contracts
Information about the Symantec Buying Programs
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs, DVDs, or manuals
Support agreement resources
If you want to contact Symantec regarding an existing support agreement, please
contact the support agreement administration team for your region as follows:
Network Protect
See About Network Protect on page 52.
Network Monitor
Network Prevent
Endpoint Prevent
See About Endpoint Prevent on page 54.
The Discover, Protect, Monitor, Mobile Prevent, Mobile Email Monitor, and Prevent
modules can be deployed as stand-alone products or in combination. Regardless
of which stand-alone products you deploy, the Enforce Server is always provided
for central management. Note that the Network Protect module requires the Network
Discover/Cloud Storage Discover module.
Associated with each product module are corresponding detection servers:
Introducing Symantec Data Loss Prevention 49
About Symantec Data Loss Prevention
Centrally manage data security policies once and deploy immediately across
the entire Symantec Data Loss Prevention suite.
Scale data loss prevention according to the size of your organization.
Copy exposed or suspicious files. Network Protect can automatically copy those
files that violate policies to a quarantine area. The quarantine area can re-create
the source file structure for easy location, and leave the original file in place.
Quarantine file restoration. Network Protect can easily restore quarantined files
to their original or a new location.
Enforce access control and encryption policies. Network Protect proactively
ensures workforce compliance with existing access control and encryption
policies.
See About Symantec Data Loss Prevention on page 47.
See Configuring Network Protect for file shares on page 1247.
With Mobile Email Monitor, you can perform the following activities:
Monitor confidential information sent in corporate emails that are downloaded
to mobile devices.
Track what sensitive information was downloaded to monitored mobile devices
that are subsequently lost or stolen.
Mobile Email Monitor and Mobile Prevent are both included in the Symantec Data
Loss Prevention for Mobile license.
See Table 84-1 on page 1562.
See About Symantec Data Loss Prevention on page 47.
HTTP/HTTPS
IM
Network shares
Print/Fax
USB removable media devices
See About Symantec Data Loss Prevention on page 47.
Chapter 2
Getting started
administering Symantec
Data Loss Prevention
This chapter includes the following topics:
Icon Description
Select this page as your Home page. If the current screen cannot be
selected as your Home page, this icon is unavailable.
Icon Description
Print the current report. If the current screen contents cannot be sent to
the printer, this icon is unavailable.
Email the current report to one or more recipients. If the current screen
contents cannot be sent as an email, this icon is unavailable.
See Logging on and off the Enforce Server administration console on page 58.
Add the data profiles that you plan to associate with policies.
Data profiles are not always required. This step is necessary only if you are
licensed for data profiles and if you intend to use them in policies.
3 Click Save.
See About the administrator account on page 59.
See About the Enforce Server administration console on page 57.
See About the System Overview screen on page 204.
order, the administration console menus, labels, screens, and in some cases
the Help system, are translated into the chosen language.
See About Symantec Data Loss Prevention language packs on page 69.
The Report Preferences section:
To select your text encoding
1 Enter your current valid password in the Old Password field.
2 Select a text encoding option:
Use browser default encoding. Check this box to specify that text files
use the same encoding as your browser.
Pull down menu. Click on an encoding option in the pull down menu to
select it.
3 Click Save.
The new text encoding is applied to CSV exported files. This encoding lets you
select a text encoding that matches the encoding that is expected by CSV
applications.
To select a CSV delimiter
1 Enter your current valid password in the Old Password field.
2 Choose one of the delimiters from the pull-down menu.
3 Click Save.
The new delimiter is applied to the next comma-separated values (CSV) list
that you export.
See About incident reports on page 990.
See Exporting incident reports on page 1010.
To select XML export details
1 Enter your current valid password in the Old Password field.
2 Include Incident Violations in XML Export. If this box is checked, reports
exported to XML include the highlighted matches on each incident snapshot.
3 Include Incident History in XML Export. If this box is checked, reports
exported to XML include the incident history data that is contained in the History
tab of each incident snapshot.
4 Click Save.
Your selections are applied to the next report you export to XML.
If neither box is checked, the exported XML report contains only the basic incident
information.
Getting started administering Symantec Data Loss Prevention 64
Changing your password
About locales
International character sets. To view and work with international character sets,
the system on which you are viewing the Enforce Server administration console
must have the appropriate capabilities.
See Working with international characters on page 68.
Locale-based date and number formats, as well as sort orders for lists and
reports.
See About locales on page 70.
Localized user interface (UI) and Help system. Language packs for Symantec
Data Loss Prevention provide language-specific versions of the Enforce Server
administration console. They may also provide language-specific versions of
the online Help system.
Note: These language packs are added separately following initial product
installation.
Note: A mixed language notification pop-up displays if the user locale language
does not match the language used in the response rule.
For additional information about specific languages, see the Symantec Data Loss
Prevention Release Notes.
A number of capabilities are not implied by this support:
Technical support provided in a non-English language. Because Symantec Data
Loss Prevention supports a particular language does not imply that technical
support is delivered in that language.
Localized administrative user interface (UI) and documentation. Support for a
language does not imply that the UI or product documentation has been localized
into that language. However, even without a localized UI, user-defined portions
of the UI such as pop-up notification messages on the endpoint can still be
localized into any language by entering the appropriate text in the UI.
Localized content. Keywords are used in a number of areas of the product,
including policy templates and data identifiers. Support for a language does not
imply that these keywords have been translated into that language. Users may,
however, add keywords in the new language through the Enforce Server
administration console.
New file types, protocols, applications, or encodings. Support for a language
does not imply support for any new file types, protocols, applications, or
encodings that may be prevalent in that language or region other than what is
already supported in the product.
Language-specific normalization. An example of normalization is to treat accented
and unaccented versions of a character as the same. The product already
performs a number of normalizations, including standard Unicode normalization
that should cover the vast majority of cases. However, it does not mean that all
potential normalizations are included.
Region-specific normalization and validation. An example of this is the awareness
that the product has of the format of North American phone numbers, which
allows it to treat different versions of a number as the same, and to identify
invalid numbers in EDM source files. Support for a language does not imply this
kind of functionality for that language or region.
Items in these excluded categories are tracked as individual product enhancements
on a language- or region-specific basis. Contact Symantec Technical Support for
additional information on language-related enhancements or plans for the languages
not listed.
See About support for character sets, languages, and locales on page 65.
The operating system-based character set installed on the computer from which
you view the Enforce Server administration console
The capabilities of your browser
For example, an incident report on a scan of Russian-language data would contain
Cyrillic characters. To view that report, the computer and browser you use to access
the Enforce Server administration console must be capable of displaying these
characters. Here are some general guidelines:
If the computer you use to access the Enforce Server administration console
has an operating system localized for a particular language, you should be able
to view and use a character set that supports that language.
If the operating system of the computer you use to access the administration
console is not localized for a particular language, you may need to add
supplemental language support. This supplemental language support is added
to the computer you use to access the administration console, not on the Enforce
Server.
On a Windows system, you add supplemental language support using the
Control Panel > Regional and Language Options > Languages (tab) -
Supplemental Language Support to add fonts for some character sets.
Note: The Enforce Server administration console supports UTF-8 encoded data.
Caution: When you install a new version of Symantec Data Loss Prevention, any
language packs you have installed are deleted. For a new, localized version of
Symantec Data Loss Prevention, you must upgrade to a new version of the language
pack.
About locales
A locale provides the following:
Displays dates and numbers in formats appropriate for that locale.
Sorts lists and reports based on text columns, such as "policy name" or "file
owner," alphabetically according to the rules of the locale.
Locales are installed as part of a language pack.
An administrator can also configure an additional locale for use by individual users.
This additional locale need only be supported by the required version of Java.
For a list of these locales, see
http://www.oracle.com/technetwork/java/javase/javase7locales-334809.html.
The locale can be specified at product installation time, as described in the Symantec
Data Loss Prevention Installation Guide. It can also be configured at a later time
using the Language Pack Utility.
See Using a non-English language on the Enforce Server administration console
on page 71.
Working with languages and locales 71
Using a non-English language on the Enforce Server administration console
See About support for character sets, languages, and locales on page 65.
Note: The addition of multiple language packs could slightly affect Enforce Server
performance, depending on the number of languages and customizations present.
This results because an additional set of indexes has to be built and maintained
for each language.
See About Symantec Data Loss Prevention language packs on page 69.
See About locales on page 70.
A Symantec Data Loss Prevention administrator specifies which of the available
languages is the default system-wide language.
To choose the default language for all users
1 On the Enforce Server, go to System > Settings > General and click
Configure.
The Edit General Settings screen is displayed.
2 Scroll to the Language section of the Edit General Settings screen, and click
the button next to the language you want to use as the system-wide default.
3 Click Save.
Individual Symantec Data Loss Prevention users can choose which of the available
languages and locales they want to use by updating their profiles.
See Editing a user profile on page 61.
Administrators can use the Language Pack Utility to update the available languages.
Working with languages and locales 72
Using the Language Pack Utility
Note: If the Enforce Server runs on a Linux host, you must install language fonts
on the host machine using the Linux Package Manager application. Language font
packages begin with fonts-<language_name>. For example,
fonts-japanese-0.20061016-4.el5.noarch
To use the Language Pack Utility, you must have Read, Write, and Execute
permissions on all of the \SymantecDLP folders and subfolders.
To display help for the utility, such as the list of valid options and their flags, enter
LanguagePackUtility without any flags.
Note: Running the Language Pack Utility causes the VontuManager and
VontuIncidentPersister services to stop for as long as 20 seconds. Any users who
are logged on to the Enforce Server administration console will be logged out
automatically. When finished making its updates, the utility restarts the services
automatically, and users can log back on to the administration console.
Language packs for Symantec Data Loss Prevention can be obtained from Symantec
File Connect.
Working with languages and locales 73
Using the Language Pack Utility
LanguagePackUtility -a filename
where filename is the fully qualified path and name of the language pack ZIP
file.
For example, if the Japanese language pack ZIP file is stored in c:\temp, add
it by entering:
LanguagePackUtility -a c:\temp\Symantec_DLP_14.0_Japanese.zip
To add multiple language packs during the same session, specify multiple file
names, separated by spaces, for example:
LanguagePackUtility -a
c:\temp\Symantec_DLP_14.0_Japanese.zip
Symantec_DLP_14.0_Chinese.zip
3 Log on to the Enforce Server administration console and confirm that the new
language option is available on the Edit General Settings screen. To do this,
go to System > Settings > General > Configure > Edit General Settings.
To add a language pack (Linux)
1 Advise other users that anyone currently using the Enforce Server administration
console must save their work and log off.
2 Open a terminal session to the Enforce Server host and switch to the
DLP_system_account by running the following command:
su - DLP_system_account
4 Log on to the Enforce Server administration console and confirm that the new
language option is available on the Edit General Settings screen. To do this,
go to System > Settings > General > Configure > Edit General Settings.
Working with languages and locales 74
Using the Language Pack Utility
LanguagePackUtility -r locale
LanguagePackUtility -r fr_FR
To remove multiple language packs during the same session, specify multiple
file names, separated by spaces.
3 Log on to the Enforce Server administration console and confirm that the
language pack is no longer available on the Edit General Settings screen.
To do this, go to System > Settings > General > Configure > Edit General
Settings.
Removing a language pack has the following effects:
Users can no longer select the locale of the removed language pack for individual
use.
Note: If the locale of the language pack is supported by the version of Java
required for running Symantec Data Loss Prevention, the administrator can later
specify it as an alternate locale for any users who need it.
LanguagePackUtility -c locale
where locale is a valid locale code recognized by Java, such as pt_PT for
Portuguese.
For example, to change the locale to Brazilian Portuguese enter:
LanguagePackUtility -c pt_BR
3 Log on to the Enforce Server administration console and confirm that the new
alternate locale is now available on the Edit General Settings screen. To do
this, go to System > Settings > General > Configure > Edit General Settings.
If you specify a locale for which there is no language pack, "Translations
not available" appears next to the locale name. This means that formatting
and sort order are appropriate for the locale, but the Enforce Server
administration console screens and online Help are not translated.
Note: Administrators can only make one additional locale available for users that
is not based on a previously installed Symantec Data Loss Prevention language
pack.
See About support for character sets, languages, and locales on page 65.
Section 2
Managing the Enforce Server
platform
Vontu Update Installs the Symantec Data Loss Prevention system updates.
Managing Enforce Server services and settings 78
About starting and stopping services on Windows
Note: Start the Vontu Notifier service first before starting other services.
To stop the Symantec Data Loss Prevention Services on a Windows detection server
1 On the computer that hosts the detection server, navigate to Start > All
Programs > Administrative Tools > Services to open the Windows Services
menu.
2 From the Services menu, stop all running Symantec Data Loss Prevention
services, which might include the following services:
Vontu Update
Vontu Monitor
Note: Start the Vontu Notifier service before starting other services.
3 Before starting other Symantec Data Loss Prevention services, to start the
Vontu Notifier service, enter:
./VontuNotifier.sh start
./VontuManager.sh start
./VontuIncidentPersister.sh start
./VontuUpdate.sh start
./VontuMonitorController.sh start
./VontuUpdate.sh stop
./VontuIncidentPersister.sh stop
./VontuManager.sh stop
./VontuMonitorController.sh stop
./VontuNotifier.sh stop
To start the Symantec Data Loss Prevention services on a Linux detection server
1 On the computer that hosts the detection server, log on as root.
2 Change directory to /opt/SymantecDLP/Protect/bin.
3 To start the Symantec Data Loss Prevention services, enter:
./VontuMonitor.sh start
./VontuUpdate.sh start
./VontuUpdate.sh stop
./VontuMonitor.sh stop
3 Before starting other Symantec Data Loss Prevention services, to start the
Vontu Notifier service, enter:
./VontuNotifier.sh start
./VontuManager.sh start
./VontuMonitor.sh start
./VontuIncidentPersister.sh start
./VontuUpdate.sh start
./VontuMonitorController.sh start
./VontuUpdate.sh stop
./VontuIncidentPersister.sh stop
./VontuManager.sh stop
./VontuMonitor.sh stop
./VontuMonitorController.sh stop
./VontuNotifier.sh stop
Configuring roles
Roles determine what a user can see and do in the Enforce Server administration
console. For example, the Report role is a specific role that is included in most
Symantec Data Loss Prevention solution packs. Users in the Report role can view
incidents and create policies, and configure Discover targets (if you are running a
Discover Server). However, users in the Report role cannot create Exact Data or
Document Profiles. Also, users in the Report role cannot perform system
administration tasks. When a user logs on to the system in the Report role, the
Manage > Data Profiles and the System > Login Management modules in the
Enforce Server administration console are not visible to this user.
You can assign a user to more than one role. Membership in multiple roles allows
a user to perform different kinds of work in the system. For example, you grant the
information security manager user (InfoSec Manager) membership in two roles:
ISR (information security first responder) and ISM (information security manager).
The InfoSec Manager can log on to the system as either a first responder (ISR) or
a manager (ISM), depending on the task(s) to perform. The InfoSec Manager only
sees the Enforce Server components appropriate for those tasks.
You can also combine roles and policy groups to limit the policies and detection
servers that a user can configure. For example, you associate a role with the
European Office policy group. This role grants access to the policies that are
designed only for the European office.
See Policy deployment on page 292.
Users who are assigned to multiple roles must specify the desired role at log on.
Consider an example where you assign the user named "User01" to two roles,
"Report" and "System Admin." If "User01" wanted to log on to the system to
administer the system, the user would log on with the following syntax: Login:
System Admin\User01
See Logging on and off the Enforce Server administration console on page 58.
The Administrator user (created during installation) has access to every part of the
system and therefore is not a member of any access-control role.
See About the administrator account on page 59.
Password Forms-based sign-on With password authentication, the Enforce Server administration console
authentication authenticates each user by determining if the supplied user name and
password combination matches an active user account in the Enforce
Server configuration. An active user account is authenticated if it has
been assigned a valid role.
With password authentication, you must configure the user name and
password of each user account directly in the Enforce Server
administration console. You must also ensure that each user account
has at least one assigned role.
Active Directory Forms-based sign-on With Microsoft Active Directory authentication, the Enforce Server
authentication administration console first evaluates a supplied user name to determine
if the name exists in a configured Active Directory server. If the user
name exists in Active Directory, the supplied password for the user is
evaluated against the Active Directory password. Any password
configured in the Enforce Server configuration is ignored.
Certificate Single sign-on from Certificate authentication enables a user to automatically log on to the
authentication Public Key Infrastructure Enforce Server administration console using an X.509 client certificate
(PKI) that is generated by your public key infrastructure (PKI). To use
certificate-based single sign-on, you must first enable certificate
authentication in the Enforce Server.
If the certificate is valid and has not been revoked, then the Enforce
Server uses the common name (CN) in the certificate to determine if
that CN is mapped to an active user account with a role in the Enforce
Server configuration. For each user that will access the Enforce Server
administration console using certificate-based single sign-on, you must
create a user account in the Enforce Server that defines the
corresponding user's CN value. You must also assign one or more valid
roles to the user account.
When you install the Enforce Server, the installer prompts you to select the
authentication mechanism to use. Password authentication is the default mechanism
used with Symantec Data Loss Prevention, and you can use password authentication
even if you also use certificate authentication. If you use certificate authentication,
Managing roles and users 89
About configuring roles and users
you can optionally disable password authentication to rely on your PKI for all access
to the Enforce Server administration console.
If you upgrade from an earlier version of Symantec Data Loss Prevention, you can
enable certificate authentication using manual procedures.
deploy detection servers and run Network Discover scans. However, users in
this role cannot view detailed incident information or author policies. All solution
packs create a "Sys Admin" role that has system administrator privileges.
User Administrator
This role grants users the right to manage users and roles. Typically this role
grants no other access or privileges. Because of the potential for misuse, it is
recommended that no more than two people in the organization be assigned
this role (primary and backup).
Policy Admininistrator
This role grants users the right to manage policies and response rules. Typically
this role grants no other access or privileges. Because of the potential for misuse,
it is recommended that no more than two people in the organization be assigned
this role (primary and backup).
Policy Author
This role provides access to the Policies module and associated menu options
in the Enforce Server administration console. This role is suited for information
security managers who track incidents and respond to risk trends. An information
security manager can author new policies or modifying existing policies to prevent
data loss. All solution packs create an "InfoSec Manager" (ISM) role that has
policy authoring privileges.
Incident Responder
This role provides access to the Incidents module and associated menu options
in the Enforce Server administration console. Users in this role can track and
remediate incidents. Businesses often have at least two incident responder roles
that provide two levels of privileges for viewing and responding to incidents.
A first-level responder may view generic incident information, but cannot access
incident details (such as sender or recipient identity). In addition, a first-level
responder may also perform some incident remediation, such as escalating an
incident or informing the violator of corporate security policies. A second-level
responder might be escalation responder who has the ability to view incident
details and edit custom attributes. A third-level responder might be an
investigation responder who can create response rules, author policies, and
create policy groups.
All solution packs create an "InfoSec Responder" (ISR) role. This role serves
as a first-level responder. You can use the ISM (InfoSec Manager) role to provide
second-level responder access.
Your business probably requires variations on these roles, as well as other roles.
For more ideas about these and other possible roles, see the descriptions of the
roles that are imported with solution packs.
See Roles included with solution packs on page 91.
Managing roles and users 91
Roles included with solution packs
Users in this role can view, remediate, and delete incidents; look
up attributes; and edit all custom attributes.
This comprehensive role provides users with privileges to ensure
that compliance regulations are met. It also allows users to
develop strategies for risk reduction at a business unit (BU) level,
and view incident trends and risk scorecards.
Exec Executive:
Users in this role can view, remediate, and delete incidents; look
up attributes; and view all custom attributes.
This role provides users with access privileges to prevent data
loss risk at the macro level. Users in this role can review the risk
trends and performance metrics, as well as incident dashboards.
HRM HR Manager:
Users in this role can view, remediate, and delete incidents; look
up attributes; and edit all custom attributes.
This role provides users with access privileges to respond to the
security incidents that are related to employee breaches.
Users in this role can view, remediate, and delete incidents; look
up attributes; and edit all custom attributes.
This role provides users with access privileges to research details
of incidents, including forwarding incidents to forensics. Users in
this role may also investigate specific employees.
Managing roles and users 92
Configuring roles
Users in this role can view, remediate, and delete incidents; look
up attributes; and view or edit some custom attributes. They have
no access to sender or recipient identity details.
This role provides users with first-level incident response
privileges. Users can view policy incidents, find broken business
processes, and enlist the support of the extended remediation
team to remediate incidents.
Users in this role can view and remediate incidents, and author
policies. They have no access to incident details.
This role provides a single role for policy authoring and data loss
risk management.
Users in this role can administer the system and the system users,
and can view incidents. They have no access to incident details.
Configuring roles
Each Symantec Data Loss Prevention user is assigned to one or more roles that
define the privileges and rights that user has within the system. A users role
determines system administration privileges, policy authoring rights, incident access,
and more. If a user is a member of multiple roles, the user must specify the role
when logging on, for example: Login: Sys Admin/sysadmin01.
See About role-based access control on page 85.
See About configuring roles and users on page 89.
Managing roles and users 93
Configuring roles
To configure a role
1 Navigate to the System > Login Management > Roles screen.
2 Click Add Role.
The Configure Role screen appears, displaying the following tabs: General,
Incident Access, Policy Management, and Users.
3 In the General tab:
Enter a unique Name for the role. The name field is case-sensitive and is
limited to 30 characters. The name you enter should be short and
self-describing. Use the Description field to annotate the role name and
explain its purpose in more details. The role name and description appear
in the Role List screen.
In the User Privileges section, you grant user privileges for the role.
System privileges(s):
People privilege:
User Select the User Reporting option to enable users to view the user
Reporting risk summary.
(Risk
Note: The Incident > View privilege is automatically enabled for all
Summary,
incident types for users with the User Reporting privilege.
User
Snapshot) See About user risk on page 1063.
Managing roles and users 94
Configuring roles
In the Incidents section, you grant users in this role the following incident
privilege(s). These settings apply to all incident reports in the system,
including the Executive Summary, Incident Summary, Incident List, and
Incident Snapshots.
View Select the View option to enable users in this role to view policy
violation incidents.
You can customize incident viewing access by selecting various
Actions and Display Attribute options as follows:
By default the View option is enabled (selected) for all types
of incidents: Network Incidents, Discover Incidents,
Endpoint Incidents, Mobile Incidents, and Classification
Events.
To restrict viewing access to only certain incident types,
select (highlight) the type of incident you want to authorize
this role to view. (Hold down the Ctrl key to make multiple
selections.) If a role does not allow a user to view part of an
incident report, the option is replaced with "Not Authorized"
or is blank.
Note: If you revoke an incident-viewing privilege for a role, the
system deletes any saved reports for that role that rely on the
revoked privilege. For example, if you revoke (deselect) the
privilege to view network incidents, the system deletes any
saved network incident reports associated with the role.
Managing roles and users 95
Configuring roles
Custom The Custom Attributes list includes all of the custom attributes
Attributes configured by your system administrator, if any.
Select View All if you want users to be able to view all
custom attribute values.
Select Edit All if you want users to edit all custom attribute
values.
To restrict the users to certain custom attributes, clear the
View All and Edit All check boxes and individually select
the View and/or Edit check box for each custom attribute
you want viewable or editable.
Note: If you select Edit for any custom attribute, the View check
box is automatically selected (indicated by being grayed out).
If you want the users in this role to be able to view all custom
attribute values, select View All.
In the Discover section, you grant users in this role the following privileges:
Folder Risk This privilege lets users view Folder Risk Reports. Refer to the
Reporting Symantec Data Loss Prevention Data Insight Implementation
Guide.
Note: This privilege is only available for Symantec Data Loss
Prevention Data Insight licenses.
Content Root This prvilege lets users configure and run Content Root
Enumeration Enumeration scans. For more information about Content Root
Enumeration scans, See Working with Content Root Enumeration
scans on page 1231.
4 In the Incident Access tab, configure any conditions (filters) on the types of
incidents that users in this role can view.
Note: You must select the View option on the General tab for settings on the
Incident Access tab to have any effect.
For example, select Policy Group from the first drop-down list, select Is
Any Of from the second list, and then select Default Policy Group from
the final listbox. These settings would limit users to viewing only those
incidents that the default policy group detected.
5 In the Policy Management tab, select one of the following policy privileges
for the role:
Author Policies
This role privilege lets users add, edit, and delete policies within the policy
groups that are selected.
It also lets users modify system data identifiers, and create custom data
identifiers.
It also lets users create and modify User Groups.
This privilege does not let users create or manage Data Profiles. This activity
requires Enforce Server administrator privileges.
Discover Scan Control
Lets the users in this role create Discover targets, run scans, and view
Discover Servers.
Credential Management
Lets users create and modify the credentials that the system requires to
access target systems and perform Discover scans.
Policy Groups
Select All Policy Groups only if users in this role need access to all existing
policy groups and any that will be created in the future.
Otherwise you can select individual policy groups or the Default Policy
Group.
Note: These options do not grant the right to create, modify, or delete policy
groups. Only the users whose role includes the Server Administration
privilege can work with policy groups.
Note: Users cannot edit or author response rules for policy remediation
unless you select the Author Response Rules option.
Managing roles and users 100
Configuring user accounts
Note: Preventing users from authoring response rules does not prevent them
from executing response rules. For example, a user with no response-rule
authoring privileges can still execute smart response rules from an incident list
or incident snapshot.
6 In the Users tab, select any users to which to assign this role. If you have not
yet configured any users, you can assign users to roles after you create the
users.
7 Click Save to save your newly created role to the Enforce Server database.
Option Instructions
Use Password Select this option to use password authentication and allow the user to sign on using the Enforce
authentication Server administration console log on page. This option is required if the user account will be used
for a Reporting API Web Service client.
If you select this option, also enter the user password in the Password and the Re-enter
Password fields. The password must be at least eight characters long and is case-sensitive. For
security purposes, the password is obfuscated and each character appears as an asterisk.
If you configure advanced password settings, the user must specify a strong password. In addition,
the password may expire at a certain date and the user has to define a new one periodically.
You can choose password authentication even if you also use certificate authentication. If you
use certificate authentication, you can optionally disable sign on from the Enforce Server
administration console log on page.
Symantec Data Loss Prevention authenticates all Reporting API clients using password
authentication. If you configure Symantec Data Loss Prevention to use certificate authentication,
any user account that is used to access the Reporting API Web Service must have a valid
password. See the Symantec Data Loss Prevention Reporting API Developers Guide.
Note: If you configure Active Directory integration with the Enforce Server, users authenticate
using their Active Directory passwords. In this case the password field does not appear on the
Users screen.
Use Certificate Select this option to use certificate authentication and allow the user to automatically single
authentication sign-on with a certificate that is generated by a separate Private Key Infrastructure (PKI). This
option is available only if you have configured certificate authentication during the Symantec Data
Loss Prevention installation, or you have manually configured support for certificate authentication.
If you select this option, you must specify the common name (CN) value for the user in the
Common Name (CN) field. The CN value appears in the Subject field of the user's certificate,
which is generated by the PKI. Common names generally use the format, first_name
last_name identification_number.
The Enforce Server uses the CN value to map the certificate to this user account. If an
authenticated certificate contains the specified CN value, all other attributes of this user account,
such as the default role and reporting preferences, are applied when the user logs on.
Note: You cannot specify the same Common Name (CN) value in multiple Enforce Server user
accounts.
Managing roles and users 102
Configuring user accounts
Option Instructions
Account Disabled Select this option to lock the user out of the Enforce Server administration console. This option
disables access for the user account regardless of which authentication mechanism you use.
For security, after a certain number of consecutive failed logon attempts, the system automatically
disables the account and locks out the user. In this case the Account Disabled option is checked.
To reinstate the user account and allow the user to log on to the system, clear this option by
unchecking it.
5 Optionally enter an Email Address and select a Language for the user in the
General section of the page. The Language selection depends on the language
pack(s) you have installed.
6 In the Report Preferences section of the Users screen you specify the
preferences for how this user is to receive incident reports, including Text File
Encoding and CSV Delimiter.
If the role grants the privilege for XML Export, you can select to include incident
violations and incident history in the XML export.
7 In the Roles section, select the roles that are available to this user to assign
data and incident access privileges.
You must assign the user at least one role to access the Enforce Server
administration console.
See Configuring roles on page 92.
8 Select the Default Role to assign to this user at log on.
The default role is applied if no specific role is requested when the user logs
on.
For example, the Enforce Server administration console uses the default role
if the user uses single sign-on with certificate authentication or uses the logon
page.
Note: Individual users can change their default role by clicking Profile and
selecting a different option from the Default Role menu. The new default role
is applied at the next logon.
Note: Once you have saved a new user, you cannot edit the user name.
Note: If you log on with a different account (such as the root or Administrator
account) ensure that you do not change the permissions or ownership on any
Symantec Data Loss Prevention configuration file in the steps that follow.
Click anywhere in a row or the pencil icon (far right) to modify that role
See Configuring roles on page 92.
Click the red X icon (far right) to delete the role; a dialog box confirms the
deletion.
Before editing or deleting roles, note the following guidelines:
If you change the privileges for a role, users in that role who are currently logged
on to the system are not affected. For example, if you remove the Edit privilege
for a role, users currently logged on retain permission to edit custom attributes
for that session. However, the next time users log on, the changes to that role
take effect, and those users can no longer edit custom attributes.
If you revoke an incident-viewing privilege for a role, the Enforce Server
automatically deletes any saved reports that rely on the revoked privilege. For
example, if you revoke the privilege to view network incidents, the system deletes
any saved network incident reports associated with the newly restricted role.
Before you can delete a role, you must make sure there are no users associated
with the role.
When you delete a role, you delete all shared saved reports that a user in that
role saved.
See Manage and add users on page 105.
Click the red X icon (far right) to delete the user account; a dialog box confirms
the deletion.
Note: When you delete a user account, you also delete all private saved reports
that are associated with that user.
Note: Ensure that the clock on the Active Directory host is synched to within
five minutes of the clock on the Enforce Server host.
2 (Linux only) Make sure that the following Red Hat RPMs are installed on the
Enforce Server host:
Managing roles and users 107
Integrating Active Directory for user authentication
krb5-workstation
krb5-libs
pam_krb5
3 Create the krb5.ini (or krb5.conf for Linux) configuration file that gives the
Enforce Server information about your Active Directory domain structure and
Active Directory server addresses.
See Creating the configuration file for Active Directory integration on page 107.
4 Confirm that the Enforce Server can communicate with the Active Directory
server.
See Verifying the Active Directory connection on page 109.
5 Configure Symantec Data Loss Prevention to use Active Directory
authentication.
See Configuring the Enforce Server for Active Directory authentication
on page 110.
Note: If you are running Symantec Data Loss Prevention on Linux, verify the Active
Directory connection using the kinit utility. You must rename the krb5.ini file as
krb5.conf. The kinit utility requires the file to be named krb5.conf on Linux.
Symantec Data Loss Prevention assumes that you use kinit to verify the Active
Directory connection, and directs you to rename the file as krb5.conf.
Symantec Data Loss Prevention provides a sample krb5.ini file that you can
modify for use with your own system. The sample file is stored in
SymantecDLP\Protect\config (for example, \SymantecDLP\Protect\config on
Windows or /opt/Vontu/Protect/config on Linux). If you are running Symantec
Data Loss Prevention on Linux, Symantec recommends renaming the file to
krb5.conf. The sample file, which is divided into two sections, looks like this:
Managing roles and users 108
Integrating Active Directory for user authentication
[libdefaults]
default_realm = TEST.LAB
[realms]
ENG.COMPANY.COM = {
kdc = engAD.eng.company.com
}
MARK.COMPANY.COM = {
kdc = markAD.eng.company.com
}
QA.COMPANY.COM = {
kdc = qaAD.eng.company.com
}
The [libdefaults] section identifies the default domain. (Note that Kerberos
realms correspond to Active Directory domains.) The [realms] section defines an
Active Directory server for each domain. In the previous example, the Active
Directory server for ENG.COMPANY.COM is engAD.eng.company.com.
To create the krb5.ini or krb5.conf file
1 Go to SymantecDLP\Protect\config and locate the sample krb5.ini file.
For example, locate the file in \SymantecDLP\Protect\config (on Windows)
or /opt/Vontu/Protect/config (on Linux).
2 Copy the sample krb5.ini file to the c:\windows directory (on Windows) or
the /etc directory (on Linux). If you are running Symantec Data Loss Prevention
on Linux, plan to verify the Active Directory connection using the kinit
command-line tool. Rename the file as krb5.conf.
See Verifying the Active Directory connection on page 109.
3 Open the krb5.ini or krb5.conf file in a text editor.
4 Replace the sample default_realm value with the fully qualified name of your
default domain. (The value for default_realm must be all capital letters.) For
example, modify the value to look like the following:
default_realm = MYDOMAIN.LAB
5 Replace the other sample domain names with the names of your actual
domains. (Domain names must be all capital letters.) For example, replace
ENG.COMPANY.COM with ADOMAIN.COMPANY.COM.
6 Replace the sample kdc values with the host names or IP addresses of your
Active Directory servers. (Be sure to follow the specified format, in which
opening brackets are followed immediately by line breaks.) For example, replace
engAD.eng.company.com with ADserver.eng.company.com, and so on.
Managing roles and users 109
Integrating Active Directory for user authentication
7 Remove any unused kdc entries from the configuration file. For example, if
you have only two domains besides the default domain, delete the unused kdc
entry.
8 Save the file.
See Configuring the Enforce Server for Active Directory authentication on page 110.
To test the connection to the Active Directory server
1 On the Enforce Server host, go to the command line and navigate to the
directory where kinit is located.
2 Issue a kinit command using a known user name and password as
parameters. (Note that the password is visible in clear text when you type it on
the command line.) For example, issue the following:
The first time you contact Active Directory you may receive an error that it
cannot find the krb5.ini or krb5.conf file in the expected location. On
Windows, the error looks similar to the following:
In this case, copy the krb5.ini or krb5.conf file to the expected location and
then rerun the kinit command that is previously shown.
3 Depending on how the Active Directory server responds to the command, take
one of the following actions:
If the Active Directory server indicates it has successfully created a Kerberos
ticket, continue configuring Symantec Data Loss Prevention.
Managing roles and users 110
Integrating Active Directory for user authentication
See Creating the configuration file for Active Directory integration on page 107.
Managing roles and users 111
About configuring certificate authentication
7 If your environment has more than one Active Directory domain, enter the
domain names (separated by commas) in the Active Directory Domain List
field. The system displays them in a drop-down list on the user logon page.
Users then select the appropriate domain at logon. Do not list the default
domain, as it already appears in the drop-down list by default.
8 Click Save.
9 Go to the operating system services tool and restart the Symantec Data Loss
Prevention Manager service.
Note: Some browsers cache a user's client certificate, and will automatically log
the user onto the Administration Console after the user has chosen to sign out. In
this case, users must close the browser window to complete the log out process.
The following table describes the steps necessary to use certificate authentication
with Symantec Data Loss Prevention.
Managing roles and users 112
About configuring certificate authentication
Phase 2 Add certificate authority (CA) You can add CA certificates to the
certificates to establish the trust chain. Tomcat trust store when you install the
Enforce Server. Or, you can use the
Java keytool utility to manually add
certificates to an existing Enforce
Server.
Phase 3 (Optional) Change the Tomcat trust The Symantec Data Loss Prevention
store password. installer configures each new Enforce
Server installation with a default
Tomcat trust store password. Follow
these instructions to configure a
secure password.
Phase 4 Map certificate common name (CN) See Mapping Common Name (CN)
values to Enforce Server user values to Symantec Data Loss
accounts. Prevention user accounts on page 118.
Phase 5 Configure the Enforce Server to check See About certificate revocation
for certificate revocation. checks on page 119.
Phase 7 (Optional) Disable forms-based log on. If you want to use certificate-based
single sign-on for all access to the
Enforce Server, disable forms-based
log on.
Note: If you log on with a different account (such as the root or Administrator
account) ensure that you do not change the permissions or ownership on any
Symantec Data Loss Prevention configuration file in the steps that follow.
com.vontu.manager.certificate_authentication = true
com.vontu.manager.form_authentication = true
Set this option to false (disable forms-based log on) only if you want to require
a valid certificate for all Enforce Server administration console accounts,
including Administrator accounts. Ensure that you have installed all necessary
certificates and you have verified that users can log on using certificate
authentication.
See Adding certificate authority (CA) certificates to the Tomcat trust store
on page 115.
5 Save your changes and exit the text editor.
6 Change directory to the /opt/SymantecDLP/Protect/tomcat/conf (Linux) or
c:\SymantecDLP\Protect\tomcat\conf (Windows) directory. If you installed
Symantec Data Loss Prevention into a different directory, substitute the correct
path.
7 Open the server.xml file with a text editor.
8 To enable or verify certificate authentication, add or edit the option
clientAuth="want" as shown in the following line in the file:
Note: If you log on with a different account (such as the root or Administrator
account) ensure that you do not change the permissions or ownership on any
Tomcat configuration files in the steps that follow.
4 Use the keytool utility installed with Symantec Data Loss Prevention to add
a certificate to the Tomcat truststore. For Windows systems, enter:
In the above commands, replace CA_CERT_1 with a unique alias for the
certificate that you are importing. Replace certificate_1.cer with the name of
the certificate file you copied to the Enforce Server computer.
5 Enter the password to the keystore when the keytool utility prompts you to
do so. If you did not change the default keystore password, then the password
is protect.
6 Repeat these steps to install all the certificate files that are necessary to
complete the certificate chain.
7 Stop and then restart the Vontu Manager service to apply your changes.
8 If you have not yet changed the default Tomcat keystore password, do so now.
See Changing the Tomcat trust store password on page 116.
Note: If you log on with a different account (such as the root or Administrator
account) ensure that you do not change the permissions or ownership on any
Tomcat configuration files in the steps that follow.
Replace protect with the new password that you defined in the keytool
command.
8 Save your changes and exit the text editor.
9 Change directory to the /opt/SymantecDLP/Protect/config (Linux) or
c:\SymantecDLP\Protect\config (Windows) directory. If you installed
Symantec Data Loss Prevention into a different directory, substitute the correct
path.
10 Open the Manager.properties file with a text editor.
11 Add the following line in the file to specify the new password:
com.vontu.manager.tomcat.truststore.password = password
Replace password with the new password. Do not enclose the password with
quotation marks.
12 Save your changes and exit the text editor.
13 Stop and then restart the Vontu Manager service to apply your changes.
the log on page. (If password authentication is disabled, a log on failure is displayed
if the user does not provide a certificate.)
In order for a user to log on using single sign-on with certificate authentication, an
active user account must identify the user's CN value, and it must be assigned a
valid role in the Enforce Server configuration. If you want to prevent a user from
accessing the Enforce Server administration console without revoking the user's
client certificate, disable or delete the associated Enforce Server user account.
See Configuring user accounts on page 100.
OCSP is the first mechanism that Symantec Data Loss Prevention uses to perform
certificate revocation checks. After the Tomcat container has determined that a
client certificate is valid, the Enforce Server sends an OCSP request to a designated
OCSP responder to determine if the certificate was revoked. The information used
to contact the OCSP responder can be provided in one of two ways:
The Authority Information Access (AIA) field in a client certificate. The client
certificate itself can include the URL of the OCSP responder in an AIA field. The
following shows an example AIA field that defines an OCSP responder:
responder is accessible only by a proxy server, then you must configure the
proxy server settings in the Symantec Data Loss Prevention configuration.
The OCSP configuration file. As an alternative, you can manually configure
OCSP responder properties using the manager-certauth.security
configuration file. If you choose to use this file, the configuration in the file
overrides any information that is present in a client certificate's AIA field. This
method is commonly used if you want to use a local OCSP responder instead
of the one specified in the AIA field, or if your client certificates do not include
an AIA field.
See Manually configuring OCSP responder properties on page 124.
Note: If the OCSP responder that you configure in this file does not use the CA
certificate to sign its responses, then you must add the OCSP responder's
certificate to the Tomcat trust store.
See Adding certificate authority (CA) certificates to the Tomcat trust store
on page 115.
Note: Symantec Data Loss Prevention does not support specifying the CRLDP
using an LDAP URL.
If the CRL distribution point is defined in each certificate and the Enforce Server
can directly access the server, then no additional configuration is required to perform
revocation checks. However, if the CRL distribution point is accessible only by a
proxy server, then you must configure the proxy server settings in the Symantec
Data Loss Prevention configuration.
See Accessing the OCSP responder or CRLDP with a proxy on page 122.
Regardless of which revocation checking method you use, you must enable
certificate revocation checks on the Enforce Server computer. Certificate revocation
checks are enabled by default if you select certificate installation during the Enforce
Managing roles and users 121
About configuring certificate authentication
Note: If you log on with a different account (such as the root or Administrator
account) ensure that you do not change the permissions or ownership on any
Symantec Data Loss Prevention configuration file in the steps that follow.
wrapper.java.additional.19=-Dcom.sun.net.ssl.checkRevocation=true
wrapper.java.additional.20=-Djava.security.properties=../config/manager-certauth.security
Also enable this line in the file if you want to disable OCSP revocation checking.
(You can then configure a property in manager-certauth.security to disable
OCSP checks.)
Ensure that the configuration parameter points to the indicated OCSP
configuration file. Always edit the existing manager-certauth.security file,
rather than creating a new file.
See Manually configuring OCSP responder properties on page 124.
8 To enable revocation checking using a CRLDP, add or uncomment the following
line in the file:
wrapper.java.additional.22=-Dcom.sun.security.enableCRLDP=true
This option is enabled by default for new Symantec Data Loss Prevention
installations.
9 If you are using CRLDP revocation checks, optionally configure the cache
lifetime using the property:
wrapper.java.additional.22=-Dsun.security.certpath.ldap.cache.lifetime=30
This parameter specifies the length of time, in seconds, to cache the revocation
lists that are obtained from a CRL distribution point. After this time is reached,
a lookup is performed to refresh the cache the next time there is an
authentication request. 30 seconds is the default cache lifetime. Specify 0 to
disable the cache, or -1 to store cache results indefinitely.
10 Stop and then restart the Vontu Manager service to apply your changes.
CRLDP server are accessible only through a proxy, then you must configure the
proxy settings on the Enforce Server computer.
When you configure a proxy, the Enforce Server uses your proxy configuration for
all HTTP connections, such as those connections that are created when connecting
to a Data Insight server to fetch certificates. Check with your proxy administrator
before you configure these proxy settings, and consider allowing direct access to
OCSP and CRDLP servers if at all possible.
To configure proxy settings for an OCSP responder or CRLDP server
1 Ensure that the OCSP responder is configured in the AIA field of each
certificate.
See About certificate revocation checks on page 119.
2 Ensure that the CRLDP is defined in the CRL distribution point field of each
client certificate.
3 Log onto the Enforce Server computer using the account that you created
during Symantec Data Loss Prevention installation.
Note: If you log on with a different account (such as the root or Administrator
account) ensure that you do not change the permissions or ownership on any
Symantec Data Loss Prevention configuration file in the steps that follow.
wrapper.java.additional.22=-Dhttp.proxyHost=myproxy.mydomain.com
wrapper.java.additional.23=-Dhttp.proxyPort=8080
wrapper.java.additional.24=-Dhttp.nonProxyHosts=hosts
Replace myproxy.mydomain.com and 8080 with the host name and port of
your proxy server. Replace hosts with one or more accessible OCSP responder
to use if the proxy is unavailable. You can include server host names, fully
qualified domain names, or IP addresses separated with a pipe character. For
example:
wrapper.java.additional.24=-Dhttp.nonProxyHosts=ocsp-server|
127.0.0.1|DataInsight_Server_Host
Managing roles and users 124
About configuring certificate authentication
Note: If the OCSP responder that you configure in this file does not use the CA
certificate to sign its responses, then you must add the OCSP responder's certificate
to the Tomcat trust store.
See Adding certificate authority (CA) certificates to the Tomcat trust store
on page 115.
You can optionally log additional information about certificate revocation checks by
adding or uncommenting the following system property in the VontuManager.conf
file:
wrapper.java.additional.90=-Djava.security.debug=certpath
com.vontu.manager.form_authentication = false
Note: Disabling forms-based log on disables the feature for all users, including
those with Administrator privileges. As an alternative, you can disable forms-based
log on or certificate authentication for an individual user by configuring that user's
account.
See Configuring user accounts on page 100.
If you later turn on forms-based log on but the Administrator user account does not
have a password configured, you can reset the Administrator password using the
AdminPasswordReset utility.
1 Navigate to the Directory Connections This page is available at System > Settings > Directory
page (if not already there). Connections.
2 Click Create New Connection. This action takes you to the Configure Directory
Connection page.
3 Enter a Name for the directory server The Connection Name is the user-defined name for the
connection. connection. It appears at the Directory Connections home
page once the connection is configured.
4 Specify the Network Parameters for the Table 6-2 provides details on these parameters.
directory server connection. Enter or specify the following parameters:
5 Specify the Authentication mode for Table 6-3 provides details on configuring the authentication
connecting to the directory server. parameters.
6 Click Test Connection to verify the If there is anything wrong with the connection, the system
connection. displays an error message describing the problem.
Connecting to group directories 129
Configuring directory server connections
7 Click Save to save the direction connection The system automatically indexes the directory server after
configuration. you successfully create, test, and save the directory server
connection.
8 Select the Index and Replication Status Verify that the directory server was indexed. After some time
tab. (depending on the size of the directory server query), you
should see that the Replication Status is "Completed
<date> <time>". If you do not see that the status is
completed, verify that you have configured and tested the
directory connection properly. Contact your directory server
administrator for assistance.
9 Select the Index Settings tab. You can adjust the directory server indexing schedule as
necessary at the Index Settings tab.
You must enter the Fully Qualified Name (FQN) of the directory server. Do not use
the IP address.
Base DN Enter the Base DN for the directory server. This field only accepts one directory
server entry.
Encryption Method Select the Secure option if you want the communication between the directory server
and the Enforce Server to be encrypted using SSL.
Note: If you choose to use a secure connection, you may need to import the SSL
certificate for the directory server to the Enforce Server keystore. See Importing SSL
certificates to Enforce or Discover servers on page 203.
Authentication Description
Authentication Select the Authentication option to connect to the directory server using
authentication mode. Check Connect with Credentials to add your username and
password to authenticate to the directory server.
Username To authenticate with Active Directory, use one of the following methods:
Password Enter the password for the user name that was specified in the preceding field.
Table 6-4 Schedule group directory server indexing and view status
Index the directory The Once setting is selected by default and automatically indexes
server once. the director server at 12:00 AM the day after you create the initial
connection.
Index the directory Select the Daily option to schedule the index daily.
server daily.
Specify the time of day and, optionally, the Until duration for this
schedule.
Index the directory Select the Weekly option to schedule the index to occur once a
server weekly. week.
Index the directory Specify the day of the month to index the directory and the time.
server monthly.
Optionally, specify the Until duration for this schedule.
View the indexing and Select the Index and Replication Status tab to view the status of the
replication status. indexing process.
Indexing Status
Displays the next scheduled index, date and time.
Detection Server Name
Displays the detection server where the User Group profile is
deployed.
Replication Status
Displays the data and time of the most recent synchronization
with the directory group server.
Chapter 7
Managing stored
credentials
This chapter includes the following topics:
3 Click Save.
4 You can later edit or delete credentials from the credential store.
See Managing credentials in the credential store on page 134.
See Configuring endpoint credentials on page 133.
4 Click Save.
5 Go to: System > Settings > Credentials.
6 Click Add Credential.
7 Under the General section, enter the details of the credential you want to add.
8 Under Usage Permission, select Servers and Endpoint agents.
9 Click Save.
See About the credential store on page 132.
See Configuring the Endpoint Discover: Quarantine File action on page 899.
The five most recent system events of severity Warning or Severe are listed on
the Servers Overview screen (System > Servers > Overview).
See About the System Overview screen on page 204.
Reports on all system events of any severity can be viewed by going to System
> Servers > Events.
See System events reports on page 136.
Recent system events for a particular detection server are listed on the Server
Detail screen for that server.
See Server Detail screen on page 208.
Click on any event in an event list to go to the Event Details screen for that
event. The Event Details screen provides additional information about the event.
See Server event detail on page 140.
There are three ways that system events can be brought to your attention:
System event reports displayed on the administration console
System alert email messages
See About system alerts on page 147.
Syslog functionality
See Enabling a syslog server on page 145.
Some system events require a response.
See About system event responses on page 143.
To narrow the focus of system event management you can:
Use the filters in the various system event notification methods.
See System events reports on page 136.
Configure the system event thresholds for individual servers.
See Configuring event thresholds and triggers on page 141.
Table 8-1
Events Description
Type The type (severity) of the event. Type may be any one of those listed in
Table 8-2.
Host The IP address or host name of the server on which the event occurred.
See the Symantec Data Loss Prevention Administration Guide for information
on event code numbers.
Summary A brief description of the event. Click on the summary for more detail about
the event.
Event Description
System information
Warning
Severe
In addition to filtering by date range, you can also apply advanced filters. Advanced
filters are cumulative with the current date filter. This means that events are only
listed if they match the advanced filter and also fall within the current date range.
Multiple advanced filters can be applied. If multiple filters are applied, events are
only listed if they match all the filters and the date range.
To apply additional advanced filters
1 Click on Advanced Filters and Summarization.
2 Click on Add Filter.
3 Choose the filter you want to use from the left-most drop-down list. Available
filters are listed in Table 8-3.
4 Choose the filter-operator from the middle drop-down list.
For each advanced filter you can specify a filter-operator Is Any Of or Is None
Of.
5 Enter the filter value, or values, in the right-hand text box, or click a value in
the list to select it.
To select multiple values from a list, hold down the Control key and click
each one.
To select a range of values from a list, click the first one, then hold down
the Shift key and click the last value in the range you want.
Filter Description
Filter Description
Note: A small subset of the parameters that trigger system events have thresholds
that can be configured. These parameters should only be adjusted with advice from
Symantec Support. Before changing these settings, you should have a thorough
understanding of the implications that are involved. The default values are
appropriate for most installations.
See Configuring event thresholds and triggers on page 141.
Item Description
Item Description
To view and change the configurable parameters that trigger system events
1 Go to the Server Overview screen (System > Servers > Overview).
2 Click on the name of a detection server to display that server's Server Detail
screen.
3 Click the Server Settings tab.
The Advanced Server Settings screen for that server is displayed.
4 Change the configurable parameters, as needed.
BoxMonitor.DiskUsageError Indicates the amount of filled disk space Low disk space
(as a percentage) that triggers a severe
system event. For example, a Severe
event occurs if a detection server is
installed on the C drive and the disk
space error value is 90. The detection
server creates a Severe system event
when the C drive usage is 90% or
greater. The default is 90.
BoxMonitor.DiskUsageWarning Indicates the amount of filled disk space Low disk space
(as a percentage) that triggers a
Warning system event. For example, a
Warning event occurs if the detection
server is installed on the C drive and the
disk space warning value is 80. Then
the detection server generates a
Warning system event when the C drive
usage is 80% or greater. The default is
80.
BoxMonitor.MaxRestartCount Indicates the number of times that a process name restarts excessively
system process can be restarted in one
hour before a Severe system event is
generated. The default is 3.
In most cases, the system event summary and detail information should provide
enough information to direct investigation and remediation steps. The following
table provides some general guidelines for responding to system events.
Tablespace is almost full Add additional data files to the database. When the
hard disk is at 80% of capacity, obtain a bigger disk
instead of adding additional data files.
Monitor not responding Restart the Symantec Monitor service. If the event
persists, check the network connections. Make sure
the computer that hosts the detections server is
turned on by connecting to it. You can connect with
terminal services or another remote desktop
connection method. If necessary, contact Symantec
Support.
Alert or scheduled report sending Go to System > Settings > General and ensure that
failed the settings in the Reports and Alerts and SMTP
sections are configured correctly. Check network
connectivity between the Enforce Server and the
SMTP server. Contact Symantec Support.
Long message wait time Increase detection server capacity by adding more
CPUs or replacing the computer with a more powerful
one.
process_name restarts excessively Check the process by going to System > Servers
> Overview. To see individual processes on this
screen, Process Control must be enabled by going
to System > Settings > General > Configure.
N incidents in queue Investigate the reason for the incidents filling up the
queue.
The most likely reasons are as follows:
their systems may prefer to use syslog instead of alerts. Syslog may be preferred
if the volume of alerts seems unwieldy for email.
Syslog functionality is an on or off option. If syslog is turned on, all Severe events
are sent to the syslog server.
To enable syslog functionality
1 Go to the \SymantecDLP\Protect\config directory on Windows or the
/opt/SymantecDLP/Protect/config directory on Linux.
systemevent.syslog.host=server1
systemevent.syslog.port=600
systemevent.syslog.format= [{0}] {1} - {2}
Using this example, a low disk space event notification from an Enforce Server on
a host named dlp-1 would look like:
Note: Reports with incident data cannot be distributed if this option is set.
Send report data with emails. Symantec Data Loss Prevention sends
email messages and attaches the report data.
Managing system events and messages 148
Configuring system alerts
3 Enter the Enforce Server domain name or IP address in the Fully Qualified
Manager Name field.
If you send reports as links, Symantec Data Loss Prevention uses the domain
name as the basis of the URL in the report email.
Do not specify a port number unless you have modified the Enforce Server to
run on a port other than the default of 443.
4 If you want alert recipients to see any correlated incidents, check the
Correlations Enabled box.
When correlations are enabled, users see them on the Incident Snapshot
screen.
5 In the SMTP section, identify the SMTP server to use for sending out alerts
and reports.
Enter the relevant information in the following fields:
Server: The fully qualified hostname or IP address of the SMTP server that
Symantec Data Loss Prevention uses to deliver system events and
scheduled reports.
System email: The email address for the alert sender. Symantec Data Loss
Prevention specifies this email address as the sender of all outgoing email
messages. Your IT department may require the system email to be a valid
email address on your SMTP server.
User ID: If your SMTP server requires it, type a valid user name for
accessing the server. For example, enter DOMAIN\bsmith.
Password: If your SMTP server requires it, enter the password for the User
ID.
6 Click Save.
See About system alerts on page 147.
See Configuring system alerts on page 148.
See About system events on page 135.
Note that the Enforce Server must first be configured to send alerts and reports.
See Configuring the Enforce Server to send email alerts on page 147.
Alerts are specified and edited on the Configure Alert screen, which is reached
by System > Servers > Alerts and then choosing Add Alert to create a new alert,
or clicking on the name of an existing alert to modify it.
To create or modify an alert
1 Go the Alerts screen (System > Servers > Alerts).
2 Click the Add Alert tab to create a new alert, or click on the name of an alert
to modify it.
The Configure Alert screen is displayed.
3 Fill in (or modify) the name of the alert. The alert name is displayed in the
subject line of the email alert message.
4 Fill in (or modify) a description of the alert.
5 Click Add Condition to specify a condition that will trigger the alert.
Each time you click Add Condition you can add another condition. If you
specify multiple conditions, every one of the conditions must be met to trigger
the alert.
Click on the red X next to a condition to remove it from an existing alert.
6 Enter the email address that the alert is to be sent to. Separate multiple
addresses by commas.
7 Limit the maximum number of times this alert can be sent in one hour by
entering a number in the Max Per Hour box.
If no number is entered in this box, there is no limit on the number of times this
alert can be sent out. The recommended practice is to limit alerts to one or two
per hour, and to substitute a larger number later if necessary. If you specify a
large number, or no number at all, recipient mailboxes may be overloaded with
continual alerts.
8 Click Save to finish.
The Alerts list is displayed.
There are three kinds of conditions that you can specify to trigger an alert:
Event type - the severity of the event.
Server - the server associated with the event.
Event code - a code number that identifies a particular kind of event.
For each kind of condition, you can choose one of two operators:
Managing system events and messages 150
About log review
Is any of.
Is none of.
For each kind of condition, you can specify appropriate parameters:
Event type. You can select one, or a combination of, Information, Warning,
Severe. Click on an event type to specify it. To specify multiple types, hold down
the Control key while clicking on event types. You can specify one, two, or all
three types.
Server. You can select one or more servers from the list of available servers.
Click on the name of server to specify it. To specify multiple servers, hold down
the Control key while clicking on server names. You can specify as many different
servers as necessary.
Event code. Enter the code number. To enter multiple code numbers, separate
them with commas or use the Return key to enter each code on a separate line.
See System event codes and messages on page 151.
By combining multiple conditions, you can define alerts that cover a wide variety
of system conditions.
Note: If you define more than one condition, the conditions are treated as if they
were connected by the Boolean "AND" operator. This means that the Enforce Server
only sends the alert if all conditions are met. For example, if you define an event
type condition and a server condition, the Enforce Server only sends the alert if the
specified event occurs on the designated server.
See also the Symantec Data Loss Prevention System Maintenance Guide for
additional information about working with logs.
Note: Numbers enclosed in braces, such as {0}, indicate text strings that are
dynamically inserted into the actual event name or description message.
1001 Local monitor started All monitor processes have been started.
1002 Monitor started Some monitor processes are disabled and haven't been
started.
1003 Local monitor started Some monitor processes are disabled and haven't been
started.
1005 Local monitor stopped All monitor processes have been stopped.
1006 {0} failed to start Process {0} can't be started. See log files for more detail.
1007 {0} restarts excessively Process {0} has restarted {1} times during last {2} minutes.
1008 {0} is down {0} process went down before it had fully started.
1010 Restarted {0} {0} process was restarted because it went down unexpectedly.
1011 Restarted {0} {0} was restarted because it was not responding.
1012 Unable to start {0} Cannot bind to the shutdown datagram socket. Will retry.
1014 Low disk space Hard disk space is low. Symantec Data Loss Prevention
server disk usage is over {0}%.
1101 Aggregator failed to start Error starting Aggregator. {0} No incidents will be detected.
1102 Communications with non-legacy SSL keystore and truststore are not configured for this
agents are disabled endpoint server. Please go to configure server page to
configure SSL keystore and truststore.
1200 Loaded policy "{0}" Policy "{0}" v{1} ({2}) has been successfully loaded.
1202 No policies loaded No relevant policies are found. No incidents will be detected.
1203 Unloaded policy "{0}" Policy "{0}" has been unloaded.
1204 Updated policy "{0}" Policy "{0}" has been successfully updated. The current policy
version is {1}. Active channels: {2}.
1205 Incident limit reached for Policy The policy "{0}" has found incidents in more than {1}
"{0}" messages within the last {2} hours. The policy will not be
enforced until the policy is changed, or the reset period of {2}
hours is reached.
1206 Long message wait time Message wait time was {0}:{1}:{2}:{3}.
1207 Failed to load Vector Machine Failed to load [{0}] Vector Machine Learning profile. See
Learning profile server logs for more details.
1208 Failed to unload Vector Machine Failed to unload [{0}] Vector Machine Learning profile. See
Learning profile server logs for more details.
1209 Loaded Vector Machine Learning Loaded [{0}] Vector Machine Learning profile.
profile
Managing system events and messages 153
System event codes and messages
1210 Unloaded Vector Machine Unloaded [{0}] Vector Machine Learning profile.
Learning profile
1211 Vector Machine Learning training Training succeeded for [{0}] Vector Machine Learning profile.
successful
1212 Vector Machine Learning training Training failed for [{0}] Vector Machine Learning profile.
failed
1213 {0} messages timed out in {0} messages timed out in Detection in the last {1} minutes.
Detection recently Enable Detection execution trace logs for details.
1302 File Reader failed to start Error starting File Reader. {0} No incidents will be detected.
1303 Unable to delete folder File Reader was unable to delete folder "{0}" in the file system.
Please investigate, as this will cause system malfunction.
1305 Channel disabled Monitor channel "{0}" has been disabled. 1306 License
received. {0}.
1401 Invalid license The ICAP channel is not licensed or the license has expired.
No incidents will be detected or prevented by the ICAP
channel.
Managing system events and messages 154
System event codes and messages
1402 Content Removal Incorrect Configuration rule in line {0} is outdated or not written in
proper grammar format. Either remove it from the config file
or update the rule.
1403 Out of memory Error (Web While processing request on connection ID{0}, out of memory
Prevent) while processing error occurred. Please tune your setup for traffic load.
message
1404 Host restriction Any host (ICAP client) can connect to ICAP Server.
1405 Host restriction error Unable to get the IP address of host {0}.
1406 Host restriction error Unable to get the IP address of any host in Icap.AllowHosts.
1500 Invalid license The SMTP Prevent channel is not licensed or the license has
expired. No incidents will be detected or prevented by the
SMTP Prevent channel.
1501 Bind address error Unable to bind {0}. Please check the configured address or
the RequestProcessor log for more information. 1502 MTA
restriction error Unable to resolve host {0}.
1503 All MTAs restricted Client MTAs are restricted, but no hosts were resolved.
Please check the RequestProcessor log for more information
and correct the RequestProcessor.AllowHosts setting for this
Prevent server.
1504 Downstream TLS Handshake TLS handshake with downstream MTA {0} failed. Please
failed check SmtpPrevent and RequestProcessor logs for more
information.
1505 Downstream TLS Handshake TLS handshake with downstream MTA {0} was successfully
successful completed.
Managing system events and messages 155
System event codes and messages
1600 Override folder invalid Monitor channel {0} has invalid source folder: {1} Using folder:
{2}.
1601 Source folder invalid Monitor channel {0} has invalid source folder: {1} The channel
is disabled.
1700 Scan start failed Discover target with ID {0} does not exist. 1701 Scan
terminated {0}
1705 Scheduled scan failed Failed to start a scheduled scan of Discover target {0}. {1}
1708 Scheduled scan suspension Scheduled suspension failed for scan of Discover target {0}.
failed {1}
1709 Scheduled scan resume failed Scheduled suspension failed for scan of Discover target {0}.
{1}
1710 Maximum Scan Duration Timeout Discover target "{0}" timed out because of Maximum Scan
Occurred Duration.
1711 Maximum Scan Duration Timeout Maximum scan time duration timed out for scan: {0}. However,
Failed an error occurred while trying to abort the scan.
1712 Scan Idle Timeout Occurred Discover target "{0}" timed out because of Scan Idle Timeout.
1713 Scan Idle Timeout Failed Maximum idle time duration timed out for scan: {0}. However,
an error occurred while trying to abort the scan.
1714 Scan terminated - Invalid Server Scan of discover target "{0}" has been terminated from the
State state of "{1}" because the associated discover server {2}
entered an unexpected state of "{3}".
Managing system events and messages 156
System event codes and messages
1715 Scan terminated - Server Scan of discover target "{0}" has been terminated because
Removed the associated discover server {1} is no longer available.
1716 Scan terminated - Server Scan of discover target "{0}" has been terminated because
Reassigned the associated discover server {1} is already scanning
discover target(s) "{2}".
1717 Scan terminated - Transition Failed to handle the state change of discover server {1} while
Failed scanning discover target "{0}". See log files for details.
1718 Scan start failed Scan of discover target "{0}" has failed to start. See log files
for detailed error description.
1719 Scan start failed due to Scan of discover target "{0}" has failed, as its target type is
unsupported target type no longer supported.
1800 Incident Persister is unable to Persister ran out of memory processing incident {0}.
process incident Incident
1802 Corrupted incident received A corrupted incident was received, and renamed to {0}.
1804 Incident Persister is unable to Incident Persister cannot start because it failed to access the
start incident folder {0}. Check folder permissions.
1805 Incident Persister is unable to Incidents folder The Incident Persister is unable to access
access the incident folder {0}. Check folder permissions.
1806 Response rule processing failed Response rule processing failed to start: {0}.
to start
1807 Response rule processing Response rule command runtime execution failed from error:
execution failed {0}.
1808 Unable to write incident Failed to delete old temporary file {0}.
1809 Unable to write incident Failed to rename temporary incident file {0}.
Managing system events and messages 157
System event codes and messages
1810 Unable to list incidents Failed to list incident files in folder {0}. Check folder
permissions.
1811 Error sending incident Unexpected error occurred while sending an incident. {0}
Look in the incident writer log for more information.
1812 Incident writer stopped Failed to delete incident file {0} after it was sent. Delete the
file manually, correct the problem and restart the incident
writer.
1813 Failed to list incidents Failed to list incident files in folder {0}. Check folder
permissions.
1814 Incident queue backlogged There are {0} incidents in this server's queue.
1815 Low disk space on incident server Hard disk space for the incident data storage server is low.
Disk usage is over {0}%.
1816 Failed to update policy statistics Failed to update policy statistics for policy {0}.
1817 Daily incident maximum The daily incident maximum for policy {0} has been
exceeded exceeded.\n No further incidents will be generated.
1818 Incident is oversized, has been Incident is oversized, has been partially persisted with
persisted with a limited number messageID {0}, Incident File Name {1}.
of components and/or violations
1900 Failed to load update package Database connection error occurred while loading the
software update package {0}.
1901 Software update failed Failed to apply software update from package {0}. Check the
update service log.
2000 Key ignition error Failed to ignite keys with the new ignition password. Detection
against Exact Data Profiles will be disabled.
Managing system events and messages 158
System event codes and messages
2001 Unable to update key ignition The key ignition password won't be updated, because the
password. cryptographic keys aren't ignited. Exact Data Matching will
be disabled.
2099 Administrator password reset The Administrator password has been reset by the password
reset tool.
2101 Data source removed The data source with ID {0} was removed by {1}.
2102 Data source saved The {0} data source was saved by {1}.
2103 Document source removed The document source with ID {0} was removed by {1}.
2104 Document source saved The {0} document source was saved by {1}.
2105 New protocol created The new protocol {0} was created by {1}.
2106 Protocol order changed The protocol {0} was moved {1} by {2}.
2109 User removed The user with ID {0} was removed by {1}.
2111 Runaway lookup detected One of the attribute lookup plug-ins did not complete
gracefully and left a running thread in the system. Manager
restart may be required for cleanup.
2112 Loaded Custom Attribute Lookup Plug-ins The following Custom Attribute
Lookup Plug-ins were loaded: {0}.
2113 No Custom Attribute Lookup No Custom Attribute Lookup Plug-in was found.
Plug-in was loaded
Managing system events and messages 159
System event codes and messages
2114 Custom attribute lookup failed Lookup plug-in {0} timed out. It was unloaded.
2115 Custom attribute lookup failed Failed to instantiate lookup plug-in {0}. It was unloaded. Error
message: {1}
2118 Alert or scheduled report sending configured by {1} contains the following unreachable email
failed. {0} addresses: {2}. Either the addresses are bad or your email
server does not allow relay to those addresses.
2119 System settings changed The system settings were changed by {0}.
2120 Endpoint Location settings The endpoint location settings were changed by {0}.
changed
2121 The account ''{1}'' has been The maximum consecutive failed logon number of {0}
locked out attempts has been exceeded for account ''{1}'', consequently
it has been locked out.
2122 Loaded FlexResponse Actions The following FlexResponse Actions were loaded: {0}.
2124 A runaway FlexResponse action One of the FlexResponse plug-ins did not complete gracefully
was detected. and left a running thread in the system. Manager restart may
be required for cleanup.
2125 Data Insight settings changed. The Data Insight settings were changed by {0}.
2126 Agent configuration created Agent configuration {0} was created by {1}.
2127 Agent configuration modified Agent configuration {0} was modified by {1}.
2128 Agent configuration removed Agent configuration {0} was removed by {1}.
2129 Agent configuration applied Agent configuration {0} was applied to endpoint server {1} by
{2}.
2130 Directory Connection source The directory connection source with ID {0} was removed by
removed {1}.
2131 Directory Connection source The {0} directory connection source was saved by {1}.
saved
Managing system events and messages 160
System event codes and messages
2132 Agent Troubleshooting Task Agent Troubleshooting task of type {0} created by user {1}.
2134 Certificate authority file is corrupt. Certificate authority file {0} is corrupt.
2135 Password changed for certificate Password changed for certificate authority file {0}. New
authority file. certificate authority file is {1}.
2136 Server keystore generated. Server keystore {0} generated for endpoint server {1}.
2137 Server keystore is missing or Server keystore {0} for endpoint server {1} is missing or
corrupt. corrupt.
2138 Server truststore generated. Server truststore {0} generated for endpoint server {1}.
2139 Server truststore is missing or Server truststore {0} for endpoint server {1} is missing or
corrupt. corrupt.
2140 Client certificates and key Client certificates and key generated.
generated.
2141 Agent installer package Agent installer package generated for platforms {0}.
generated.
2200 End User License Agreement The Symantec Data Loss Prevention End User License
accepted Agreement was accepted by {0}, {1}, {2}.
2202 License has expired One or more of your product licenses has expired. Some
system feature may be disabled. Check the status of your
licenses on the system settings page.
2203 License about to expire One or more of your product licenses will expire soon. Check
the status of your licenses on the system settings page.
2204 No license The license does not exist, is expired or invalid. No incidents
will be detected.
2205 Keys ignited The cryptographic keys were ignited by administrator logon.
Managing system events and messages 161
System event codes and messages
2206 Key ignition failed Failed to ignite the cryptographic keys manually. Please look
in the Enforce Server logs for more information. It will be
impossible to create new exact data profiles.
2207 Auto key ignition The cryptographic keys were automatically ignited.
2208 Manual key ignition required The automatic ignition of the cryptographic keys is not
configured. Administrator logon is required to ignite the
cryptographic keys. No new exact data profiles can be created
until the administrator logs on.
2300 Low disk space Hard disk space is low. Symantec Data Loss Prevention
Enforce Server disk usage is over {0}%.
2301 Tablespace is almost full Oracle tablespace {0} is over {1}% full.
2302 {0} not responding Detection Server {0} did not update its heartbeat for at least
20 minutes.
2303 Monitor configuration changed The {0} monitor configuration was changed by {1}.
2304 System update uploaded A system update was uploaded that affected the following
components: {0}.
2305 SMTP server is not reachable. SMTP server is not reachable. Cannot send out alerts or
schedule reports.
2308 Monitor status updater exception The monitor status updater encountered a general exception.
Please look at the Enforce Server logs for more information.
2309 System statistics update failed Unable to update the Enforce Server disk usage and database
usage statistics. Please look at the Enforce Server logs for
more information.
2310 Statistics aggregation failure The statistics summarization task encountered a general
exception. Refer to the Enforce Server logs for more
information.
Managing system events and messages 162
System event codes and messages
2311 Version mismatch Enforce version is {0}, but this monitor's version is {1}.
2313 Incident deletion completed Incident deletion ran for {0} and deleted {1} incident(s).
2315 Low disk space on incident server Hard disk space for the incident data storage server is low.
Disk usage is over {0}%.
2316 Over {0} incidents currently Persisting over {0} incidents can decrease database
contained in the database performance.
2320 Version obsolete Detection server is not supported when two major versions
older than Enforce server version. Enforce version is {0}, and
this detection server''s version is {1}. This detection server
must be upgraded.
2321 Version older than Enforce Enforce will not have visibility for this detection server and
version will not be able to send updates to it. Detection server
incidents will be received and processed normally. Enforce
version is {0}, and this detection server''s version is {1}.
2322 Version older than Enforce Functionality introduced with recent versions of Enforce
version relevant to this type of detection server will not be supported
by this detection server. Enforce version is {0}, and this
detection server''s version is {1}.
2323 Minor version older than Enforce Functionality introduced with recent versions of Enforce
minor version relevant to this type of detection server will not be supported
by this detection server and might be incompatible with this
detection server. Enforce version is {0}, and this detection
server''s version is {1}. This detection server should be
upgraded.
2324 Version newer than Enforce Detection server is not supported when its version is newer
version than the Enforce server version. Enforce version is {0}, and
this detection server''s version is {1}. Enforce must be
upgraded or detection server must be downgraded.
Managing system events and messages 163
System event codes and messages
2400 Export web archive finished Archive "{0}" for user {1} was created successfully.
2401 Export web archive canceled Archive "{0}" for user {1} was canceled.
2402 Export web archive failed Failed to create archive "{0}" for user {1}. The report specified
had over {2} incidents.
2403 Export web archive failed Failed to create archive "{0}" for user {1}. Failure occurred at
incident {2}.
2404 Unable to run scheduled report The scheduled report job {0} was invalid and has been
removed.
2405 Unable to run scheduled report The scheduled report {0} owned by {1} encountered an error:
{2}.
2406 Report scheduling is disabled The scheduled report {0} owned by {1} cannot be run because
report scheduling is disabled.
2407 Report scheduling is disabled The scheduled report cannot be run because report
scheduling is disabled.
2408 Unable to run scheduled report Unable to connect to mail server when delivery scheduled
report {0}{1}.
2409 Unable to run scheduled report User {0} is no longer in role {1} which scheduled report {2}
belongs to. The schedule has been deleted.
2410 Unable to run scheduled report Unable to run scheduled report {0} for user {1} because the
account is currently locked.
2411 Scheduled report sent The schedule report {0} owned by {1} was successfully sent.
2412 Export XML report failed XML Export of report by user [{0}] failed XML Export of report
by user [{0}] failed.
2420 Unable to run scheduled data Unable to distribute report {0} (id={1}) by data owner because
owner report distribution sending of report data has been disabled.
2421 Report distribution by data owner Report distribution by data owner for report {0} (id={1}) failed.
failed
2422 Report distribution by data owner Report distribution by data owner for report {0} (id={1})
finished finished with {2} incidents for {3} data owners. {4} incidents
for {5} data owners failed to be exported.
Managing system events and messages 164
System event codes and messages
2423 Report distribution to data owner The report distribution {1} (id={2}) for the data owner "{0}"
truncated exceeded the maximum allowed size. Only the first {3}
incidents were sent to "{0}".
2424 A deprecated version of the A client is using a deprecated version of the Reporting API
Reporting API is being used. that will be disabled with version 13.0 of Data Loss
Prevention. Please upgrade the client to v2011 of the API,
available with Data Loss Prevention version 11.6 and later,
to avoid future service disruptions.
2500 Unexpected Error Processing {0} encountered an unexpected error processing a message.
Message See the log file for details.
2501 Memory Throttler disabled {0} x {1} bytes need to be available for memory throttling.
Only {2} bytes were available. Memory Throttler has been
disabled.
2600 Communication error Unexpected error occurred while sending {1} updates to {0}.
{2} Please look at the monitor controller logs for more
information.
2650 Communication error(VML) Unexpected error occurred while sending profile updates
config set {0} to {1} {2}. Please look at the monitor controller
logs for more information.
2702 Update transferred to {0} Successfully transferred update package {1} to detection
server {0}.
Managing system events and messages 165
System event codes and messages
2703 Update transfer complete Successfully transferred update package {0} to all detection
servers.
2704 Update of {0} failed Failed to transfer update package to detection server {0}.
2705 Configuration file delivery Successfully transferred config file {0} to detection server.
complete
2706 Log upload request sent. Successfully sent log upload request {0}.
2707 Unable to send log upload Encountered a recoverable error while attempting to deliver
request log upload request {0}.
2708 Unable to send log upload Encountered an unrecoverable error while attempting to
request deliver log upload request {0}.
2709 Using built-in certificate Using built-in certificate to secure the communication between
Enforce and Detection Servers.
2710 Using user generated certificate Using user generated certificate to secure the communication
between Enforce and Detection Servers.
2711 Time mismatch between Enforce Time mismatch between Enforce and Monitor. It is
and Monitor. This may affect recommended to fix the time on the monitor through automatic
certain functionalities in the time synchronization.
system.
2800 Bad spool directory configured Packet Capture has been configured with a spool directory:
for Packet Capture {0}. This directory does not have write privileges. Please
check the directory permissions and monitor configuration
file. Then restart the monitor.
2901 Keys are not ignited Exact Data Matching will be disabled until the cryptographic
keys are ignited.
Managing system events and messages 166
System event codes and messages
2902 Index folder inaccessible Failed to list files in the index folder {0}. Check the
configuration and the folder permissions.
2903 Created index folder The local index folder {0} specified in the configuration had
not existed. It was created.
2904 Invalid index folder The index folder {0} specified in the configuration does not
exist.
2905 Exact data profile creation failed Data file for exact data profile "{0}" was not created. Please
look in the enforce server logs for more information.
2907 Replication canceled Canceled replication of database profile "{0}" version {1} to
server {2}.
2908 Replication failed Connection to database was lost while replicating database
profile {0} to server {1}.
2909 Replication failed Database error occurred while replicating database profile
{0} to server {1}.
2910 Failed to remove index file Failed to delete index file {1} of database profile {0}.
2911 Failed to remove index files Failed to delete index files {1} of database profile {0}.
2912 Failed to remove orphaned file Failed to remove orphaned database profile index file {0}.
2913 Replication failed Replication of database profile {0} to server {2} failed.{1}
Check the monitor controller log for more details.
2914 Replication completed Completed replication of database profile {0} to server {2}.
File {1} was transferred successfully.
2915 Replication completed Completed replication of database profile {0} to the server
{2}. Files {1} were transferred successfully.
2916 Database profile removed Database profile {0} was removed. File {1} was deleted
successfully.
2917 Database profile removed Database profile {0} was removed. Files {1} were deleted
successfully.
2918 Loaded database profile Loaded database profile {0} from {1}.
2920 Failed to load database profile {2} No incidents will be detected against database profile "{0}"
version {1}.
2921 Failed to unload database profile {2} It may not be possible to reload the database profile "{0}"
version {1} in the future without detection server restart.
2922 Couldn''t find registered content Registered content with ID {0} wasn''t found in database
during indexing.
2924 Process shutdown during The process has been shutdown during indexing. Some
indexing registered content may have failed to create.
2925 Policy is inaccurate Policy "{0}" has one or more rules with unsatisfactory
detection accuracy against {1}.{2}
2926 Created exact data profile Created {0} from file "{1}".\nRows processed: {2}\nInvalid
rows: {3}\nThe exact data profile will now be replicated to all
Symantec Data Loss Prevention Servers.
2927 User Group "{0}" synchronization The following User Group directories have been
failed removed/renamed in the Directory Server and could not be
synchronized: {1}.Please update the "{2}" User Group page
to reflect such changes.
2928 One or more EDM profiles are out Check the "Manage > Data Profiles > Exact Data" page for
of date and must be reindexed more details. The following EDM profiles are out of date: {0}.
3002 Replication canceled Canceled replication of document profile "{0}" version {1} to
server {2}.
3003 Replication failed Connection to database was lost while replicating document
profile "{0}" version {1} to server {2}.
3004 Replication failed Database error occurred while replicating document profile
"{0}" version {1} to server {2}.
Managing system events and messages 168
System event codes and messages
3005 Failed to remove index file Failed to delete index file {2} of document profile "{0}" version
{1}.
3006 Failed to remove index files Failed to delete index files {2} of document profile "{0}" version
{1}.
3008 Replication failed Replication of document profile "{0}" version {1} to server {3}
failed. {2}\nCheck the monitor controller log for more details.
3009 Replication completed Completed replication of document profile "{0}" version {1}
to server {3}. File {2} was transferred successfully.
3010 Replication completed Completed replication of document profile "{0}" version {1}
to server {3}.\nFiles {2} were transferred successfully.
3011 Document profile removed Document profile "{0}" version {1} was removed. File {2} was
deleted successfully.
3012 Document profile removed Document profile "{0}" version {1} was removed. Files {2}
were deleted successfully.
3013 Loaded document profile Loaded document profile "{0}" version {1} from {2}.
3014 Unloaded document profile Unloaded document profile "{0}" version {1}.
3015 Failed to load document profile {2}No incidents will be detected against document profile "{0}"
version {1}.
3016 Failed to unload document profile {2} It may not be possible to reload the document profile "{0}"
version {1} in the future without monitor restart.
3017 Created document profile Created "{0}" from "{1}". There are {2} accessible files in the
content root. {3} The profile contains index for {4}
document(s). {5} The document profile will now be replicated
to all Symantec Data Loss Prevention Servers.
3018 Document profile {0} has reached maximum size. Only {1} out of {2} documents
are indexed.
3100 Invalid Attributes detected with Invalid or unsafe Attributes passed from Standard In were
Script Lookup Plugin removed during script execution. Please check the logs for
more details.
3101 Invalid Attributes detected with Invalid or unsafe Attributes passed to Standard Out were
Script Lookup Plugin removed during script execution. Please check the logs for
more details.
3301 Capture failed to start on device Device {0} is configured for capture, but could not be
{0} initialized. Please see PacketCapture.log for more information.
3302 PacketCapture could not elevate PacketCapture could not elevate its privileges. Some
its privilege level initialization tasks are likely to fail. Please check ownership
and permissions of the PacketCapture executable.
3303 PacketCapture failed to drop its Root privileges are still attainable after attempting to drop
privilege level them. PacketCapture will not continue
3304 Packet Capture started again as Packet capture started processing again because some disk
more disk space is available space was freed on the monitor hard drives.
3305 Packet Capture stopped due to Packet capture stopped processing packets because there
disk space limit is too little space on the monitor hard drives.
3306 Endace DAG driver is not Packet Capture was unable to activate Endace device
available support. Please see PacketCapture.log for more information.
3307 PF_RING driver is not available Packet Capture was unable to activate devices using the
PF_RING interface. Please check PacketCapture.log and
your system logs for more information.
3308 PACKET_MMAP driver is not Packet Capture was unable to activate devices using the
available PACKET_MMAP interface. Please check PacketCapture.log
and your system logs for more information.
3309 {0} is not available Packet Capture was unable to load {0} . No native capture
interface is available. Please see PacketCapture.log for more
information.
3310 No {0} Traffic Captured {0} traffic has not been captured in the last {1} seconds.
Please check Protocol filters and the traffic sent to the
monitoring NIC.
3311 Could not create directory Could not create directory {0} : {1}.
3400 Couldn't add files to zip The files requested for collection could not be written to an
archive file.
3401 Couldn't send log collection The files requested for collection could not be sent.
Managing system events and messages 171
System event codes and messages
3402 Couldn't read logging properties A properties file could not be read. Logging configuration
changes were not applied.
3403 Couldn't unzip log configuration The zip file containing logging configuration changes could
package not be unpacked. Configuration changes will not be applied.
3404 Couldn't find files to collect There were no files found for the last log collection request
sent to server.
3405 File creation failed Could not create file to collect endpoint logs.
3406 Disk usage exceeded File creation failed due to insufficient disk space.
3407 Max open file limit exceeded File creation failed as max allowed number of files are already
open.
3500 SPC Server successfully SPC Server successfully registered. Product Instance Id [{0}].
registered.
3501 SPC Server successfully SPC Server successfully unregistered. Product Instance Id
unregistered. [{0}].
3502 A self-signed certificate was A self-signed certificate was generated. Certificate alias [{0}].
generated.
3600 User import completed User import from source {0} completed successfully.
successfully.
3601 User import failed. User import from data source {0} has failed.
3602 Updated user data linked to Updated user data linked to {0} existing incident events.
incidents.
3700 Unable to write catalog item Failed to delete old temporary file {0}.
Managing system events and messages 172
System event codes and messages
3701 Unable to rename catalog item Failed to rename temporary catalog item file {0}.
3702 Unable to list catalog items Failed to list catalog item files in folder {0}.Check folder
permissions.
3703 Error sending catalog items Unexpected error occurred while sending an catalog
item.{0}Look in the file reader log for more information.
3704 File Reader failed to delete files. Failed to delete catalog file {0} after it was sent.\nDelete the
file manually, correct the problem and restart the File Reader.
3705 Failed to list catalog item files Failed to list catalog item files in folder {0}.Check folder
permissions.
3706 The configuration is not valid. The property {0} was configured with invalid value {1}. Please
make sure that this has correct value provided.
3707 Scan failed: Remediation Remediation detection catalog update timed out after {0}
detection catalog could not be seconds for target {1}.
updated
3802 Invalid Port for Could not retrieve the port for DetectionServerDatabase
DetectionServerDatabase process to listen to connection. Reason: {0}. Check if the
property file setting has the valid port number.
3803 Telemetry transmission failed. Telemetry transmission failed. Transmission status : {0}
Managing system events and messages 173
System event codes and messages
3900 Internal communications error. Internal communications error. Please see {0} for errors.
Search for the string {1}.
3901 System events have been System event throttle limit exceeded. {0} events have been
suppressed. suppressed. Internal error code = {1}.
4000 Agent Handshaker error Agent Handshaker error. Please see {0} for errors. Search
for the string {1}.
4050 Agent data batch persist error Unexpected error occurred while agent data being persisted
: {0}. Please look at the monitor controller logs for more
information.
4051 Agent status attribute batch Status attribute data for {0} agent(s) could not be persisted.
persist error Please look at the monitor controller logs for more information.
4052 Agent event batch persist Event data for {0} agent(s) could not be persisted. Please
look at the monitor controller logs for more information.
4101 Response Rule Execution Request fetch failed even after {0} retries. Database
Service Database failure on connection still down. The service will be stopped.
request fetch
Chapter 9
Managing the Symantec
Data Loss Prevention
database
This chapter includes the following topics:
You can generate a full database report in HTML format to share with Symantec
Technical Support at any time by clicking Get full report. The data in the report
can help Symantec Technical Support troubleshoot issues in your database.
See Generating a database report on page 176.
Extendable To (MB): The maximum size to which the file can be automatically
extended, in megabytes.
Path: The path to the file.
com.vontu.manager.tablespaceThreshold.warning=85
com.vontu.manager.tablespaceThreshold.severe=95
Other Tables: This tab lists all other tables in the schema. The tab displays the
following information:
Table Name: The name of the table.
In Tablespace: The name of the tablespace that contains the table.
Size (MB): The size of the table, in megabytes.
% Full: The percentage of the table currently in use.
Indices: This table lists all of the indexes in the schema. The tab displays the
following information:
Managing the Symantec Data Loss Prevention database 178
Viewing table details
LOB Segments: This table lists all of the locator object (LOB) tables in the
schema. The tab displays the following information:
Table Name: The name of the table.
Column Name: The name of the table column containing the LOB data.
In Tablespace: The name of the tablespace that contains the table.
LOB Segment Size (MB): The size of the LOB segment, in megabytes.
LOB Index Size: The size of the LOB index, in megabytes.
% Full: The percentage of the table currently in use.
Note: The percentage used value for each table displays the percentage of the
table currently in use as reported by the Oracle database in dark blue. It also includes
an additional estimated percentage used range in light blue. Symantec Data Loss
Prevention calculates this range based on tablespace utilization.
Chapter 10
Adding a new product
module
This chapter includes the following topics:
4 In the Install License field, browse for the new Symantec Data Loss Prevention
license file you downloaded, then click Save to agree to the terms and
conditions of the end user license agreement (EULA) for the software and to
install the license.
Note: If you do not agree to the terms and conditions of the EULA, you cannot
install the software.
Server controls
Server configurationbasic
Server configurationadvanced
Removing a server
File Reader The File Reader process The FileReader Status is available for all
detects incidents. detection servers.
Incident Writer The Incident Writer process The IncidentWriter Status is available for
sends incidents to the Enforce all detection servers, unless they are part
Server. of a single-tier installation, in which case
there is only one Incident Writer process.
Packet Capture The Packet Capture process The PacketCapture Status is available
captures network streams. for Network Monitor.
Server controls
Servers and their processes are controlled from the Server Detail screen.
Installing and managing detection servers 185
Server controls
To reach the Server Detail screen for a particular server, go to the Overview
screen (System > Servers > Overview) and click on the server's name in the
list.
See Server Detail screen on page 208.
The status of the server and its processes appears in the General section of the
Server Detail screen. The Start, Recycle and Stop buttons control server and
process operations.
Current status of the server is displayed in the General section of the Server Detail
screen. The possible values are:
Icon Status
Note: Status and controls for individual server processes are only displayed if
Advanced Process Control is enabled for the Enforce Server. To enable Advanced
Process Control, go to System > Settings > General > Configure, check the
Advanced Process Control box, and click Save.
Installing and managing detection servers 186
Server configurationbasic
To update the status, click the refresh icon in the upper-right portion of the
screen, as needed.
See About Symantec Data Loss Prevention administration on page 56.
See About the System Overview screen on page 204.
See Server Detail screen on page 208.
See Server configurationbasic on page 186.
See System events reports on page 136.
See Server event detail on page 140.
Server configurationbasic
Enforce Servers are configured from the System > Settings menu.
Detection servers are configured from each server's individual Configure Server
screen.
To configure a server
1 Go to the Overview screen (System > Servers > Overview).
2 Click on the name of the server in the list.
That server's Server Detail screen is displayed. In the upper-left portion of a
Server Detail screen are the following buttons:
Done. Click Done to return to the previous screen.
Configure. Click Configure to specify a basic configuration for this server.
Server Settings. Click Server Settings to specify advanced configuration
parameters for this server. Use caution when modifying advanced server
settings. It is recommended that you check with Symantec Support before
changing any of the advanced settings.
See Server configurationadvanced on page 200.
See Symantec Data Loss Prevention online Help for information about
advanced server configuration.
Field Description
Th Protocol section of the Packet Capture specifies the types of network traffic
(by protocol) to capture. It also specifies any custom parameters to apply. This
section lists the standard protocols that you have licensed with Symantec, and any
custom TCP protocols you have added.
To monitor a particular protocol, check its box. When you initially configure a server,
the settings for each selected protocol are inherited from the system-wide protocol
settings. You configure these settings by going to System > Settings > Protocol.
System-wide default settings are listed as Standard.
Consult Symantec Data Loss Prevention online Help for information about working
with system-wide settings.
To override the inherited filtering settings for a protocol, click the name of the
protocol. The following custom settings are available (some settings may not be
available for some protocols):
IP filter
L7 sender filter
Installing and managing detection servers 189
Server configurationbasic
L7 recipient filter
Content filter
Search Depth (packets)
Sampling rate
Maximum wait until written
Maximum wait until dropped
Maximum stream packets
Minimum stream size
Maximum stream size
Segment Interval
No traffic notification timeout (The maximum value for this setting is 360000
seconds.)
Use the SMTP Copy Rule to modify the source folder where this server retrieves
SMTP message files. You can modify the Source Folder by entering the full path
to a folder.
See About Symantec Data Loss Prevention administration on page 56.
See About the System Overview screen on page 204.
See Server Detail screen on page 208.
See Server configurationbasic on page 186.
See Server controls on page 184.
In addition to the settings available through the Configure Server screen, you can
specify advanced settings for this server. To specify advanced configuration
parameters, click Server Settings on the server's Overview screen. Use caution
when modifying advanced server settings. Check with Symantec Support before
you change any advanced setting.
See Advanced server settings on page 209.
See the Symantec Data Loss Prevention online Help for information about advanced
server settings.
server's Server Detail screen appears. Click Configure to display the Configure
Server screen.
A Network Prevent for Email Server Configure Server screen is divided into a
General section and an Inline SMTP tab. The General section specifies the server's
name, host, and port.
See Server configurationbasic on page 186.
Use the Inline SMTP tab to configure different Network Prevent for Email Server
features:
Field Description
Field Description
companyname.com
Field Description
smtp1.companyname.com
smtp2.companyname.com
smtp3.companyname.com
See the Symantec Data Loss Prevention MTA Integration Guide for Network Prevent
for Email for additional information about configuring Network Prevent for Email
Server options.
See About Symantec Data Loss Prevention administration on page 56.
See About the System Overview screen on page 204.
See Server Detail screen on page 208.
See Server configurationbasic on page 186.
See Server controls on page 184.
In addition to the settings available through the Configure Server screen, you can
specify advanced settings for this server. To specify advanced configuration
parameters, click Server Settings on the server's Overview screen. Use caution
Installing and managing detection servers 193
Server configurationbasic
when modifying advanced server settings. Check with Symantec Support before
you change any advanced setting.
See Advanced server settings on page 209.
See the Symantec Data Loss Prevention online Help for information about advanced
server settings.
Field Description
Field Description
Ignore Requests from User Agents Enter the names of user agents
whose requests should be
filtered out (ignored). Enter one
agent per line.
The Response Filtering section configures the filtering criteria to manage HTTP
responses:
Field Description
Field Description
The Connection section configures settings for the ICAP connection between
an HTTP proxy server and the Network Prevent for Web Server:
Field Description
In addition to the settings available through the Configure Server screen, you can
specify advanced settings for this server. To specify advanced configuration
parameters, click Server Settings on the server's Overview screen. Use caution
when modifying advanced server settings. Check with Symantec Support before
you change any advanced setting.
See Advanced server settings on page 209.
See the Symantec Data Loss Prevention online Help for information about advanced
server settings.
parameters, click Server Settings on the Server Detail screen. Use caution when
modifying advanced server settings. It is recommended that you check with
Symantec Support before changing any of the advanced settings.
See Advanced server settings on page 209.
Field Description
Bind address Enter the IP address on which the Endpoint Server listens for
communications from the Symantec DLP Agents. The default IP address
is 0.0.0.0 which allows the Endpoint Server to listen on all host IP
addresses.
Port Enter the port over which the Endpoint Server listens for communications
from the Symantec DLP Agents.
Note: Many Linux systems restrict ports below 1024 to root access.
The Endpoint Server cannot by configured to listen for connections
from Symantec DLP Agents to these restricted ports on Linux systems.
Installing and managing detection servers 198
Server configurationbasic
Note: If you are using FIPS 140-2 mode for communication between the Endpoint
Server and DLP Agents, do not use Diffie-Hellman (DH) cipher suites. Mixing cipher
suites prevents the agent and Endpoint Server from communicating. You can confirm
the current cipher suit setting by referring to the
EndpointCommunications.SSLCipherSuites setting on the Server Settings
page. See Advanced server settings on page 209.
Note: These steps assume that you have generated the endpoint certificates and
that the server *.jks files are available to the Enforce Server.
Table 11-3 Instructions for loading SSL certificates into an Endpoint Server
1 Go to the System > Servers > The screen is available to administrative users in the Enforce Server
Overview screen. administration console.
2 Select the Endpoint Server you Each Endpoint Server must be configured for SSL communications
want to configure. separately.
3 Click Configure. An Endpoint Server cannot communicate with DLP Agents until it is
configured with SSL certificates.
4 Select the Agent tab. The Agent tab provides the interface for passing certificates to the
Endpoint Server.
6 Click Save. If you get an error message, you need to make sure you generated the
certificates properly and added the files and passwords properly.
Installing and managing detection servers 199
Server configurationbasic
Table 11-3 Instructions for loading SSL certificates into an Endpoint Server
(continued)
7 Restart the Endpoint Server. Navigate to the System > Servers > Overview > Server Detail screen.
Click Recycle.
8 Click Done when the server has Verify that the server restarts.
restarted.
Note: The Classification Server is used only with the Symantec Enterprise Vault
Data Classification solution, which is licensed separately from Symantec Data Loss
Prevention. You must configure the Enterprise Vault Data Classification Services
filter and Classification Server to communicate with one another. See the Symantec
Enterprise Vault Data Classification Services Implementation Guide for more
information.
Server configurationadvanced
Symantec Data Loss Prevention provides advanced server configuration settings
for each detection server in your system.
Note: Check with Symantec Support before changing any advanced settings. If you
make a mistake when changing advanced settings, you can severely degrade
performance or even disable the server entirely.
Removing a server
See the appropriate Symantec Data Loss Prevention Installation Guide for
information about uninstalling Symantec Data Loss Prevention from a server.
An Enforce Server administration console lists the detection servers registered with
it on the System > Overview screen. If Symantec Data Loss Prevention is
uninstalled from a detection server, or that server is stopped or disconnected from
the network, its status is shown as Unknown on the console.
A detection server can be removed (de-registered) from an Enforce Server
administration console. When a detection server is removed from an Enforce Server,
its Symantec Data Loss Prevention services continue to operate. This means that
even though a detection server is de-registered from Enforce, it continues to function
unless some action is taken to halt it. In other words, even though it is removed
from an Enforce Server administration console, a detection server continues to
operate. Incidents it detects are stored on the detection server. If a detection server
is re-registered with an Enforce Server, incidents detected and stored are then
forwarded to Enforce.
To remove (de-register) a detection server from Enforce
1 Go to System > Overview.
See About the System Overview screen on page 204.
2 In the Servers section of the screen, click the red X on a server's status line
to remove it from this Enforce Server administration console.
See Server controls on page 184.
3 Click OK to confirm.
The server's status line is removed from the System Overview list.
Step Description
1 Copy the certificate file you want to import to the Enforce Server or Discover Server
computer.
3 Execute the keytool utility with the -importcert option to import the public key
certificate to the Enforce Server or Discover Server keystore:
4 When you are prompted, enter the password for the keystore.
By default, the password is changeit. If you want you can change the password
when prompted.
5 Answer Yes when you are asked if you trust this certificate.
For each server, the following additional information appears. You can also click
on any server name to display the Server Detail screen for that server.
Messages (Last 10 sec) The number of messages processed in the last 10 seconds
Incident Queue For the Enforce Server, this is the number of incidents that
are in the database, but do not yet have an assigned status.
This number is updated whenever this screen is generated.
Message Wait Time The amount of time it takes to process a message after it
enters the system. This data applies to the last message
processed. If the server that processed the last message is
disconnected, this is N/A.
Installing and managing detection servers 207
Recent error and warning events list
Type
The yellow triangle indicates a warning, the red circle indicates an error.
Host The IP address or name of the machine where the server resides. The
server and host names may be the same.
Code The system event code. The Message column provides the code text.
Event lists can be filtered by code number.
Message A summary of the error or warning message that is associated with this
event code.
To display a list of all error and warning events, click Show all.
To display the Event Detail screen for additional information about that particular
event, click an event.
Installing and managing detection servers 208
Server Detail screen
General The General section identifies the server, displays system status and
statistics, and provides controls for starting and stopping the server
and its processes.
All Agents The All Agents section displays a summary of all agents that are
assigned to the Endpoint Server.
Click the number next to an agent status to view agent details on the
System > Agents > Overview > Summary Reports screen.
Note: The system only displays the Agent Summary section for an
Endpoint Server.
Installing and managing detection servers 209
Advanced server settings
Recent Error and The Recent Error and Warning Events section displays the five
Warning Events most recent Warning or Severe events that have occurred on this
server.
Click on an event to show event details. Click show all to display all
error and warning events.
All Recent Events The All Recent Events section displays all events of all severities
that have occurred on this server during the past 24 hours.
Click on an event to show event details. Click show all to display all
detection server events.
Deployed Data The Deployed Data Profile section lists any Exact Data or Document
Profiles Profiles you have deployed to the detection server. The system
displays the version of the index in the profile.
BoxMonitor.InitialRestartWaitTime 5000
Installing and managing detection servers 212
Advanced server settings
BoxMonitor.MaxRestartCount 3
Default is disabled.
Default is disabled.
EndpointServer.Discover.ScanStatusBatchInterval
EndpointServer.Discover.ScanStatusBatchSize
Installing and managing detection servers 225
Advanced server settings
See
http://tools.ietf.org/html/draft-levine-mass-batv-02
for more information about BATV.
Installing and managing detection servers 233
Advanced server settings
MessageChain.ContentDumpEnabled false
Note: Contact Symantec Support before changing default advanced agent and
advanced server settings.
Description Resolution
Starting with version 12.5, Symantec Data Loss Consider how the agent idle timeout coincides with the load
Prevention uses non-persistent connections by balancer close idle connection setting. If the load balancer is
default. Using non-persitent connections means configured to close idle connections after less than 30 seconds,
that Endpoint Servers close connections to agents agents are prematurely disconnected from Endpoint Servers.
after agents are idle for 30 seconds.
To resolve the issue, complete one of the following:
Description Resolution
Consider how changes to default Symantec Data To resolve the issue, complete one of the following:
Loss Prevention settings affect how the load
Change the agent heartbeat
balancer handles idle and persistent agent
(EndpointCommunications.HEARTBEAT_INTERVAL_IN_SECONDS.int)
connections. For example, if you change the idle
and no traffic timeout settings
timeout setting to 0 to create a persistent
(CommLayer.NO_TRAFFIC_TIMEOUT_IN_SECONDS.int)
connection and you leave the default agent
to less than the load balancer idle connection setting.
heartbeat setting (270 seconds), you must consider
Verify that the no traffic timeout setting is greater than the
the idle connection setting on the load balancer. If
heartbeat setting.
the idle connection setting on the load balancer is
less than 270 seconds, then agents are prematurely
disconnected from Endpoint Servers.
provide debug log files for further analysis when you report a problem. Some
debug log files are not created by default. Symantec Support can explain how
to configure the software to create the file if necessary.
See Debug log files on page 254.
Installation log files record information about the Symantec Data Loss Prevention
installation tasks that are performed on a particular computer. You can use these
log files to verify an installation or troubleshoot installation errors. Installation
log files reside in the following locations:
installdir\SymantecDLP\.install4j\installation.log stores the
installation log for Symantec Data Loss Prevention.
installdir\oracle_home\admin\protect\ stores the installation log for
Oracle.
See the Symantec Data Loss Prevention Installation Guide for more information.
detection_operational_trace_0.log The detection trace log file provides All detection servers
details about each message that
the detection server processes. The
log file includes information such
as:
See Network and Mobile Prevent for Web operational log files and event codes
on page 269.
See Network and Mobile Prevent for Web access log files and fields on page 271.
See Network Prevent for Email log levels on page 274.
See Network Prevent for Email operational log codes on page 274.
See Network Prevent for Email originated responses and codes on page 278.
BoxMonitor0.log This file is typically very small, and it shows how the All
application processes are running. The BoxMonitor detection
process oversees the detection server processes that servers
pertain to that particular server type.
ContentExtractionAPI_FileReader.log Logs the behavior of the Content Extraction API file Detection
reader that sends requests to the plug-in host. The Server
default logging level is "info" which is configurable
using \Protect\config\log4cxx_config_filereader.xml.
FileReader0.log This log file pertains to the file reader process and All
contains application-specific logging, which may be detection
helpful in resolving issues in detection and incident servers
creation. One symptom that shows up is content
extractor timeouts.
flash_client_0.log Logs messages from the Adobe Flex client used for Enforce
folder risk reports by Network Discover. Server
IncidentPersister0.log This log file pertains to the Incident Persister process. Enforce
This process reads incidents from the incidents folder Server
on the Enforce Server, and writes them to the
database. Look at this log if the incident queue on
the Enforce Server (manager) grows too large. This
situation can be observed also by checking the
incidents folder on the Enforce Server to see if
incidents have backed up.
Indexer0.log This log file contains information when an EDM profile Enforce
or IDM profile is indexed. It also includes the Server
information that is collected when the external indexer (or
is used. If indexing fails then this log should be computer
consulted. where
the
external
indexer
is
running)
jdbc.log This log file is a trace of JDBC calls to the database. Enforce
By default, writing to this log is turned off. Server
Managing log files 257
About log files
machinelearning_native_filereader.log This log file records the runtime category classification Detection
(positive and negative) and associated confidence Server
levels for each message detected by a VML profile.
The default logging level is "info" which is configurable
using \Protect\config\log4cxx_config_filereader.xml.
machinelearning_training_0_0.log This log file records the design-time base accuracy Enforce
percentages for the k-fold evaluations for all VML Server
profiles.
machinelearning_training_native_manager.log This log file records the total number of features Enforce
modeled at design-time for each VML profile training Server
run. The default logging level is "info" which is
configurable using
\Protect\config\log4cxx_config_manager.xml.
PacketCapture.log This log file pertains to the packet capture process Network
that reassembles packets into messages and writes Monitor
to the drop_pcap directory. Look at this log if there
is a problem with dropped packets or traffic is lower
than expected. PacketCapture is not a Java
process, so it does not follow the same logging rules
as the other Symantec Data Loss Prevention system
processes.
RequestProcessor0.log This log file pertains to SMTP Prevent only. The log SMTP
file is primarily for use in cases where Prevent
SmtpPrevent0.log is not sufficient. detection
servers
Managing log files 258
About log files
ScanDetail-target-0.log Where target is the name of the scan target. All white Discover
spaces in the target's name are replaced with detection
hyphens. This log file pertains to Discover server servers
scanning. It is a file by file record of what happened
in the scan. If the scan of the file is successful, it
reads success, and then the path, size, time, owner,
and ACL information of the file scanned. If it failed,
a warning appears followed by the file name.
tomcat\localhost.date.log These Tomcat log files contain information for any Enforce
action that involves the user interface. The logs Server
include the user interface errors from red error
message box, password failures when logging on,
and Oracle errors (ORA #).
VontuNotifier.log This log file pertains to the Notifier service and its Enforce
communications with the Enforce Server and the Server
MonitorController service. Look at this file to
see if the MonitorController service registered
a policy change.
VontuUpdate.log This log file is populated when you update Symantec Enforce
Data Loss Prevention. Server
See Network and Mobile Prevent for Web protocol debug log files on page 273.
See Network Prevent for Email log levels on page 274.
Managing log files 259
Log collection and configuration screen
Make sure that the configuration file that you upload contains valid property
definitions that are applicable to the type of server you want to configure. If you
make a mistake when uploading a log configuration file, use the preconfigured
Restore Defaults setting to revert the log configuration to its original installed state.
The Enforce Server administration console performs only minimal validation of the
log configuration files that you upload. It ensures that:
Configuration file names correspond to actual logging configuration file names.
Root level logging is enabled in the configuration file. This configuration ensures
that some basic logging functionality is always available for a server.
Properties in the file that define logging levels contain only valid values (such
as INFO, FINE, or WARNING).
If the server detects a problem with any of these items, it displays an error message
and cancels the file upload.
If the Enforce Server successfully uploads a log configuration file change to a
detection server, the administration console reports that the configuration change
was submitted. If the detection server then encounters any problems when tries to
apply the configuration change, it logs a system event warning to indicate the
problem.
Incident Reporting API SOAP Logging Logs the entire SOAP request and response message for
most requests to the Incident Reporting API Web Service.
The logged messages are stored in the
webservices_soap.log file. To begin logging to this
file, edit the
c:\SymantecDLP\Protect\config\ManagerLogging.properties
file to set the
com.vontu.enforce.reportingapi.webservice.log.WebServiceSOAPLogHandler.level
property to INFO.
Table 12-3 Preconfigured log settings for the Enforce Server (continued)
Custom Attribute Lookup Logging Logs diagnostic information each time the Enforce Server
uses a lookup plug-in to populate custom attributes for an
incident. Lookup plug-ins populate custom attribute data
using LDAP, CSV files, or other data repositories. The
diagnostic information is recorded in the Tomcat log file
(c:\SymantecDLP\logs\tomcat\localhost.date.log)
and the IncidentPersister_0.log file.
Restore Defaults All detection servers Restores log file parameters to their
default values.
Discover Trace Logging Network Discover/Cloud Storage Enables informational logging for
Discover Servers Network Discover/Cloud Storage
Discover scans. These log messages
are stored in FileReader0.log.
Managing log files 262
Configuring server logging behavior
Detection Trace Logging All detection servers Logs information about each message
that the detection server processes.
This includes information such as:
Packet Capture Debug Logging Network Monitor Servers Enables basic debug logging for
packet capture with Network Monitor.
This setting logs information in the
PacketCapture.log file.
Email Prevent Logging Network Prevent for Email servers Enables full message logging for
Network Prevent for Email servers.
This setting logs the complete
message content and includes
execution and error tracing
information. Logged information is
stored in the SmtpPrevent0.log file.
Note: Trace logging can produce a
large amount of data, and the data is
stored in clear text format. Use trace
logging only when you need to debug
a specific problem.
ICAP Prevent Message Processing Network Prevent for Web servers Enables operational and access
Logging logging for Network Prevent for Web.
This setting logs information in the
FileReader0.log file.
Follow this procedure to change the log configuration for a Symantec Data Loss
Prevention server.
To configure logging properties for a server
1 Click the Configuration tab if it is not already selected.
2 If you want to configure logging properties for a detection server, select the
server name from the Select a Detection Server menu.
Managing log files 264
Collecting server logs and configuration files
Note: The following debug log files are configured manually outside of the logging
framework available through the Enforce Server administration console:
ContentExtractionAPI_FileReader.log, ContentExtractionAPI_Manager.log,
ContentExtractionHost_FileReader.log, ContentExtractionHost_Manager.log,
machinelearning_native_filereader.log, and
machinelearning_training_native_manager.log. Refer to the entry for each of
these log files in debug log file list for configuration details. See Debug log files
on page 254.
Checkboxes on the Collection tab enable you to collect different types of files from
the selected servers. Table 12-5 describes each type of file.
Operational Logs Operational log files record detailed information about the
tasks the software performs and any errors that occur while
the software performs those tasks. You can use the
contents of operational log files to verify that the software
functions as you expect it to. You can also use these files
to troubleshoot any problems in the way the software
integrates with other components of your system.
Debug and Trace Logs Debug log files record fine-grained technical details about
the individual processes or software components that
comprise Symantec Data Loss Prevention. The contents
of debug log files are not intended for use in diagnosing
system configuration errors or in verifying expected
software functionality. You do not need to examine debug
log files to administer or maintain an Symantec Data Loss
Prevention installation. However, Symantec Support may
ask you to provide debug log files for further analysis when
you report a problem. Some debug log files are not created
by default. Symantec Support can explain how to configure
the software to create the file if necessary.
Managing log files 266
Collecting server logs and configuration files
Configuration Files Use the Configuration Files option to retrieve both logging
configuration files and server feature configuration files.
Agent Logs Use the Agent Logs option to collect DLP agent service
and operational log files from an Endpoint Prevent
detection server. This option is available only for Endpoint
Prevent servers. To collect agent logs using this option,
you must have already pulled the log files from individual
agents to the Endpoint Prevent detection server using a
Pull Logs action.
When the logs are pulled from the endpoint, they are stored
on the Endpoint Server in an unencrypted format. After
you collect the logs from the Endpoint Server, the logs are
deleted from the Endpoint Server and are stored only on
the Enforce Server. You can only collect logs from one
endpoint at a time.
Note: You can run only one log collection process at a time.
6 To cancel an active log collection process, click Cancel next to the log collection
entry. You may need to cancel log collection if one or more servers are offline
and the collection process cannot complete. When you cancel the log collection,
the ZIP file contains only those files that were successfully collected.
7 To download collected logs to your local computer, click Download next to the
log collection entry.
8 To remove ZIP files stored on the Enforce Server, click Delete next to a log
collection entry.
See Log collection and configuration screen on page 259.
See About log files on page 250.
describe the specific task that the software was trying to perform when the message
was recorded. Log messages are generally formatted as:
See Network and Mobile Prevent for Web operational log files and event codes
on page 269.
See Network Prevent for Email operational log codes on page 274.
See Network Prevent for Email originated responses and codes on page 278.
Network and Mobile Prevent for Web operational log files and event
codes
Network and Mobile Prevent for Web log file names use the format of
WebPrevent_OperationalX.log (where X is a number). The number of files that
are stored and their sizes can be specified by changing the values in the
FileReaderLogging.properties file. This file is in the
SymantecDLP\Protect\config directory. By default, the values are:
com.vontu.icap.log.IcapOperationalLogHandler.limit = 5000000
com.vontu.icap.log.IcapOperationalLogHandler.count = 5
Table 12-6 lists the Network and Mobile Prevent for Web-defined operational logging
codes by category. The italicized part of the text contains event parameters.
Table 12-6 Status codes for Network and Mobile Prevent for Web operational
logs
Operational Events
Connectivity Events
Managing log files 270
About log event codes
Table 12-6 Status codes for Network and Mobile Prevent for Web operational
logs (continued)
Where:
icap_bind_address is the Network and Mobile Prevent for Web bind address to
which the server listens. This address is specified with the Icap.BindAddress
Advanced Setting.
icap_bind_port is the port at which the server listens. This port is set in the
Server > Configure page.
Where:
Where:
Where N indicates the number of connections in each state, when the message
was logged.
Connectivity Errors
Managing log files 271
About log event codes
Table 12-6 Status codes for Network and Mobile Prevent for Web operational
logs (continued)
Where:
icap_bind_address is the Network and Mobile Prevent for Web bind address to
which the server listens. This address can be specified with the Icap.BindAddress
Advanced Setting.
icap_bind_port is the port at which the server listens. This port is set on the
Server > Configure page.
Where host_ip and port are the proxy system IP and port address from which a
connect attempt to Network and Mobile Prevent for Web was performed. If the host
is not listed in the Icap.AllowHosts Advanced setting, it is unable to form a
connection.
Network and Mobile Prevent for Web access log files and fields
Network and Mobile Prevent for Web log file names use the format of
WebPrevent_AccessX.log (where X is a number). The number of files that are
stored and their sizes can be specified by changing the values in the
FileReaderLogging.properties file. By default, the values are:
com.vontu.icap.log.IcapAccessLogHandler.limit = 5000000
com.vontu.icap.log.IcapAccessLogHandler.count = 5
A Network and Mobile Prevent for Web access log is similar to a proxy servers
web access log. The start log message format is:
Table 12-7 lists the fields. The values of fields that are enclosed in quotes in this
example are quoted in an actual message. If field values cannot be determined,
the message displays - or "" as a default value.
Table 12-7 Network and Mobile Prevent for Web access log fields
Fields Explanation
time_stamp Time that Network and Mobile Prevent receives the request.
icap_status_code ICAP response code that Network and Mobile Prevent sends by
for this request.
referrer Header value from the request that contains the URI from which
this request came.
action_code An integer representing the action that Network and Mobile Prevent
for Web takes. Where the action code is one of the following:
0 = UNKNOWN
1 = ALLOW
2 = BLOCK
3 = REDACT
4 = ERROR
5 = ALLOW_WITHOUT_INSPECTION
6 = OPTIONS_RESPONSE
7 = REDIRECT
Managing log files 273
About log event codes
Table 12-7 Network and Mobile Prevent for Web access log fields (continued)
Fields Explanation
-1 = ILLEGAL
0 = OPTIONS
1 = REQMOD
2 = RESPMOD
3 = LOG
traffic_source_code An integer that represents the source of the network traffic. Where
the traffic source code is one of the following:
0 = MOBILE
1 = WEB
2 = UNKNOWN
Network and Mobile Prevent for Web protocol debug log files
To enable ICAP trace logging, set the Icap.EnableTrace Advanced setting to true
and use the Icap.TraceFolder Advanced setting to specify a directory to receive
the traces. Symantec Data Loss Prevention service must be restarted for this change
to take effect.
Trace files that are placed in the specified directory have file names in the format:
timestamp-conn_id. The first line of a trace file provides information about the
connecting host IP and port along with a timestamp. File data that is read from the
socket is displayed in the format <<timestamp number_of_bytes_read. Data that
is written to the socket is displayed in the format >>timestamp
number_of_bytes_written. The last line should note that the connection has been
closed.
Note: Trace logging produces a large amount of data and therefore requires a large
amount of free disk storage space. Trace logging should be used only for debugging
an issue because the data that is written in the file is in clear text.
Level Guidelines
INFO General events: connect and disconnect notices, information on the messages
that are processed per connection.
FINEST Complete message content, deepest execution tracing, and error tracing.
Table 12-9 Status codes for Network Prevent for Email operational log
Code Description
Core Events
Table 12-9 Status codes for Network Prevent for Email operational log
(continued)
Code Description
Core Errors
Connectivity Events
Table 12-9 Status codes for Network Prevent for Email operational log
(continued)
Code Description
Connectivity Errors
Table 12-9 Status codes for Network Prevent for Email operational log
(continued)
Code Description
Message Events
Where:
Recipient_count is the total number of addressees in the To, CC, and BCC
fields.
Response is the Network Prevent for Email response which can be one of:
PASS, BLOCK, BLOCK_AND_REDIRECT, REDIRECT, MODIFY, or ERROR.
Thee status is an Enhanced Status code.
See Network Prevent for Email originated responses and codes on page 278.
The rtime is the time in seconds for Network Prevent for Emailto fully receive
the message from the sending MTA.
The dtime is the time in seconds for Network Prevent for Email to perform
detection on the message.
The mtime is the total time in seconds for Network Prevent for Email to process
the message Message Errors.
Message Errors
Managing log files 278
About log event codes
Table 12-9 Status codes for Network Prevent for Email operational log
(continued)
Code Description
250 2.0.0 Ok: Carry on. Success code that Network Prevent for Email uses.
221 2.0.0 Service The normal connection termination code that Network
closing. Prevent for Email generates if a QUIT request is
received when no forward MTA connection is active.
Managing log files 279
About log event codes
451 4.3.0 Error: This general, transient error response is issued when
Processing a (potentially) recoverable error condition arises. This
error. error response is issued when a more specific error
response is not available. Forward connections are
sometimes closed, and their unexpected termination
is occasionally a cause of a code 451, status 4.3.0.
However sending connections should remain open
when such a condition arises unless the sending MTA
chooses to terminate.
421 4.3.0 Fatal: This general, terminal error response is issued when
Processing a fatal, unrecoverable error condition arises. This error
error. results in the immediate termination of any sender or
Closing receiver connections.
connection.
421 4.4.1 Fatal: That an attempt to connect the forward MTA was
Forwarding refused or otherwise failed to establish properly.
agent
unavailable.
451 4.4.2 Error: The forward MTA connection was lost in a state that
Connection may be recoverable if the connection can be
lost to re-established. The sending MTA connection is
forwarding maintained unless it chooses to terminate.
agent.
421 4.4.7 Error: The last command issued did not receive a response
Request within the time window that is defined in the
timeout RequestProcessor.DefaultCommandTimeout. (The
exceeded. time window may be from
RequestProcessor.DotCommandTimeout if the
command issued was the .). The connection is closed
immediately.
Managing log files 280
About log event codes
421 4.4.7 Error: The connection was idle (no commands actively
Connection awaiting response) in excess of the time window that
timeout is defined in
exceeded. RequestProcessor.DefaultCommandTimeout.
501 5.5.2 Fatal: A fatal violation of the SMTP protocol (or the constraints
Invalid that are placed on it) occurred. The violation is not
transmission expected to change on a resubmitted message attempt.
request. This message is only issued in response to a single
command or data line that exceeds the boundaries
that are defined in RequestProcessor.MaxLineLength.
550 5.7.1 User This combination of code and status indicates that a
Supplied. Blocking response rule has been engaged. The text
that is returned is supplied as part of the response rule
definition.
Note that a 4xx code and a 4.x.x enhanced status indicate a temporary error. In
such cases the MTA can resubmit the message to the Network Prevent for Email
Server. A 5xx code and a 5.x.x enhanced status indicate a permanent error. In such
cases the MTA should treat the message as undeliverable.
See About log files on page 250.
Chapter 13
Using Symantec Data Loss
Prevention utilities
This chapter includes the following topics:
About DBPasswordChanger
Name Description
Name Description
This utility is often used with the SQL Preindexer. The SQL
Preindexer can run an SQL query and pass the resulting
data directly to the Remote EDM Indexer to create an EDM
index.
See About the Remote EDM Indexer on page 435.
Name Description
About DBPasswordChanger
Symantec Data Loss Prevention stores encrypted passwords to the Oracle database
in a file that is called DatabasePassword.properties, located in
c:\SymantecDLP\Protect\config (Windows)
or/opt/SymantecDLP/Protect/config (Linux). Because the contents of the file
are encrypted, you cannot directly modify the file. The DBPasswordChanger utility
changes the stored Oracle database passwords that the Enforce Server uses.
Before you can use DBPasswordChanger to change the password to the Oracle
database you must:
Shut down the Enforce Server.
Using Symantec Data Loss Prevention utilities 284
About DBPasswordChanger
DBPasswordChanger syntax
The DBPasswordChanger utility uses the following syntax:
All command-line parameters are required. The following table describes each
command-line parameter.
See Example of using DBPasswordChanger on page 284.
Parameter Description
DBPasswordChanger \Vontu\Protect\bin\DatabasePassword.properties
protect_oracle
Policy components
Policy templates
Solution packs
Policy groups
Policy deployment
Policy severity
Data Profiles
User Groups
Feature Description
Intuitive policy The policy builder interface supports Boolean logic for detection configuration.
building
You can combine different detection methods and technologies in a single policy.
Decoupled The system stores response rules and policies as separate entities.
response rules
You can manage and update response rules without having to change policies; you can reuse
response rules across policies.
Fine-grained policy The system provides severity levels for policy violations.
reporting
You can report the overall severity of a policy violation by the highest severity.
Centralized data The system stores data and group profiles separate from policies.
and group profiling
This separation enables you to manage and update profiles without changing policies.
Policy sharing The system supports policy template import and export.
Role-based access The system provides role-based access control for various user and administrative functions.
control
You can create roles for policy authoring, policy administration, and response rule authoring.
Policy components
A valid policy has at least one detection or group rule with at least one match
condition. Response rules are optional policy components.
Policy components describes Data Loss Prevention policy components.
Policy name Required The policy name must be unique within the Policy Group
Policy rule Required A valid policy must contain at least one rule that declares at least one
match condition.
Data Profile May be A policy requires a Data Profile if a detection method in the policy requires
required it.
User group May be A policy requires a User Group only if a group method in the policy
required requires it.
Policy description Optional A policy description helps users identify the purpose of the policy.
Policy label Optional A policy label helps Symantec Data Insight business users identify the
purpose of the policy when using the Self-Service Portal.
Response Rule Optional A policy can implement one or more response rules to report and
remediate incidents.
Policy exception Optional A policy can contain one or more exceptions to exclude data from
matching.
Compound match Optional A policy rule or exception can implement multiple match conditions.
conditions
See Compound conditions on page 312.
Policy templates
Symantec Data Loss Prevention provides policy templates to help you quickly
deploy detection policies in your enterprise. You can share policies across systems
and environments by importing and exporting policy rules and exceptions as
templates.
Using policy templates saves you time and helps you avoid errors and information
gaps in your policies because the detection methods are predefined. You can edit
a template to create a policy that precisely suits your needs. You can also export
and import your own policy templates.
Some policy templates are based on well-known sets of regulations, such as the
Payment Card Industry Security Standard, Gramm-Leach-Bliley, California SB1386,
and HIPAA. Other policy templates are more generic, such as Customer Data
Protection, Employee Data Protection, and Encrypted Data. Although the
regulation-based templates can help address the requirements of the relevant
regulations, consult with your legal counsel to verify compliance.
See Creating a policy from a template on page 316.
Table 14-3 describes the system-defined policy templates provided by Symantec
Data Loss Prevention.
UK and International Regulatory See UK and International Regulatory Enforcement policy templates
Enforcement on page 321.
Customer and Employee Data Protection See Customer and Employee Data Protection policy templates
on page 321.
Introduction to policies 291
Solution packs
Confidential or Classified Data Protection See Confidential or Classified Data Protection policy templates
on page 323.
Network Security Enforcement See Network Security Enforcement policy templates on page 324.
Acceptable Use Enforcement See Acceptable Use Enforcement policy templates on page 324.
Classification for Enterprise Vault See the Enterprise Vault Data Classification Services Implementation
Guide.
Solution packs
Symantec Data Loss Prevention provides solution packs for several industry
verticals. A solution pack contains configured policies, response rules, user roles,
reports, protocols, and the incident statuses that support a particular industry or
organization. For a list of available solution packs and instructions, refer to chapter
4, "Importing a solution pack" in the Symantec Data Loss Prevention Installation
Guide. You can import one solution pack to the Enforce Server.
Once you have imported the solution pack, start by reviewing its policies. By default
the solution pack activates the policies it provides.
See Manage and add policies on page 349.
Policy groups
You deploy policies to detection servers using policy groups. Policy groups limit
the policies, incidents, and detection mechanisms that are accessible to specific
users.
Each policy belongs to one policy group. When you configure a policy, you assign
it to a policy group. You can change the policy group assignment, but you cannot
assign a policy to more than one policy group. You deploy policy groups to one or
more detection servers.
The Enforce Server is configured with a single policy group called the Default
Policy Group. The system deploys the default policy group to all detection servers.
If you define a new policy, the system assigns the policy to the default policy group,
unless you create and specify a different policy group. You can change the name
Introduction to policies 292
Policy deployment
of the default policy group. A solution pack creates several policy groups and assigns
policies to them.
After you create a policy group, you can link policies, Discover targets, and roles
to the policy group. When you create a Discover target, you must associate it with
a single policy group. When you associate a role with particular policy groups, you
can restrict users in that role. Policies in that policy group detect incidents and report
them to users in the role that is assigned to that policy group.
The relationship between policy groups and detection servers depends on the
server type. You can deploy a policy group to one or more Network Monitor, Mobile
Email Monitor, Network Prevent, Mobile Prevent, or Endpoint Servers. Policy groups
that you deploy to an Endpoint Server apply to any DLP Agent that is registered
with that server. The Enforce Server automatically associates all policy groups with
all Network Discover Servers.
For Network Monitor and Network Prevent, each policy group is assigned to one
or more Network Monitor Servers, Email Prevent Servers, or Web Prevent Servers.
For Mobile Prevent, each policy group is assigned to one or more Mobile Prevent
for Web Servers. For Network Discover, policy groups are assigned to individual
Discover targets. A single detection server may handle as many policy groups as
necessary to scan its targets. For Endpoint Monitor, policy groups are assigned to
the Endpoint Server and apply to all registered DLP Agents.
See Manage and add policy groups on page 351.
See Creating and modifying policy groups on page 352.
Policy deployment
You can use policy groups to organize and deploy your policies in different ways.
For example, consider a situation in which your detection servers are set up across
a system that spans several countries. You can use policy groups to ensure that a
detection server runs only the policies that are valid for a specific location.
You can dedicate some of your detection servers to monitor internal network traffic
and dedicate others to monitor network exit points. You can use policy groups to
deploy less restrictive policies to servers that monitor internal traffic. At the same
time, you can deploy stricter policies to servers that monitor traffic leaving your
network.
You can use policy groups to organize policies and incidents by business units,
departments, geographic regions, or any other organizational unit. For example,
policy groups for specific departments may be appropriate where security
responsibilities are distributed among various groups. In such cases, policy groups
provide for role-based access control over the viewing and editing of incidents. You
Introduction to policies 293
Policy severity
deploy policy groups according to the required division of access rights within your
organization (for example, by business unit).
You can use policy groups for detection-server allocation, which may be more
common where security departments are centralized. In these cases, you would
carefully choose the detection server allocation for each role and reflect the server
name in the policy group name. For example, you might name the groups Inbound
and Outbound, United States and International, or Testing and Production.
In more complex environments, you might consider some combination of the
following policy groups for deploying policies:
Sales and Marketing - US
Sales and Marketing - Europe
Sales and Marketing - Asia
Sales and Marketing - Australia, New Zealand
Human Resources - US
Human Resources - International
Research and Development
Customer service
Lastly, you can use policy groups to test policies before deploying them in production,
to manage legacy policies, and to import and export policy templates.
See Policy groups on page 291.
See About role-based access control on page 85.
Policy severity
When you configure a detection rule, you can select a policy severity level. You
can then use response rules to take action based on a severity level. For example,
you can configure a response rule to take action after a specified number of "High"
severity violations.
See About response rule conditions on page 861.
The default severity level is set to "High," unless you change it. The default severity
level applies to any condition that the detection rule matches. For example, if the
default severity level is set to "High," every detection rule violation is labeled with
this severity level. If you do not want to tag every violation with a specific severity,
you can define the criteria by which a severity level is established. In this case the
default behavior is overridden. For example, you can define the "High" severity
level to be applied only after a specified number of condition matches have occurred.
Introduction to policies 294
Policy authoring privileges
Author Response Add, configure, and manage response rules (but do not add them to policies).
Rules
See About response rule authoring privileges on page 864.
Data Profiles
Data Profiles are user-defined configurations that you create to implement Exact
Data Matching (EDM), Indexed Document Matching (IDM), and Vector Machine
Learning (VML) policy conditions.
See Data Loss Prevention policy detection technologies on page 302.
Table 14-6 describes the types of Data Profiles that the system supports.
Exact Data Profile An Exact Data Profile is used for Exact Data Matching (EDM) policies. The Exact Data Profile
contains data that has been indexed from a structured data source, such as a database,
directory server, or CSV file. The Exact Data Profile runs on the detection server. If an EDM
policy is deployed to an endpoint, the DLP Agent sends the message to the detection server
for evaluation (two-tier detection).
See About the Exact Data Profile and index on page 375.
See About two-tier detection for EDM on the endpoint on page 380.
Indexed Document An Indexed Document Profile is used for Indexed Document Matching (IDM) policies. The
Profile Indexed Document Profile contains data that has been indexed from a collection of confidential
documents. The Indexed Document Profile runs on the detection server. If an IDM policy is
deployed to an endpoint, the DLP Agent sends the message to the detection server for
evaluation (two-tier detection).
Vector Machine A Vector Machine Learning Profile is used for Vector Machine Learning (VML) policies. The
Learning Profile Vector Machine Learning Profile contains a statistical model of the features (keywords)
extracted from content that you want to protect. The VML profile is loaded into memory by
the detection server and DLP Agent. VML does not require two-tier detection.
User Groups
You define User Groups on the Enforce Server. User Groups contain user identity
information that you populate by synchronizing the Enforce Server with a group
directory server (Microsoft Active Directory).
You must have at least policy authoring or server administrator privileges to define
User Groups. You must define the User Groups before you synchronize users.
Once you define a User Group, you populate it with users, groups, and business
units from your directory server. After the user group is populated, you associate
it with the User/Sender and Recipient detection rules or exceptions. The policy only
applies to members of that User Group
See Introducing synchronized Directory Group Matching (DGM) on page 668.
See Configuring directory server connections on page 128.
See Configuring User Groups on page 669.
A policy template is an XML file. The template contains the policy metadata, and
the detection and the group rules and exceptions. If a policy template contains more
than one condition that requires a Data Profile, the system imports only one of these
conditions. A policy template does not include policy response rules, or modified
or custom data identifiers.
Table 14-7 describes policy template components.
Policy metadata (name, The name of the template has to be less than 60 characters or YES
description, label) it does not appear in the Imported Templates list.
Described Content Matching If the template contains only DCM methods, it imports as YES
(DCM) rules and exceptions exported without changes.
Exact Data Matching (EDM) If the template contains multiple EDM or IDM match conditions, YES
and Indexed Document only one is exported.
Matching (IDM) conditions
If the template contains an EDM and an IDM condition, the
system drops the IDM.
User Group User group methods are maintained on import only if the user NO
groups exist on the target before import.
Policy Group Policy groups do not export. On import you can select a local NO
policy group, otherwise the system assigns the policy to the
Default Policy group.
Response Rules You must define and add response rules to policies from the NO
local Enforce Server instance.
Data Profiles On import you must reference a locally defined Data Profile, NO
otherwise the system drops any methods that require a Data
Profile.
Custom data identifiers Modified and custom data identifiers do not export. NO
Action Description
Familiarize yourself with the different types of detection See Detecting data loss on page 300.
technologies and methods that Symantec Data Loss
See Data Loss Prevention policy detection technologies
Prevention provides, and considerations for authoring
on page 302.
data loss prevention policies.
See Policy matching conditions on page 304.
Develop a policy detection strategy that defines the type See Develop a policy strategy that supports your data
of data you want to protect from data loss. security objectives on page 363.
Review the policy templates that ship with Symantec See Policy templates on page 290.
Data Loss Prevention, and any templates that you import
See Solution packs on page 291.
manually or by solution pack.
Create policy groups to control how your policies are See Policy groups on page 291.
accessed, edited, and deployed.
See Policy deployment on page 292.
To detect exact data or content or similar unstructured See Data Profiles on page 295.
data, create one or more Data Profiles.
To detect exact identities from a synchronized directory See User Groups on page 296.
server (Active Directory), configure one or more User
Groups.
Configure conditions for detection and group rules and See Creating a policy from a template on page 316.
exceptions.
Test and tune your policies. See Test and tune policies to improve match accuracy
on page 365.
Add response rules to the policy to take action when See About response rules on page 854.
the policy is violated.
Manage the policies in your enterprise. See Manage and add policies on page 349.
Introduction to policies 299
Viewing, printing, and downloading policy details
Action Description
View and print details for a single policy. See Viewing and printing policy details
on page 356.
Download details for all policies. See Downloading policy details on page 357.
Chapter 15
Overview of policy detection
This chapter includes the following topics:
Exception conditions
Compound conditions
precise detection results. In addition, Symantec Data Loss Prevention provides you
with several ways to extend policy detection and match any type of data, content,
or files you want.
See About Data Loss Prevention policies on page 287.
See Best practices for authoring policies on page 361.
Table 15-1 lists the various types of the detection technologies and customizations
provided by Data Loss Prevention.
Technology Description
Exact Data Matching (EDM) Use EDM to detect personally identifiable information.
Indexed Document Matching Use IDM to detect exact files and file contents, and derivative content.
(IDM)
See Introducing Indexed Document Matching (IDM) on page 464.
Directory Group Matching Use DGM to detect exact identities synchronized from a directory server or profiled
(DGM) from a database.
Described Content Matching Use DCM to detect message content and context, including:
(DCM)
Data Identifiers to match content using precise patterns and data validators.
See Introducing data identifiers on page 556.
Keywords to detect content using key words, key phrases, and keyword dictionaries.
See Introducing keyword matching on page 599.
Regular Expressions to detect characters, patterns, and strings.
See Introducing regular expression matching on page 613.
File properties to detect files by type, name, size, and custom type.
See Introducing file property detection on page 624.
User, sender, and recipient patterns to detect described identities.
See Introducing described identity matching on page 658.
Protocol signatures to detect network and mobile traffic.
See Introducing protocol monitoring for network on page 641.
See Introducing protocol monitoring for mobile on page 642.
Destinations, devices, and protocols to detect endpoint events.
See Introducing endpoint event detection on page 647.
Overview of policy detection 304
Policy matching conditions
Technology Description
Custom policy detection Data Loss Prevention provides methods for customizing and extending detection,
methods including:
Protocol See Protocol matching condition for network and mobile on page 307.
See Configuring the Content Matches Regular Expression condition on page 615.
Content Matches Keyword Match described content using keywords, key phrases, and keyword dictionaries
Content Matches Data Match described content using Data Identifier patterns and validators.
Identifier
See Introducing data identifiers on page 556.
See Configuring the Content Matches data identifier condition on page 567.
Table 15-4 lists the content matching conditions that require a Data Profile and
index.
Overview of policy detection 306
Policy matching conditions
Content Matches Exact Data Match exact data profiled from a structured data source such as a database or CSV
From an Exact Data Profile file.
(EDM)
See Introducing Exact Data Matching (EDM) on page 371.
See Configuring the Content Matches Exact Data policy condition on page 399.
Note: This condition requires two-tier detection on the endpoint. See About two-tier
detection for EDM on the endpoint on page 380.
Content Matches Document Match files and file contents exactly or partially using fingerprinting
Signature From an Indexed
See Introducing Indexed Document Matching (IDM) on page 464.
Document Profile (IDM)
See Configuring the Content Matches Document Signature policy condition
on page 499.
Note: This condition requires two-tier detection on the endpoint. See About the
Indexed Document Profile on page 467.
Detect using Vector Machine Match file contents with features similar to example content you have trained.
Learning profile (VML)
See Introducing Vector Machine Learning (VML) on page 524.
See Configuring the Detect using Vector Machine Learning Profile condition
on page 540.
Message Attachment or File Match specific file formats and document attachments.
Type Match
See About file type matching on page 624.
See Configuring the Message Attachment or File Type Match condition on page 627.
Overview of policy detection 307
Policy matching conditions
Message Attachment or File Match files or attachments over or under a specified size.
Size Match
See About file size matching on page 626.
See Configuring the Message Attachment or File Size Match condition on page 628.
Message Attachment or File Match files or attachments that have a specific name or match wildcards.
Name Match
See About file name matching on page 626.
Message/Email Properties and Classify Microsoft Exchange email messages based on specific message attributes
Attributes (MAPI attributes).
See Configuring the Message/Email Properties and Attributes condition on page 638.
Note: This condition is available for use with Data Classification for Enterprise Vault.
See the Enterprise Vault Data Classification Services Implementation Guide.
Custom File Type Signature Match custom file types based on their binary signature using scripting.
See Enabling the Custom File Type Signature condition in the policy console
on page 631.
Table 15-6 Protocol matching condition for network and mobile monitoring
Protocol Monitoring Match incidents on the network transmitted using a specified protocol, including
SMTP, FTP, HTTP/S, IM, and NNTP.
See Configuring the Protocol Monitoring condition for network detection on page 643.
Match incidents sent to and from mobile devices over the HTTP/S and FTP protocols.
See Configuring the Protocol Monitoring condition for mobile detection on page 644.
Overview of policy detection 308
Policy matching conditions
Condition Description
Protocol or Endpoint Match endpoint messages transmitted using a specified transport protocol or when
Monitoring data is moved or copied to a particular destination.
Endpoint Device Class or ID Match endpoint events occurring on specified hardware devices.
Endpoint Location Match endpoint events depending if the DLP Agent is on or off the corporate network.
Sender/User Matches Pattern Match message senders and users by email address, user ID, IM screen name,
and IP address.
Recipient Matches Pattern Match message recipients by email or IP address, or Web domain.
See Introducing described identity matching on page 658.
Sender/User based on a Match message senders and users from a synchronized directory server.
Directory Server Group
See Introducing synchronized Directory Group Matching (DGM) on page 668.
Sender/User based on a Match message senders and users from a profiled directory server.
Directory from: an Exact Data
See Introducing profiled Directory Group Matching (DGM) on page 676.
Profile
See Configuring the Sender/User based on a Profiled Directory condition
on page 678.
Note: This condition requires two-tier detection on the endpoint. See About two-tier
detection for profiled DGM on page 676.
Recipient based on a Directory Match message recipients from a synchronized directory server.
Server Group
See Introducing synchronized Directory Group Matching (DGM) on page 668.
Recipient based on a Directory Match message recipients from a profiled directory server.
from: an Exact Data Profile
See Configuring Exact Data profiles for DGM on page 677.
See Configuring the Recipient based on a Profiled Directory condition on page 679.
Note: This condition requires two-tier detection on the endpoint. See About two-tier
detection for profiled DGM on page 676.
Exception conditions
Symantec Data Loss Prevention provides policy exceptions to exclude messages
and message components from matching. You can use exception conditions to
refine the scope of your detection and group rules.
See Use a limited number of exceptions to narrow detection scope on page 367.
Warning: Do not use multiple compound exceptions in a single policy. Doing so can
cause detection to run out of memory. If you find that the policy needs multiple
compound exceptions to produce matches, you should reconsider the design of
the matching conditions.
Note: Symantec Data Loss Prevention does not support match-level exceptions,
only component or message-level exceptions.
For example, consider a policy that has a detection rule with one condition and an
exception with one condition. The rule matches messages containing Microsoft
Word attachments and generates an incident for each match. The exception
excludes from matching messages from [email protected]. An email from
[email protected] that contains a Word attachment is excepted from matching and
does not trigger an incident. The detection exception condition excluding
[email protected] messages takes precedence over the detection rule match
condition that would otherwise match on the message.
Overview of policy detection 312
Compound conditions
Compound conditions
A valid policy must declare at least one rule that defines at least one match condition.
The condition matches input data to detect data loss. A rule with a single condition
is a simple rule. Optionally, you can declare multiple conditions within a single
detection or group rule. A rule with multiple conditions is a compound condition.
For compound conditions, each condition in the rule must match to trigger a violation.
Thus, for a single policy that declares one rule with two conditions, if one condition
matches but the other does not, detection does not report a match. If both conditions
match, detection reports a match, assuming that the rule is set to count all matches.
In programmatic terms, two or more conditions in the same rule are ANDed together.
Like rules, you can declare multiple conditions within a single exception. In this
case, all conditions in the exception must match for the exception to apply.
See Policy detection execution on page 312.
See Use compound conditions to improve match accuracy on page 367.
See Exception conditions on page 311.
example, 2 detection rules). But, if you combine rules of different type in a single
policy (for example, 1 detection rule and 1 group rule), the connection between the
rules is AND. In this configuration both rules must match to trigger an incident.
However, exception conditions created across the "Detection" and "Groups" tabs
are connected by an implicit OR.
See Compound conditions on page 312.
See Exception conditions on page 311.
Table 15-10 summarizes the policy condition execution logic for the detection server
for various policy configurations.
Compound conditions AND If a single rule or exception in a policy contains two or more
match conditions, all conditions must match.
Rules or exceptions of same OR If there are two detection rules in a single policy, or two group
type rules in a single policy, or two exceptions of the same type
(detection or group), the rules or exceptions are independent
of each other.
Rules of different type AND If one or more detection rules is combined with one or more
group rules in a single policy, the rules are dependent.
Exceptions of different type OR If one or more detection exceptions is combined with one or
more group exceptions in a single policy, the exceptions are
independent.
the condition requiring two-tier detection is not evaluated until the DLP Agent
connects. This delay can impact performance of the DLP Agent if the message is
a large file or attachment.
See Troubleshooting policies on page 357.
Two-tier detection has implications for the kinds of policies you author for endpoints.
You can reduce the potential bottleneck of two-tier detection by being aware of the
detection conditions that require two-tier detection and author your endpoint policies
in such a way to eliminate or reduce the need for two-tier detection.
See Author policies to limit the potential effect of two-tier detection on page 368.
Table 15-11 lists the detection conditions that require two-tier detection on the
endpoint.
Note: You cannot combine an Endpoint Prevent: Notify or Block response rule with
two-tier match conditions, including Exact Data Matching (EDM), Directory Group
Matching (DGM), and Indexed Document Matching (IDM) when two-tier detection
is enabled. If you do, the system displays a warning for both the detection condition
and the response rule.
Exact Data Matching (EDM) Content Matches Exact Data from See Introducing Exact Data Matching
an Exact Data Profile (EDM) on page 371.
Profiled Directory Group Matching Sender/User based on a Directory See Introducing profiled Directory
(DGM) from an Exact Data Profile Group Matching (DGM) on page 676.
Indexed Document Matching (IDM) Content Matches Document See Introducing Indexed Document
Signature from an Indexed Document Matching (IDM) on page 464.
Profile
See Two-tier IDM detection
on page 467.
Note: Two-tier detection for IDM only
applies if it is enabled on the Endpoint
Server (two_tier_idm = on). If Endpoint
IDM is enabled (two_tier_idm = off),
two-tier detection is not used.
Chapter 16
Creating policies from
templates
This chapter includes the following topics:
Action Description
Add a policy from a template. See Adding a new policy or policy template on page 329.
Choose the template you want to At the Manage > Policies > Policy List > New Policy - Template List screen the
use. system lists all policy templates.
System-provided template categories:
Note: See the Enterprise Vault Data Classification Services Implementation Guide
for information about Classification policy templates.
Click Next to configure the policy. For example, select the Webmail policy template and click Next.
Choose a Data Profile (if If the template relies on one or more Data Profiles, the system prompts you to
prompted). select each:
Cancel the policy definition process, define the profile, and resume creating the
policy from the template.
Click Next to configure the policy.
On creation of the policy, the system drops any rules or exceptions that rely on
the Data Profile.
Action Description
Edit the policy name or If you intend to modify a system-defined template, you may want to change the
description (optional). name so you can distinguish it from the original.
Note: The Policy Label field is reserved for the Symantec Data Insight Self-Service
Portal.
Select a policy group (if If you have defined a policy group, select it from the Policy Group list.
necessary).
See Creating and modifying policy groups on page 352.
If you have not defined a policy group, the system deploys the policy to the Default
Policy Group.
Edit the policy rules or exceptions The Configure Policy screen displays the rules and exceptions (if any) provided
(if necessary). by the policy.
You can modify, add, and remove policy rules and exceptions to meet your
requirements.
Save the policy and export it Click Save to save the policy.
(optional).
You can export policy detection as a template for sharing or archiving.
Test and tune the policy Test and tune the policy using data the policy should and should not detect.
(recommended).
Review the incidents that the policy generates. Refine the policy rules and
exceptions as necessary to reduce false positives and false negatives.
Add response rules (optional). Add response rules to the policy to report and remediate violations.
Export Administration Regulations (EAR) Enforces the U.S. Department of Commerce Export Administration
Regulations (EAR).
FACTA 2003 (Red Flag Rules) Enforces sections 114 and 315 (or Red Flag Rules) of the Fair
and Accurate Credit Transactions Act (FACTA) of 2003.
See FACTA 2003 (Red Flag Rules) policy template on page 797.
HIPAA and HITECH (including PHI) This policy enforces the US Health Insurance Portability and
Accountability Act (HIPAA).
International Traffic in Arms Regulations (ITAR) This policy enforces the US Department of State ITAR provisions.
NASD Rule 2711 and NYSE Rules 351 and 472 This policy protects the name(s) of any companies that are involved
in an upcoming stock offering.
See NASD Rule 2711 and NYSE Rules 351 and 472 policy
template on page 814.
Creating policies from templates 320
US Regulatory Enforcement policy templates
NASD Rule 3010 and NYSE Rule 342 This policy monitors brokers-dealers communications.
See NASD Rule 3010 and NYSE Rule 342 policy template
on page 816.
NERC Security Guidelines for Electric Utilities This policy detects the information that is outlined in the North
American Electric Reliability Council (NERC) security guidelines
for the electricity sector.
Office of Foreign Assets Control (OFAC) This template detects communications involving targeted OFAC
groups.
OMB Memo 06-16 and FIPS 199 Regulations This template detects information that is classified as confidential.
See OMB Memo 06-16 and FIPS 199 Regulations policy template
on page 822.
Payment Card Industry Data Security Standard This template detects Visa and MasterCard credit card number
data.
SEC Fair Disclosure Regulation This template detects data disclosure of material financial
information.
US Intelligence Control Markings (CAPCO) and This template detects authorized terms to identify classified
DCID 1/7 information in the US Federal Intelligence community.
UK Data Protection Act 1998 This policy protects personal identifiable information.
See Data Protection Act 1998 (UK) policy template on page 789.
EU Data Protection Directives This policy detects personal data specific to the EU directives.
Human Rights Act 1998 This policy enforces Article 8 of the act for UK citizens.
Canadian Social Insurance Numbers This policy detects patterns indicating Canadian social insurance
numbers.
Credit Card Numbers This policy detects patterns indicating credit card numbers.
Individual Taxpayer Identification Numbers This policy detects IRS-issued tax processing numbers.
(ITIN)
See Individual Taxpayer Identification Numbers (ITIN) policy template
on page 810.
SWIFT Codes This policy detects codes banks use to transfer money across
international borders.
UK National Health Service Number This policy detects personal identification numbers issued by the NHS.
US Social Security Numbers This policy detects patterns indicating social security numbers.
Encrypted Data This policy detects the use of encryption by a variety of methods.
Merger and Acquisition Agreements This policy detects information and communications about upcoming merger
and acquisition activity.
Proprietary Media Files This policy detects various types of video and audio files.
Symantec DLP Awareness and Avoidance This policy detects any communications that refer to Symantec DLP or
other data loss prevention systems and possible avoidance of detection.
Common Spyware Upload Sites This policy detects access to common spyware upload Web sites.
Network Security This policy detects evidence of hacking tools and attack planning.
Illegal Drugs This policy detects conversations about illegal drugs and controlled
substances.
Media Files This policy detects various types of video and audio files.
Restricted Files This policy detects various file types that are generally inappropriate to send
out of the company.
Violence and Weapons This policy detects violent language and discussions about weapons.
Yahoo Message Board Activity This policy detects Yahoo message board activity.
Yahoo and MSN Messengers on Port This policy detects Yahoo IM and MSN Messenger activity.
80
See Yahoo and MSN Messengers on Port 80 policy template on page 849.
Note: When the system prompts you to select an Exact Data Profile, the display
lists the data columns to include in the profile to provide the highest level of accuracy.
If data fields in your Exact Data Profile are not represented in the selected policy
template, the system displays those fields for content matching when you define
the detection rule
Table 16-8 Policy templates that implement Exact Data Matching (EDM)
Customer Data Protection See Customer Data Protection policy template on page 787.
Data Protection Act 1988 See Data Protection Act 1998 (UK) policy template on page 789.
Creating policies from templates 327
Choosing an Indexed Document Profile
Table 16-8 Policy templates that implement Exact Data Matching (EDM)
(continued)
Employee Data Protection See Employee Data Protection policy template on page 794.
EU Data Protection Directives See Data Protection Directives (EU) policy template on page 790.
Export Administration Regulations (EAR) See Export Administration Regulations (EAR) policy template
on page 796.
FACTA 2003 (Red Flag Rules) See FACTA 2003 (Red Flag Rules) policy template on page 797.
HIPAA and HITECK (including PHI) See HIPAA and HITECH (including PHI) policy template on page 805.
Human Rights Act 1998 See Human Rights Act 1998 policy template on page 809.
International Traffic in Arms Regulations See International Traffic in Arms Regulations (ITAR) policy template
(ITAR) on page 811.
Payment Card Industry Data Security See Payment Card Industry (PCI) Data Security Standard policy
Standard template on page 824.
State Data Privacy See SEC Fair Disclosure Regulation policy template on page 834.
case the system disables any IDM rules or exceptions for the policy instance. If the
policy template contains DCM rules or exceptions, you may use them.
See About the Indexed Document Profile on page 467.
Table 16-9 Policy templates that implement Indexed Document Matching (IDM)
CAN-SPAM Act (IDM exception) See CAN-SPAM Act policy template on page 784.
NASD Rule 2711 and NYSE Rules 351 See NASD Rule 2711 and NYSE Rules 351 and 472 policy template
and 472 on page 814.
NERC Security Guidelines for Electric See NERC Security Guidelines for Electric Utilities policy template
Utilities on page 817.
SEC Fair Disclosure Regulation See SEC Fair Disclosure Regulation policy template on page 834.
Proprietary Media Files See Proprietary Media Files policy template on page 828.
Configuring policies
Configuring policies
The Manage > Policies > Policy List > Configure Policy screen is the home page
for configuring policies.
Table 17-1 describes the workflow for configuring policies.
Action Description
Define a new policy, or edit an existing policy. Add a new blank policy.
Enter a policy Name and Description. The policy name must be unique in the policy group you deploy
the policy to.
Action Description
Select the Policy Group from the list where the The Default Policy Group is selected if there is no policy group
policy is to be deployed. configured.
Set the Status for the policy. You can enable (default setting) or disable a policy. A disabled
policy is deployed but is not loaded into memory to detect
incidents.
Add a rule to the policy, or edit an existing rule. Click Add Rule to add a rule.
Configure the rule with one or more conditions. For a valid policy, you must configure at least one rule that
declares at least one condition. Compound conditions and
exceptions are optional.
Optionally, add one or more policy exceptions, or Click Add Exception to add it.
edit an existing exception.
See Adding an exception to a policy on page 341.
Save the policy configuration. Click Save to save the policy configuration to the Enforce Server
database.
Export the policy as a template. Optionally, you can export the policy rules and exceptions as a
template.
Add one or more response rules to the policy. You configure response rules independent of policies.
Note: Exceptions are added separate from rules. See Adding an exception to a
policy on page 341.
Content Matches Exact Data Exact Data Profile See About the Exact Data Profile and index
on page 375.
Content Matches Document Indexed Document Profile See Introducing Indexed Document Matching (IDM)
Signature on page 464.
Content Matches Data Identifier Data Identifier See Introducing data identifiers on page 556.
Detect using Vector Machine VML Profile See Introducing Vector Machine Learning (VML)
Learning on page 524.
Message Attachment or File Type See About file type matching on page 624.
Match
Message Attachment or File Size See About file size matching on page 626.
Match
Message Attachment or File See About file name matching on page 626.
Name Match
Message/Email Properties and Enterprise Vault See About implementing detection for Enterprise Vault
Attributes integration Classification on page 635.
Custom File Type Signature Rule enabled See About custom file type identification on page 625.
Custom script See Enabling the Custom File Type Signature condition
in the policy console on page 631.
Protocol Monitoring Custom protocols (if any) See Introducing protocol monitoring for network
on page 641.
Endpoint Device Class or ID Custom device(s) See About endpoint device detection on page 649.
Sender/User based on a Directory User Group See Introducing synchronized Directory Group
Server Group Matching (DGM) on page 668.
Sender/User based on a Directory Exact Data Profile See Introducing profiled Directory Group Matching
from: (DGM) on page 676.
Recipient based on a Directory See Configuring Exact Data profiles for DGM
from: on page 677.
Step 1 Add a rule to a policy, or modify See Adding a rule to a policy on page 332.
a rule.
To modify an existing rule, select the rule in the policy builder interface at
the Configure Policy Edit Rule screen.
Step 2 Name the rule, or modify a In the General section of the rule, enter a name in the Rule Name field,
name. or modify the name of an existing rule.
Configuring policies 335
Configuring policy rules
Step 3 Set the rule severity. In the Severity section of the rule, select or modify a "Default" severity
level.
In addition to the default severity, you can add multiple severity levels to
a rule.
Step 4 Configure the match condition. In the Conditions section of the rule, you configure one or more match
conditions for the rule. The configuration of a condition depends on its
type.
Step 5 Configure match counting (if If the rule calls for it, configure how you want to count matches.
required).
See Configuring match counting on page 338.
Step 6 Select components to match on If the rule is content-based, select one or more available content rules to
(if available). match on.
Step 7 Add and configure one or more To define a compound rule, Add another match condition from the Also
additional match conditions Match list.
(optional).
Configure the additional condition according to its type (Step 4).
Step 8 Save the policy configuration. When you are done cofiguring the rule, click OK.
This action returns you to the Configure Policy screen where you can
Save the policy.
Table 17-4 lists each of the available match conditions and provides links to topics
for configuring each condition.
Rule Description
Rule Description
Content Matches Regular Expression See Configuring the Content Matches Regular Expression condition
on page 615.
Content Matches Exact Data from an See Configuring the Content Matches Exact Data policy condition
Exact Data Profile on page 399.
Content Matches Keyword See Configuring the Content Matches Keyword condition on page 606.
Content Matches Document Signature See Configuring the Content Matches Document Signature policy
condition on page 499.
Content Matches Data Identifier See Configuring the Content Matches data identifier condition on page 567.
Detect using Vector Machine Learning See Configuring the Detect using Vector Machine Learning Profile
profile condition on page 540.
Message Attachment or File Type See Configuring the Message Attachment or File Type Match condition
Match on page 627.
Message Attachment or File Size Match See Configuring the Message Attachment or File Size Match condition
on page 628.
Message Attachment or File Name See Configuring the Message Attachment or File Name Match condition
Match on page 629.
Message/Email Properties and See Configuring the Message/Email Properties and Attributes condition
Attributes on page 638.
Custom File Type Signature See Configuring the Custom File Type Signature condition on page 632.
Network or Mobile Monitoring See Configuring the Protocol Monitoring condition for network detection
on page 643.
Endpoint Monitoring See Configuring the Endpoint Monitoring condition on page 650.
Endpoint Device Class or ID See Configuring the Endpoint Device Class or ID condition on page 653.
Endpoint Location See Configuring the Endpoint Location condition on page 652.
Configuring policies 337
Defining rule severity
Rule Description
Sender/User Matches Pattern See Configuring the Sender/User Matches Pattern condition on page 660.
Recipient Matches Pattern See Configuring the Recipient Matches Pattern condition on page 663.
Sender/User based on a Directory See Configuring the Sender/User based on a Directory Server Group
Server Group condition on page 672.
Sender/User based on a Directory from See Configuring the Sender/User based on a Profiled Directory condition
an Exact Data Profile on page 678.
Recipient based on a Directory Server See Configuring the Recipient based on a Directory Server Group
Group condition on page 673.
Recipient based on a Directory from an See Configuring the Recipient based on a Profiled Directory condition
Exact Data Profile on page 679.
3 Click Add Severity to define additional severity levels for the rule.
If you add a severity level it is based on the match count.
4 Select the desired severity level, choose the match count range, and enter the
match count.
For example, you can set a Medium severity with X range to match after 100
matches have been counted.
5 If you add an additional severity level, you can select it to be the default severity.
6 To remove a defined severity level, click the X icon beside the severity definition.
Check for Simple This configuration reports a match count of 1 if there are one or more matches; it
existence does not count multiple matches. For example, 10 matches are one incident.
Compound This configuration reports a match count of 1 if there are one or more matches
and ALL conditions in the rule or exception are set to check for existence.
Configuring policies 339
Configuring match counting
Count all Simple This configuration reports a match count of the exact number of matches detected
matches by the condition. For example, 10 matches count as 10 incidents.
Compound This configuration reports a match count of the sum of all condition matches in
the rule or exception. The default is one incident per condition match and applies
if any condition in the rule or exception is set to count all matches.
For example, if a rule has two conditions and one is set to count all matches and
detects four matches, and the other condition is set to check for existence and
detects six matches, the reported match count is 10. If a third condition in the rule
detects a match, the match count is 11.
Only report You can change the default one incident per match count by specifying the
incidents with minimum number of matches required to report an incident.
at least _
For example, in a rule with two conditions, if you configure one condition to count
matches
all matches and specify five as the minimum number of matches for each condition,
a sum of 10 matches reported by the two conditions generates two incidents. You
must be consistent and select this option for each condition in the rule or exception
to achieve this behavior.
Note: The count all matches setting applies to each message component you
match on. For example, consider a policy where you specify a match count of 3
and configure a keyword rule that matches on all four message components
(default setting for this condition). If a message is received with two instances of
the keyword in the body and one instance of the keyword in the envelope, the
system does not report this as a match. However, if three instances of the keyword
appear in an attachment (or any other single message component), the system
would report it as a match.
Count all unique Only count Unique match counting is new for Symantec Data Loss Prevention version 11.6
matches unique and is only available for Data Identifiers.
matches
See About unique match counting on page 564.
Condition Description
Content Matches Regular See Introducing regular expression matching on page 613.
Expression
See Configuring the Content Matches Regular Expression condition on page 615.
Condition Description
Content Matches Document See Configuring the Content Matches Document Signature policy condition
Signature (IDM) on page 499.
Content Matches Data Identifier See Introducing data identifiers on page 556.
See Configuring the Content Matches data identifier condition on page 567.
Recipient Matches Pattern See Introducing described identity matching on page 658.
Component Description
Envelope If the condition supports matching on the Envelope component, select it to match on the message
metadata. The envelope contains the header, transport information, and the subject if the message
is an SMTP email.
If the condition does not support matching on the Envelope component, this option is grayed out.
If the condition matches on the entire message, the Envelope is selected and cannot be deselected,
and the other components cannot be selected.
Configuring policies 341
Adding an exception to a policy
Component Description
Subject Certain detection conditions match on the Subject component for some types of messages.
See Detection messages and message components on page 309.
For the detection conditions that support subject component matching, you can match on the Subject
for the following types of messages:
SMTP (email) messages from Network Monitor or Network Prevent for Email.
NNTP messages from Network Monitor.
Exchange email messages delivered by the Classification Server.
See the Enterprise Vault Data Classification Services Implementation Guide.
To match on the Subject component, you must select (check) the Subject component and uncheck
(deselect) the Envelope component for the policy rule. If you select both components, the system
matches the subject twice because the message subject is included in the envelope as part of the
header.
Body If the condition matches on the Body message component, select it to match on the text or content
of the message.
Attachment(s) If the condition matches on the Attachment(s) message component, select it to detect content in
files sent by, downloaded with, or attached to the message.
Note: You can create exceptions for all policy conditions, except the EDM condition
Content Matches Exact Data From. In addition, Network Prevent for Web does
not support synchronized DGM exceptions.
Configuring policies 342
Adding an exception to a policy
Content
Content Matches Regular See Introducing regular expression matching on page 613.
Expression
Content Matches Document Indexed Document See Choosing an Indexed Document Profile on page 327.
Signature Profile
Content Matches Data Identifier Data Identifier See Introducing data identifiers on page 556.
Detect using Vector Machine VML Profile See Configuring VML policy exceptions on page 541.
Learning profile
See Configuring VML profiles and policy conditions
on page 528.
File Properties
Message Attachment or File Type See About file type matching on page 624.
Match
Configuring policies 343
Adding an exception to a policy
Message Attachment or File Size See About file size matching on page 626.
Match
Message Attachment or File Name See About file name matching on page 626.
Match
Message/Email Properties and Enterprise Vault See About implementing detection for Enterprise Vault
Attributes integration Classification on page 635.
Custom File Type Signature Condition enabled See About custom file type identification on page 625.
Custom script
added
Network or Mobile Protocol See Introducing protocol monitoring for network on page 641.
Endpoint Protocol, Destination, See About endpoint protocol monitoring on page 647.
Application
Endpoint Device Class or ID See About endpoint device detection on page 649.
Group (identity)
Sender/User Matches Pattern See Introducing described identity matching on page 658.
Sender/User based on a Directory User Group See Introducing synchronized Directory Group Matching
Server Group (DGM) on page 668.
Sender/User based on a Directory Exact Data Profile See Introducing profiled Directory Group Matching (DGM)
from: on page 676.
Recipient based on a Directory See Configuring Exact Data profiles for DGM on page 677.
from:
Configuring policies 344
Configuring policy exceptions
Step 1 Add a new policy exception, or See Adding an exception to a policy on page 341.
edit an existing exception.
Select an existing policy exception to modify it.
Step 2 Name the exception, or edit an In the General section, enter a unique name for the exception, or modify
existing name or description. the name of an existing exception.
Note: The exception name is limited to 60 characters.
Step 3 Select the components to apply If the exception is content-based, you can match on the entire message
the exception to (if available). or on individual message components.
Entire Message
This option applies the exception to the entire message.
Matched Components Only
This option applies the exception to each message component you
select from the Match On options in the Conditions section of the
exception.
Step 4 Configure the exception condition. In the Conditions section of the Configure Policy - Edit Exception
screen, define the condition for the policy exception. The configuration
of a condition depends on the exception type.
Step 5 Add one or more additional You can add conditions until the exception is structured as desired.
conditions to the exception
See Configuring compound match conditions on page 346.
(optional).
To add another condition to an exception, select the condition from the
Also Match list.
Step 6 Save and manage the policy. Click OK to complete the exception definition process.
Click Save to save the policy.
Table 17-10 lists the exception conditions that you can configure, with links to
configuration details.
Exception Description
Content
Content Matches Regular Expression See Configuring the Content Matches Regular Expression condition
on page 615.
Content Matches Keyword See Configuring the Content Matches Keyword condition on page 606.
Content Matches Document Signature See Configuring the Content Matches Document Signature policy
condition on page 499.
Content Matches Data Identifier See Configuring the Content Matches data identifier condition
on page 567.
Detect using Vector Machine Learning Profile See Configuring VML policy exceptions on page 541.
File Properties
Message Attachment or File Type Match See Configuring the Message Attachment or File Type Match condition
on page 627.
Message Attachment or File Size Match See Configuring the Message Attachment or File Size Match condition
on page 628.
Message Attachment or File Name Match See Configuring the Message Attachment or File Name Match condition
on page 629.
Email/MAPI Attributes See Configuring the Message/Email Properties and Attributes condition
on page 638.
Custom File Type Signature See Configuring the Custom File Type Signature condition on page 632.
Exception Description
Network or Mobile Protocol See Configuring the Protocol Monitoring condition for network detection
on page 643.
Endpoint Protocol or Destination See Configuring the Endpoint Monitoring condition on page 650.
Endpoint Device Class or ID See Configuring the Endpoint Device Class or ID condition on page 653.
Endpoint Location See Configuring the Endpoint Location condition on page 652.
Group (identity)
Sender/User Matches Pattern See Configuring the Sender/User Matches Pattern condition
on page 660.
Recipient Matches Pattern See Configuring the Recipient Matches Pattern condition on page 663.
Sender/User based on a Directory Server See Configuring the Sender/User based on a Directory Server Group
Group condition on page 672.
Recipient based on a Directory Server Group See Configuring the Recipient based on a Directory Server Group
condition on page 673.
Sender/User based on a Directory from an See Configuring the Sender/User based on a Profiled Directory
EDM Profile condition on page 678.
Recipient based on a Directory from and See Configuring the Recipient based on a Profiled Directory condition
EDM Profile on page 679.
Step 1 Modify or configure an You can add one or more additional match conditions to a policy rule at the
existing policy rule or Configure Policy Edit Rule screen.
exception.
You can add one or more additional match conditions to a rule or exception
at the Configure Policy Edit Rule or Configure Policy Edit Exception
screen.
Step 2 Select an additional match Select the additional match condition from the Also Match list.
condition.
This list appears at the bottom of the Conditions section for an existing rule
or exception.
Step 3 Review the available The system lists all available additional conditions you can add to a policy
conditions. rule or exception.
Step 4 Add the additional Click Add to add the additional match condition to the policy rule or exception.
condition.
Once added, you can collapse and expand each condition in a rule or
exception.
Step 5 Configure the additional See Configuring policy rules on page 334.
condition.
See Configuring policy exceptions on page 344.
Step 6 Select the same or any If the condition supports component matching, specify where the data must
component to match. match to generate or except an incident.
Same Component The matched data must exist in the same component
as the other condition(s) that also support component matching to trigger a
match.
Any Component The matched data can exist in any component that you
have selected.
Step 6 Repeat this process to You can add as many conditions to a rule or exception as you need.
additional match conditions
All conditions in a single rule or exception must match to trigger an incident,
to the rule or exception.
or to trigger the exception.
Step 7 Save the policy. Click OK to close the rule or exception configuration screen.
Policy Note: To import a policy as a template, the policy name must be less than
Rule 60 characters, otherwise it does not appear in the Imported Templates
Exception list.
Group
Condition
Exact Data
Indexed Document
Vector Machine Learning
Troubleshooting policies
Action Description
Modify Policy Click anywhere in the policy row to modify an existing policy.
Activate Policy Click the red circle icon by the policy name to activate the policy.
Suspend Policy Click the green circle icon by the policy name.
Note: By default, all solution pack policies are activated on installation of the solution
pack.
Sort Policies Click any column header to sort the policy list.
Remove Policy Click the red X icon at the end of the policy row. On confirmation the system deletes the
policy.
Note: You cannot remove a policy that has active incidents.
Export and Import Policy See Importing policy templates on page 353.
Templates
See Exporting policy detection as a template on page 354.
Download Policy Details Click Download Policy Details to download details for all policies in the Policy List.
Symantec Data Loss Prevention exports the policy details as HTML files in a ZIP archive.
Open the archive to view and print individual policy details.
View and print policy details To view policy details for a single policy, click the printer icon at the end of the policy
row. To print the policy details, use the print feature of your web browser.
Table 18-2 lists and describes the display fields at the Policy List screen.
Column Description
Column Description
Policy Group View and sort by the policy group to which the policy is deployed.
Last Modified View and sort by the date the policy was last updated.
Active Policy The policy icon is green. An active policy can detect incidents.
Suspended Policy The policy icon is red. A suspended policy is deployed but does not detect incidents.
Action Description
Add Policy Group Click Add Policy Group to define a new policy group.
Modify Policy Group To modify an existing policy group, click the name of the group, or click the pencil icon to
the far right of the row.
Remove Policy Group Click the red X icon to the far right of the row to delete that policy group from the system.
A dialog box confirms the deletion.
Note: If you delete a policy group, you delete any policies that are assigned to that group.
Action Description
View policies in a group To view the policies deployed to an existing policy group, navigate to the System > Servers
> Policy Groups > Configure Policy Group screen.
Column Description
Available Servers The detection server to which the policy group is deployed.
Last Modified The date the policy group was last modified.
Select (check) the All Servers option to assign the policy group to all
detection servers in your system. If you leave this checkbox unselected,
you can assign the policy group to individual servers.
The All Discover Servers entry is not configurable because the system
automatically assigns all policy groups to all Network Discover Servers.
This feature lets you assign policy groups to individual Discover targets.
See Configuring the required fields for Network Discover targets
on page 1174.
Deselect (uncheck) the All Servers option to assign the policy group to
individual detection servers.
The system displays a check box for each server currently configured and
registered with the Enforce Server.
Select each individual detection server to assign the policy group.
Note: The Policies in this Group section of the Polices Group screen lists all the
policies in the policy group. You cannot edit these entries. When you create a new
policy group, this section is blank. After you deploy one or more policies to a policy
group (during policy configuration), the Policies in this Group section displays
each policy in the policy group.
Note: Smart response rules are executed manually and are not deployed with
policies.
Note: If the policy status is a yellow caution sign, the policy is misconfigured. The
system does not support certain pairings of detection rules and automated response
rule actions. See Table 72-2 on page 1349.
Remove a If you attempt to delete a policy that has If you want to delete a policy, you must first delete all
policy associated incidents, the system does incidents that are associated with that policy from the
not let you remove the policy. Enforce Server.
Remove a If you attempt to delete a policy group Before you delete a policy group, remove any policies from
policy group that contains one or more policies, the that group by either deleting them or assigning them to
system displays an error message. And, different policy groups.
the policy group is not deleted.
See Manage and add policy groups on page 351.
Troubleshooting policies
Table 18-6 lists log files to consult for troubleshooting policies.
Administering policies 358
Updating EDM and IDM profiles to the latest version
VontuMonitor.log Logs when policies and profiles are sent from the Enforce Server to
detection servers and endpoint servers. Displays JRE errors.
FileReader.log Logs when an index file is loaded into memory. For EDM, look for the
line "loaded database profile." For IDM look for the line: "loaded
document profile."
Indexer.log Logs the operations of the Indexer process to generate EDM and IDM
indexes.
Table 18-7 Reindexing requirements for EDM and IDM data profiles
Exact Data Matching (EDM) If you have existing Exact Data profiles supporting See Updating EDM indexes to the
EDM policies and you want to use new EDM latest version on page 421.
Multi-token matching
features, before upgrading the detection server(s)
Proportional proximity In addition, refer to the chapter
you must:
range "Updating EDM indexes to the latest
Reindex each structured data source using a version" in the Symantec Data Loss
14.0-compatible EDM indexer, and Prevention Administration Guide and
Load each index into a 14.0-generated Exact the online Help.
Data profile.
Indexed Document If you have existing Indexed Document profiles See Using Agent IDM after upgrade
Matching (IDM) supporting IDM policies and you want to use to version 14.0 on page 496.
Agent IDM, after upgrading to 14.0 you must:
Exact match IDM on the Or, refer to the topic "Using Agent IDM
endpoint (Agent IDM) Disable two-tier detection on the Endpoint after upgrade to version 14.0" in the
Server, and Symantec Data Loss Prevention
Reindex each document data source so that Administration Guide and the online
the endpoint index is generated and deployed Help.
to the Endpoint Server for download by the
DLP Agent.
See Updating policies to use the Randomized US SSN data identifier on page 584.
Table 18-8 lists the policy templates updated for this release of Symantec Data
Loss Prevention.
Table 18-8 Policy templates updated in Data Loss Prevention version 12.5
Caldicott Report Drug, Disease, and Treatment See Caldicott Report policy template on page 781.
keyword lists
Customer Data Protection Randomized US SSN data See Customer Data Protection policy template
identifier on page 787.
Employee Data Protection Randomized US SSN data See Employee Data Protection policy template
identifier on page 794.
FACTA 2003 (Red Flag Randomized US SSN data See FACTA 2003 (Red Flag Rules) policy template
Rules) identifier on page 797.
HIPAA and HITECH (including Drug, Disease, and Treatment See HIPAA and HITECH (including PHI) policy
PHI) keyword lists template on page 805.
State Data Privacy Randomized US SSN data See State Data Privacy policy template on page 838.
identifier
US Social Security Numbers Randomized US SSN data See US Social Security Numbers policy template
identifier on page 846.
Chapter 19
Best practices for authoring
policies
This chapter includes the following topics:
Use the appropriate match condition for your data loss prevention objectives
Develop a policy strategy that supports your data security See Develop a policy strategy that supports your data
objectives. security objectives on page 363.
Use a limited number of policies to get started. See Use a limited number of policies to get started
on page 363.
Use policy templates but modify them to meet your See Use policy templates but modify them to meet your
requirements. requirements on page 364.
Use policy groups to manage policy lifecycle. See Use policy groups to manage policy lifecycle
on page 369.
Use the appropriate match condition for your data loss See Use the appropriate match condition for your data
prevention objectives. loss prevention objectives on page 364.
Test and tune policies to improve match accuracy. See Test and tune policies to improve match accuracy
on page 365.
Start with high match thresholds to reduce false positives. See Start with high match thresholds to reduce false
positives on page 366.
Use a limited number of exceptions to narrow detection See Use a limited number of exceptions to narrow
scope. detection scope on page 367.
Use compound conditions to improve match accuracy. See Use compound conditions to improve match
accuracy on page 367.
Author policies to limit the potential effect of two-tier See Author policies to limit the potential effect of two-tier
detection. detection on page 368.
Follow detection-specific best practices. See Follow detection-specific best practices on page 369.
Best practices for authoring policies 363
Develop a policy strategy that supports your data security objectives
Approach Description
Information-driven With this approach you start by identifying specific data items and data combinations you
want to protect. Examples of such data may include fields profiled from a database, a list of
keywords, a set of users, or a combination of these elements. You then group similar data
items together and create policies to identify and protect them. This approach works best
when you have limited access to the data or no particular concerns about a given regulation.
Regulation-driven With this approach you begin with a policy template based on the regulations with which you
must comply. Examples of such templates may include HIPAA or FACTA. Also, begin with
a large set of data (such as customer or employee data). Use the high-level requirements
stipulated by the regulations as the basis for this approach. Then, decide what sensitive data
items and documents in your enterprise meet these requirements. These data items become
the conditions for the detection rules and exceptions in your policies.
Generally it is better to have fewer policies that are configured to address specific
data loss prevention objectives rather than many policies that attempt to address
all of your security requirements. Having too many policies can impact the
performance of the system and can lead to too many false positives.
See Test and tune policies to improve match accuracy on page 365.
Words and phrases, such as "Confidential" or Keywords Exact words, phrases, proximity
"Proprietary"
Network and endpoint communications Protocol and Endpoint Protocols, destinations, monitoring
Determined by the identity of the user, sender, Synchronized DGM Exact identity from LDAP server
recipient
Profiled DGM Exact profiled identity
Describes a document, such as author, title, date, Content-based conditions File type metadata
etc.
creating policy exceptions. If the policy does not detect some incidents, make the
detection condition(s) less specific.
As your policies mature, it is important to continuously test and tune them to ensure
ongoing accuracy.
See Follow detection-specific best practices on page 369.
False positives Policy rules too False positives create high costs in time and resources that are required to
general or broad investigate and resolve apparent incidents that are not actual incidents. Since
many organizations do not have the capacity to manage excess false positives,
it is important that your policies define contextual rules to improve accuracy.
False Policy rules too False negatives obscure gaps in security by allowing data loss, the potential for
negatives tight or narrow financial losses, legal exposure, and damage to the reputation of an organization.
False negatives are especially dangerous because you do not know you have
lost sensitive data.
For example, a policy that contains a keyword match on the word "confidential"
but also contains a condition that excludes all Microsoft Word documents would
be too narrow and be suspect to false negatives because it would likely miss
detecting many actual incidents contained in such documents
See Start with high match thresholds to reduce false positives on page 366.
See Use a limited number of exceptions to narrow detection scope on page 367.
See Use compound conditions to improve match accuracy on page 367.
thresholds for your content-based detection policies. As you tune your policies you
can reduce the match thresholds to be more precise.
See Configuring match counting on page 338.
Caution: Too many compound exceptions in a policy can cause system performance
issues. You should avoid the use of compound exceptions as much as possible.
It is important to understand how exception conditions work so you can use them
properly. Exception conditions disqualify messages from creating incidents.
Exception conditions are checked first by the detection server before match
conditions. If the exception condition matches, the system immediately discards
the entire message or message component that met the exception. There is no
support for match-level exceptions. Once the message or message component is
discarded by meeting an exception, the data is no longer available for policy
evaluation.
See Exception conditions on page 311.
See Use compound conditions to improve match accuracy on page 367.
Exact Data Matching (EDM) For EDM policies, consider including Data Identifier rules OR'd with EDM rules.
For example, for a policy that uses an EDM condition to match social security
numbers, you could add a second rule that uses the SSN Data Identifier condition.
The Data Identifier does not require two-tier detection and is evaluated locally by
the DLP Agent. If the DLP Agent is not connected to the Endpoint Server when
the DLP Agent receives the data, the DLP Agent can still perform SSN pattern
matching based on the Data Identifier condition.
See Combine Data Identifiers with EDM rules to limit the impact of two-tier
detection on page 462.
For example policy configurations, each of the policy templates that provide EDM
conditions also provide corresponding Data Identifier conditions.
Indexed Document Matching For IDM policies that match file contents, consider using VML rules OR'd with IDM
(IDM) rules. VML rules do not require two-tier detection and are executed locally by the
DLP Agent. If you do not need to match file contents exactly, you may want to use
VML instead of IDM.
See Use the appropriate match condition for your data loss prevention objectives
on page 364.
If you are only concerned with file matching, not file contents, consider using
compound file property rules instead of IDM. File property rules do not require
two-tier detection.
See Use compound file property rules to protect design and multimedia files
on page 633.
Directory Group Matching (DGM) For the synchronized DGM Recipient condition, consider including a Recipient
Matches Pattern condition OR'd with the DGM condition. The pattern condition
does not require two-tier detection and is evaluated locally by the DLP Agent.
Data identifiers See Best practices for using data identifiers on page 594.
Keywords See Best practices for using keyword matching on page 610.
Regular expressions See Best practices for using regular expression matching on page 616.
Non-English language See Best practices for detecting non-English language content on page 620.
detection
File properties See Best practices for using file property matching on page 633.
Network protocols See Best practices for using network protocol matching on page 645.
Endpoint events See Best practices for using endpoint detection on page 656.
Described identities See Best practices for using described identity matching on page 665.
Synchronized DGM See Best practices for using synchronized DGM on page 674.
Profiled DGM See Best practices for using profiled DGM on page 680.
Metadata detection See Best practices for using metadata detection on page 709.
Chapter 20
Detecting content using
Exact Data Matching (EDM)
This chapter includes the following topics:
extracting the text-based content, normalizing it, and securing it using a nonreversible
hash. You can schedule indexing on a regular basis so the data is current.
Once you have profiled the data, you configure the Content Matches Exact Data
condition to match individual pieces of the indexed data. For increased accuracy
you can configure the condition to match combinations of data fields from a particular
record. The EDM policy condition matches on data coming from the same row or
record of data. For example, you can configure the EDM policy condition to look
for any three of First Name, Last Name, SSN, Account Number, or Phone Number
occurring together in a message and corresponding to a record from your customer
database.
Once the policy is deployed to one or more detection servers, the system can detect
the data you have profiled in either structured or unstructured format. For example,
you could deploy the EDM policy to a Network Discover/Cloud Storage Discover
Server and scan data repositories for confidential data matching data records in
the index. Or, you could deploy the EDM policy to a Network Prevent for Email
Server to detect records in email communications and attachments, such as
Microsoft Word files. If the attachment is a spreadsheet, such as Microsoft Excel,
the EDM policy can detect the presence of confidential records there as well.
See About the Exact Data Profile and index on page 375.
You create an Exact Data Profile and index the data source file. When you configure
the profile, you map the data field columns to system-defined patterns and validate
Detecting content using Exact Data Matching (EDM) 373
Introducing Exact Data Matching (EDM)
the data. You then configure the EDM policy condition that references the Exact
Data Profile. In this example, the condition matches if a message contains all five
data fields.
The detection server reports a match if it detects the following in any inbound
message:
Bob Smith 123-45-6789 05/26/99 $42500
But, a message containing the following does not match because that record is not
in the index:
Betty Smith 000-00-0000 05/26/99 $42500
If you limited the condition to matching only the Last Name, SSN, and Salary column
fields, the following message is a match because it meets the criteria:
Robert, Smith, 123-45-6789, 05/29/99, $42500
Finally, the following message contents do not match because the value for the
SSN is not present in the profile:
Bob, Smith, 415-789-0000, 05/26/99, $42500
See Configuring Exact Data profiles on page 381.
You can use profiled Directory Group Matching (DGM) to match on senders or
recipients of data based on email address, IM handle, or Windows user name.
Proximity matching range that is proportional to the number of required matches
set in the policy condition.
Full support for single- and multi-token cell indexing and matching. A multi-token
is a cell that is indexed that contains two or more words.
See EDM policy templates on page 374.
Note: The format for the data source file should be a text-based format containing
pipe- or tab-delimited contents. In general you should avoid using a spreadsheet
format for the data source file (such as XLS or XLSX) because such programs use
scientific notation to render numbers.
Columns 32 The data source file cannot have more than 32 columns. If it does, the system
does not index it.
Detecting content using Exact Data Matching (EDM) 377
Introducing Exact Data Matching (EDM)
Cells 6 billion The data source file cannot have more than 6 billion data cells. If it does, the
system does not index it.
1 Prepare the data source file for See Preparing the exact data source file for
indexing. indexing on page 384.
2 Ensure that the data source has at See Ensure data source has at least one
least one column that is unique column of unique data on page 454.
data.
3 Remove incomplete and duplicate See Cleanse the data source file of blank
records. Do not fill empty cells with columns and duplicate rows on page 455.
bogus data.
specify fields that the system recognizes in the system-provided policy templates.
The Field Mappings section also gives you advanced options for specifying custom
fields and validating the data in those fields.
See Mapping Exact Data Profile fields on page 392.
Consider the following example use of field mappings. Your company wants to
protect employee data, including employee social security numbers. You create a
Data Loss Prevention policy based on the Employee Data Protection template. The
policy requires an exact data index with fields for social security numbers and other
employee data. You prepare your data source and then create the Exact Data
Profile. To validate the data in the social security number field, you map this column
field in your index to the "Social Security Number" system field pattern. The system
then validates all data in that field using the Social Security Number validator to
ensure that each data item is a social security number
Using the system-defined field patterns to validate your data is critical to the accuracy
of your EDM policies. If there is no system-defined field pattern that corresponds
to one or more data fields in your index, you can define custom fields and choose
the appropriate validator to validate the data.
See Map data source column to system fields to leverage validation on page 457.
Note: You cannot use the Content Matches Exact Data From an Exact Data
Profile condition as a policy exception. Data Loss Prevention does not support the
use of the EDM condition as a policy exception.
See Configuring the Content Matches Exact Data policy condition on page 399.
See Configuring Data Owner Exception for EDM policy conditions on page 401.
1 Create the data source file. Export the source data from the database (or other data repository) to
a tabular text file.
If you want to except data owners from matching, you need to include
specific data items in the data source file.
See Creating the exact data source file for EDM on page 382.
2 Prepare the data source file for Remove irregularities from the data source file.
indexing.
See Preparing the exact data source file for indexing on page 384.
Detecting content using Exact Data Matching (EDM) 382
Configuring Exact Data profiles
3 Upload the data source file to the You can copy or upload the data source file to the Enforce Server, or
Enforce Server. access it remotely.
4 Create an Exact Data Profile. An Exact Data Profile is required to implement Exact Data Matching
(EDM) policies. The Exact Data Profile specifies the data source, data
field types, and the indexing schedule.
5 Map and validate the data fields. You map the source data fields to system or custom data types that
the system validates. For example, a social security number data field
needs to be nine digits.
See About using System Fields for data source validation on page 377.
6 Index the data source, or See About index scheduling on page 378.
schedule indexing.
See Scheduling Exact Data Profile indexing on page 395.
7 Configure and tune one or more See Configuring the Content Matches Exact Data policy condition
EDM detection conditions. on page 399.
Step Description
1 Export the data you want to protect from a database or other tabular data format, such as an Excel
spreadsheet, to a flat file. The data source file you create must be a tabular text file that contains rows
of data from the original source. Each row from the original source is included as a row in the data source
file. Delimit columns using a tab, a comma, or a pipe. Pipe is preferred. Comma should not be used if
your data source fields contain numbers.
You must maintain all the structured data that you exported from the source database table or table-like
format in one data source file. You cannot split the data source across multiple files.
The data source file cannot exceed 32 columns, 4 billion - 2 (2^32 -2) rows, or 6 billion cells. If you plan
to upload the data source file to the Enforce Server, browser capacity limits the data source size to 2
GB. For file sizes larger than this size you can copy the file to the Enforce Server using FTP/S.
Unique data
For all EDM implementations, make sure the data source contains at least one column of unique
data
See Ensure data source has at least one column of unique data on page 454.
Data Owner Exception
Make sure the data source contains the email address field or domain field, if you plan to use data
owner exceptions.
See Creating the exact data source file for Data Owner Exception on page 383.
Directory Group Matching
Make sure the data source includes one or more sender/recipient identifying fields.
See Creating the exact data source file for profiled DGM on page 384.
See Preparing the exact data source file for indexing on page 384.
Creating the exact data source file for Data Owner Exception
To implement Data Owner Exception and ignore data owners from detection, you
must explicitly include each user's email address or domain address in the Exact
Data Profile. Each expected domain (for example, symantec.com) must be explicitly
added to the Exact Data Profile. The system does not automatically match on
subdomains (for example, fileconnect.symantec.com). Each subdomain must be
explicitly added to the Exact Data Profile.
To implement the data owner exception feature, you must include either or both of
the following fields in your data source file:
Detecting content using Exact Data Matching (EDM) 384
Configuring Exact Data profiles
Email address
Domain address
See About Data Owner Exception on page 379.
See Configuring Data Owner Exception for EDM policy conditions on page 401.
Field Description
Email address If you use an email address column filed in the data source file, the email address appears in
the Directory EDM drop-down list at the incident snapshot screen.
Windows user name If you use a Windows user name field in your data source, the data must be in the following
format: domain\user; for example: ACME\john_smith.
MSN IM name
threshold is met, Symantec Data Loss Prevention stops indexing. It then displays
an error to warn you that your data may be unorganized or corrupt.
To prepare the exact data source for EDM indexing
1 Make sure that the data source file is formatted as follows:
If the data source has more than 200,000 rows, verify that it has at least
two columns of data. One of the columns should contain unique values.
For example, credit card numbers, drivers license numbers, or account
numbers (as opposed to first and last names, which are generic).
See Ensure data source has at least one column of unique data
on page 454.
Verify that you have delimited the data source using pipes ( | ) or tabs. If
the data source file uses commas as delimiters, remove any commas that
do not serve as delimiters.
See Do not use the comma delimiter if the data source has number fields
on page 457.
Verify that data values are not enclosed in quotes.
Remove single-character and abbreviated data values from the data source.
For example, remove the column name and all values for a column in which
the possible values are Y and N. Optionally, remove any columns that
contain numeric values with less that five digits, as these can cause false
positives in production.
See Remove ambiguous character types from the data source file
on page 456.
Verify that numbers, such as credit card or social security, are delimited
internally by dashes, or spaces, or none at all. Make sure that you do not
use a data-field delimiter such as a comma as an internal delimiter in any
such numbers. For example: 123-45-6789, or 123 45 6789, or 123456789
are valid, but not 123,45,6789.
See Do not use the comma delimiter if the data source has number fields
on page 457.
Eliminate duplicate records, which can cause duplicate incidents in
production.
See Cleanse the data source file of blank columns and duplicate rows
on page 455.
Do not index common values. EDM works best with values that are unique.
Think about the data you want to index (and thus protect). Is this data truly
valuable? If the value is something common, it is not useful as an EDM
value. For example, suppose you want to look for "US states." Since there
are only 50 states, if your exact data profile has 300,000 rows, the result
Detecting content using Exact Data Matching (EDM) 386
Configuring Exact Data profiles
2 Once you have prepared the exact data source file, proceed with the next step
in the EDM process: upload the exact data source file to the Enforce Server
for profiling the data you want to protect.
See Uploading exact data source files to the Enforce Server on page 386.
Table 20-6 Uploading the data source file to the Enforce Server for indexing
Upload Data Source Data source file is If you have a smaller data source file (less than 50 MB), upload the data
to Server Now less than 50 MB source file to the Enforce Server using the Enforce Server administration
console (web interface). When creating the Exact Data Profile, you can
specify the file path or browse to the directory and upload the data source
file.
Note: Due to browser capacity limits, the maximum file size that you can
upload is 2 GB. However, uploading any file over 50 MB is not
recommended since files over this size can take a long time to upload. If
your data source file is over 50 MB, consider copying the data source file
to the datafiles directory using the next option.
Detecting content using Exact Data Matching (EDM) 387
Configuring Exact Data profiles
Table 20-6 Uploading the data source file to the Enforce Server for indexing
(continued)
Reference Data Data source file is If you have a large data source file (over 50 MB), copy it to the datafiles
Source on Manager over 50 MB directory on the host where Enforce is installed.
Host
On Windows this directory is located at
\SymantecDLP\Protect\datafiles.
On Linux this directory is located at
/var/SymantecDLP/datafiles.
Use This File Name Data source file is In some cases you may want to create an EDM profile before you have
not yet created created the data source file. In this case you can create a profile template
and specify the name of the data source file you plan to create. This
option lets you define EDM policies using the EDM profile template before
you index the data source. The policies do not operate until the data
source is indexed. When you have created the data source file you place
it in the \SymantecDLP\Protect\datafiles directory and index the
data source immediately on save or schedule indexing.
Table 20-6 Uploading the data source file to the Enforce Server for indexing
(continued)
Use This File Name Data source is to In some environments it may not be secure or feasible to copy or upload
be indexed the data source file to the Enforce Server. In this situation you can index
and
remotely and the data source remotely using Remote EDM Indexer.
Load Externally copied to the
See Remote EDM indexing on page 435.
Generated Index Enforce Server
This utility lets you index an exact data source on a computer other than
the Enforce Server host. This feature is useful when you do not want to
copy the data source file to the same computer as the Enforce Server.
As an example, consider a situation where the originating department
wants to avoid the security risk of copying the data to an
extra-departmental host. In this case you can use the Remote EDM
Indexer.
First you create an EDM profile template where you choose the Use this
File Name and the Number of Columns options. You must specify the
name of the data source file and the number of columns it contains.
See Creating an EDM profile template for remote indexing on page 438.
You then use the Remote EDM Indexer to remotely index the data source
and copy the index files to the Enforce Server host and load the externally
generated index. The Load Externally Generated Index option is only
available after you have defined and saved the profile. Remote indexes
are loaded from the /SymantecDLP/Protect/Index directory on the
Enforce Server host.
See Copying and loading remote index files to the Enforce Server
on page 444.
Note: If you are using the Remote EDM Indexer to generate the Exact Data Profile,
refer to the following topic.
Detecting content using Exact Data Matching (EDM) 389
Configuring Exact Data profiles
Note: Use this option with caution. Be sure to remember to create the data
source file and copy it to the "datafiles" directory. Name the data source
file exactly the same as the name you enter here and include the exact
number of columns you specify here.
8 If the first row of your data source contains Column Names, select the "Read
first row as column names" check box.
9 Specify the Error Threshold, which is the maximum percentage of rows that
contain errors before indexing stops.
A data source error is either an empty cell, a cell with the wrong type of data,
or extra cells in the data source. For example, a name in a column for phone
numbers is an error. If errors exceed a certain percentage of the overall data
source (by default, 5%), the system quits indexing and displays an indexing
error message. The index is not created if the data source has more invalid
records than the error threshold value allows. Although you can change the
threshold value, more than a small percentage of errors in the data source can
indicate that the data source is corrupt, is in an incorrect format, or cannot be
read. If you have a significant percentage of errors (10% or more), stop indexing
and cleanse the data source.
See Preparing the exact data source file for indexing on page 384.
10 Select the Column Separator Char (delimiter) that you have used to separate
the values in the data source file. The delimiters you can use are tabs, commas,
or pipes.
11 Select one of the following encoding values for the content to analyze, which
must match the encoding of your data source:
ISO-8859-1 (Latin-1) (default value)
Standard 8-bit encoding for Western European languages using the Latin
alphabet.
UTF-8
Use this encoding for all languages that use the Unicode 4.0 standard (all
single- and double-byte characters), including those in East Asian
languages.
Detecting content using Exact Data Matching (EDM) 391
Configuring Exact Data profiles
UTF-16
Use this encoding for all languages that use the Unicode 4.0 standard (all
single- and double-byte characters), including those in East Asian
languages.
Note: Make sure that you select the correct encoding. The system does not
prevent you from creating an EDM profile using the wrong encoding. The
system only reports an error at run-time when the EDM policy attempts to
match inbound data. To make sure that you select the correct encoding, after
you clickNext, verify that the column names appear correctly. If the column
names do not look correct, you chose the wrong encoding.
16 Check your field mappings against the suggested fields for the policy template
you plan to use. To do so, go to the Check Mappings Against drop-down list,
select a template, and click Check now on the right.
The system displays a list of all template fields that you have not mapped. You
can go back and map these fields now. Alternatively, you may want to expand
your data source to include as many expected fields as possible, and then
re-create the exact data profile. Symantec recommends that you include as
many expected data fields as possible.
17 In the Indexing section of the screen, select one of the following options:
Submit Indexing Job on Save
Select this option to begin indexing the data source when you save the
exact data profile.
Submit Indexing Job on Schedule
Select this option to index the data source according to a specific schedule.
Make a selection from the Schedule drop-down list and specify days, dates,
and times as required.
See About index scheduling on page 378.
See Scheduling Exact Data Profile indexing on page 395.
18 Click Finish.
After Symantec Data Loss Prevention finishes indexing, it deletes the original
data source from the Enforce Server. After you index a data source, you cannot
change its schema. If you change column mappings for a data source after
you index it, you must create a new exact data profile.
After the indexing process is complete you can create new EDM rules for your
policies that reference the Exact Data Profile you have created.
See Configuring the Content Matches Exact Data policy condition on page 399.
system field. The Field Mappings section lets you map the columns in the original
data source to system fields in the Exact Data Profile.
Field Description
Data Source Field If you selected the Column Names option at the Add Exact Data Profile screen, this column
lists the values that are found in the first row from the data source. If you did not select this
option, this column lists the columns by generic names (such as Col 1, Col 2, and so on).
Note: If you are implementing data owner exception, you must map either or both the email
address and domain fields.
See Configuring the Content Matches Exact Data policy condition on page 399.
A system field value (except None Selected) cannot be mapped to more than one column.
Some system fields have system patterns associated with them (such as social security
number) and some do not (such as last name).
See Using system-provided pattern validators for EDM profiles on page 394.
Check mappings Select a policy template from the drop-down list to compare the field mappings against and
against policy then click Check now.
template
All policy templates that implement EDM appear in the drop-down menu, including any you
have imported.
If you plan to use more than one policy template, select one and check it, and then select
another and check it, and so on.
If there are any fields in the policy template for which no data exists in the data source, a
message appears listing the missing fields. You can save the profile anyway or use a different
Exact Data Profile.
Advanced View If you want to customize the schema for the exact data profile, click Advanced View to display
the advanced field mapping options.
Table 20-8 lists and describes the additional columns you can specify in the Advanced View
screen.
Finish Click Finish when you are done configuring the Exact Data Profile.
Detecting content using Exact Data Matching (EDM) 394
Configuring Exact Data profiles
From the Advanced View you map the system and data source fields to system
patterns. System patterns map the specified structure to the data in the Exact Data
Profile and enable efficient error checking and hints for the indexer.
Field Description
Custom Name If you select Custom Name for a System Field, enter a unique name for it and then select a
value for Type. The name is limited to 60 characters.
Type If you select a value other than Custom for a System Field, some data types automatically
select a value for Type. For example, if you select Birth Date for the System Field, Date is
automatically selected as the Type. You can accept it or change it.
Some data types do not automatically select a value for Type. For example, if you select
Account Number for the System Field, the Type remains unselected. You can specify the
data type of your particular account numbers.
See Using system-provided pattern validators for EDM profiles on page 394.
Description Click the link (description) beside the Type column header to display a pop-up window
containing the available system data types. See also the topic link below.
See Using system-provided pattern validators for EDM profiles on page 394.
Simple View Click Simple View to return to the Simple View (with the Custom Name and Type columns
hidden).
Type Description
Credit Card Number The Credit Card pattern is built around knowledge about various internationally recognized
credit cards, their registered prefixes, and number of digits in account numbers. The following
types of Credit Cards patterns are validated: MasterCard, Visa, America Express, Diners Club,
Discover, Enroute, and JCB.
Optional spaces in designated areas within credit cards numbers are recognized. Note that
only spaces in generally accepted locations (for example, after every 4th digit in MC/Visa) are
recognized. Note that the possible location of spaces differs for different card types. Credit
card numbers are validated using checksum algorithm. If a number looks like a credit card
number (that is, it has correct number of digits and correct prefix), but does not pass checksum
algorithm, it is not considered to be a credit card, but just a number.
Detecting content using Exact Data Matching (EDM) 395
Configuring Exact Data profiles
Type Description
Email Email is a sequence of characters that looks like the following: [email protected], where
string may contain letters, digits, underscore, dash, and dot, and 'tld' is one of the approved
DNS top level generic domains, or any two letters (for country domains).
Number Number is either float or integer, either by itself or in round brackets (parenthesis).
Percent Percent is a number immediately followed by the percent sign ("%"). No space is allowed
between a number and a percent sign.
Phone Only US and Canadian telephone numbers are recognized. The phone number must start
with any digit but 1, with the exception of numbers that include a country code
Phone number can be one of the following formats:
All cases above can be optionally followed by an extension number, preceded by spaces or
dashes. The extension number is 2 to 5 digits preceded by any of the following (case
insensitive): 'x' 'ex' 'ext' 'exten' 'extens' 'extensions' optionally followed by a dot and spaces.
Note: The system does not recognize the pattern XXX-XXX-XXXX as a valid phone number
format because this format is frequently used in other forms of identification. If your data source
contains a column of phone numbers in that format, select None Selected to avoid confusion
between phone numbers and other data.
Postal Code Only US ZIP codes and Canadian Postal Codes are recognized. The US ZIP code is a sequence
of 5 digits, optionally followed by dash, followed by another 4 digits. The Canadian Postal
Code is a sequence like K2B 8C8, that is, "letter-digit-letter-space-digit-letter-digit" where
space(s) in the middle is optional.
Social Security Only US TAX IDs are recognized. The TAX ID is a 3 digits, optionally followed by spaces or
Number dashes, followed by 2 digits, optionally followed by spaces or dashes, followed by 4 digits.
If you update your data sources occasionally (for example, less than once a
month), there is no need to create a schedule. Index the data each time you
update the data source.
Schedule indexing for times of minimal system use. Indexing affects performance
throughout the Symantec Data Loss Prevention system, and large data sources
can take time to index.
Index a data source as soon as you add or modify the corresponding exact data
profile, and re-index the data source whenever you update it. For example,
consider a scenario whereby every Wednesday at 2:00 A.M. you update the
data source. In this case you should schedule indexing every Wednesday at
3:00 A.M. Do not index data sources daily as this can degrade performance.
Monitor results and modify your indexing schedule accordingly. If performance
is good and you want more timely updates, for example, schedule more frequent
data updates and indexing.
The Indexing section lets you index the Exact Data Profile as soon as you save it
(recommended) or on a regular schedule as follows:
Parameter Description
Submit Indexing Select this option to index the Exact Data Profile when you click Save.
Job on Save
Submit Indexing Select this option to schedule an indexing job. The default option is No Regular Schedule. If you
Job on Schedule want to index according to a schedule, select a desired schedule period, as described.
Index Once On Enter the date to index the document profile in the format MM/DD/YY. You can also click the
date widget and select a date.
Until Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Index Weekly Day of the week Select the day(s) to index the document profile.
Until Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Detecting content using Exact Data Matching (EDM) 397
Configuring Exact Data profiles
Parameter Description
Index Monthly Day Enter the number of the day of each month you want the indexing to occur. The number
must be 1 through 28.
Until Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Action Description
Add EDM profile Click Add Exact Data Profile to define a new Exact Data Profile.
Edit EDM profile To modify an existing Exact Data Profile, click the name of the profile, or click the pencil icon
at the far right of the profile row.
Remove EDM profile Click the red X icon at the far right of the profile row to delete the Exact Data Profile from the
system. A dialog box confirms the deletion.
Note: You cannot edit or remove a profile if another user currently modifies that profile, or if a
policy exists that depends on that profile.
Download EDM Click the download profile link to download and save the Exact Data Profile.
profile
This is useful for archiving and sharing profiles across environments. The file is in the binary
*.edm format.
Detecting content using Exact Data Matching (EDM) 398
Configuring EDM policies
Action Description
Refresh EDM profile Click the refresh arrow icon at the upper right of the Exact Data screen to fetch the latest status
status of the indexing process.
If you are in the process of indexing, the system displays the message "Indexing is starting."
The system does not automatically refresh the screen when the indexing process completes.
Column Description
Last Active Version The version of the exact data profile and the name of the detection server that runs the profile.
Status The current status of the exact data profile, which can be any of the following:
In addition, the current status of the indexing process for each detection server, which can be
any of the following:
Error messages The Exact Data screen displays any error messages in red.
For example, if the Exact Data Profile is corrupt or does not exist, the system displays an error
message.
Table 20-13 Configure the Content Matches Exact Data policy condition
1 Configure an EDM Create a new EDM detection rule in a policy, or modify an existing EDM rule.
policy detection rule.
See Configuring policies on page 330.
2 Select the fields to The first thing you do when configuring the EDM condition is select each data field
match. that you want the condition to match. You can select all or deselect all fields at once.
The system displays all the fields or columns that were included in the index. You do
not have to select all the fields, but you should select at least 2 or 3, one of which
must be unique, such as social security number, credit card number, and so forth.
3 Choose the number of Choose the number of the selected fields to match from the drop down menu. This
selected fields to match. number represents the number of fields of those selected that must be present in a
message to trigger a match. You must select at least as many fields to match as the
number of data fields you check. For example, if you choose 2 of the selected fields
from the menu, you must have checked at least two fields present in a message for
detection.
See Ensure data source has at least one column of unique data on page 454.
Detecting content using Exact Data Matching (EDM) 400
Configuring EDM policies
Table 20-13 Configure the Content Matches Exact Data policy condition
(continued)
4 Select the WHERE The WHERE clause option matches on the specified field value. You specify a WHERE
clause to enter specific clause value by selecting an exact data field from the menu and by entering a value
field values to match for that field in the adjacent text box. If you enter more than one value, separate the
(optional). values with commas.
See Use a WHERE clause to detect records that meet specific criteria on page 462.
For example, consider an Exact Data Profile for "Employees" with a "State" field
containing state abbreviations. In this example, to implement the WHERE clause,
you select (check) WHERE, choose "State" from the drop-down list, and enter CA,NV
in the text box. This WHERE clause then limits the detection server to matching
messages that contain either CA or NV as the value for the State field.
Note: You cannot specify a field for WHERE that is the same as one of the selected
matched fields.
5 Ignore data owners Selecting this option implements Data Owner Exception.
(optional).
See Configuring Data Owner Exception for EDM policy conditions on page 401.
6 Exclude data field You can use the exclude data field combinations to specify combinations of data
combinations (optional). values that are exempted from detection. If the data appears in exempted pairs or
groups, it does not cause a match. Excluded combinations are only available when
matching 2 or 3 fields. To enable this option, you must select 2 or 3 fields to match
from the _ of the selected fields menu at the top of the condition configuration.
7 Select an incident Enter or modify the minimum number of matches required for the condition to report
minimum. an incident.
For example, consider a scenario where you specify 1 of the selected fields for a
social security number field and an incident minimum of 5. In this situation the engine
must detect at least five matching social security numbers in a single message to
trigger an incident.
Table 20-13 Configure the Content Matches Exact Data policy condition
(continued)
9 Select one or more Select this option to create a compound condition. All conditions must match for the
conditions to also rule to trigger an incident.
match.
You can Add any available condition from the list.
10 Test and troubleshoot See Test and tune policies to improve match accuracy on page 365.
the policy.
See Troubleshooting policies on page 357.
Note: When you configure DOE for the EDM condition, you cannot select a value
for Ignore Sender/Recipient that is the same as one of the matched fields.
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing,Sales in the text
box. If the condition is implemented as a rule, in this example a match occurs only if the sender or
user works in Marketing or Sales (as long as the other input content meets all other detection criteria).
If the condition is implemented as an exception, in this example the system ignores from matching
messages from a sender or user who works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any sender
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
After you select the Exact Data Profile, when you configure the rule, the directory
you selected and the recipient identifier(s) appear at the top of the page.
Table 20-15 describes the parameters for configuring Recipient based on a
Directory from an EDM profile condition.
Table 20-15 Configuring the Recipient based on a Directory from an EDM profile
condition
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing, Sales in the text
box. For a detection rule, this example causes the system to capture an incident only if at least one
recipient works in Marketing or Sales (as long as the input content meets all other detection criteria).
For an exception, this example prevents the system from capturing an incident if at least one recipient
works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any recipient
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
is too small for a message for the token verification process to recognize the
language of the message. The following message is a sufficient size for token
verification processing:
Chinese
Japanese
Korean
See Enable keyword token verification for CJK on page 609. describes how to
enable and use token verification for CJK keywords.
Enable EDM token verification for CJK
1 Log on to the Enforce Server as an administrative user.
2 Navigate to the System > Servers > Overview > Server Detail - Advanced
Server Settings screen for the detection server you want to configure.
See Advanced server settings on page 209.
3 Locate the parameter EDM.TokenVerifierEnabled.
Detecting content using Exact Data Matching (EDM) 405
Configuring EDM policies
Table 20-18 Advanced Server Settings for EDM indexing and detection
EDM.MaximumNumberOfMatches 100 Defines a top limit on the number of matches returned from each
ToReturn RAM index search. For multi-file indices, this limit is applied to each
sub-index search independently before the search results are
combined. As a result the number of actual matches can exceed
this limit for multiple file indices.
EDM.RunProximityLogic true If true (default), this setting runs the token proximity check. The
free-form text proximity is defined by the setting
EDM.SimpleTextProximityRadius. The tabular text proximity
is defined by belonging to the same table row.
Note: Disabling proximity is not recommended because it can
negatively impact the performance of the system.
Detecting content using Exact Data Matching (EDM) 406
Configuring EDM policies
Table 20-18 Advanced Server Settings for EDM indexing and detection
(continued)
EDM.SimpleTextProximityRadius 35 Provides the baseline range for proximity checking a matched token.
This value is multiplied by the number of required matches to equal
the complete proximity check range.
Table 20-18 Advanced Server Settings for EDM indexing and detection
(continued)
You can set this amount to as many sub-tokens as you need, but
the total number of characters in a multi-token cell cannot exceed
200.
Lexer.StopwordLanguages en Enables the elimination of stop words for the specified languages.
MessageChain.NumChains Varies This number varies depending on detection server type. It is either
4 or 8. The number of messages, in parallel, that the filereader will
process. Setting this number higher than 8 (with the other default
settings) is not recommended. A higher setting does not substantially
increase performance and there is a much greater risk of running
out of memory. Setting this to less than 8 (in some cases 1) helps
when processing big files, but it may slow down the system
considerably.
Detecting content using Exact Data Matching (EDM) 408
Using multi-token matching
Characteristic Description
Whitespace in multi-token cells is considered, but multiple See Multi-token with spaces on page 409.
whitespaces are normalized to 1.
Detecting content using Exact Data Matching (EDM) 409
Using multi-token matching
Characteristic Description
Punctuation immediately preceding and following a token See Multi-token with punctuation on page 410.
or sub-token is always ignored.
See Additional examples for multi-token cells with
punctuation on page 411.
For proximity range checking the sub-token parts of a See Proximity matching example on page 419.
multi-token are counted as single tokens.
The system does not consider stopwords when matching See Multi-token with stopwords on page 409.
multi-tokens. In other words, stopwords are not excluded.
Multi-tokens are more computationally expensive than See Memory requirements for EDM on page 426.
single tokens and require additional memory for indexing,
loading, and processing.
Cell contains space Bank of America Bank of America Cell with spaces is
multi-token.
Cells contains multiple Bank of America Bank of America Multiple spaces are
spaces normalized to one.
Table 20-21 shows multi-token matches with stopwords, single letters, and single
digits.
Cell contains stopword. throw other ball throw other ball Common word ("other") is
filtered out during detection
but not when it is part of a
multi-token.
Cell contains single letter. throw a ball throw a ball Single letter ("a") is filtered
out, but not when it is part of
a multi-token.
Cell contains single digit. throw 1 ball throw 1 ball Unlike single-letter words
that are stopwords, single
digits are never ignored.
Table 20-22 Multi-token cell with Latin and CJK characters examples
Cell includes Latin and CJK ABC ABC Mixed Latin-CJK cell is
characters with no spaces. multi-token.
ABC ABC
Must match exactly.
Cell includes Latin and CJK ABC ABC Multiple spaces are reduced
with one or more spaces. to one.
ABC ABC
The WIP setting operates at detection-time to alter how matches are reported. For
most EDM policies you should not change the WIP setting. For a few limited
situations, such as account numbers or addresses, you may need to set
IncludePunctuationInWords = false depending on your detection requirements.
a.b a.b TRUE Yes The indexed content and the detected content are
exactly the same.
a.b ab TRUE No The indexed content and the detected content are
different.
ab a.b TRUE No The indexed content and the detected content are
different.
FALSE Yes The detected content is treated as "a b" and is therefore
a match.
ab ab TRUE Yes The indexed content and the detected content are
exactly the same
FALSE Yes The indexed content and the detected content are
exactly the same
is false. In other words, if indexed data has cell which has a token with internal
punctuation, the WIP setting should be set to true.
Table 20-24 Additional use cases for multi-token cells with punctuation
Cell contains a physical 346 Guerrero St., Apt. #2 346 Guerrero St., Apt. #2 The indexed content is a
address with punctuation. multi-token cell.
346 Guerrero St Apt 2
Both match because the
punctuation comes at the
beginning or end of the
sub-token parts and is
therefore ignored.
Table 20-24 Additional use cases for multi-token cells with punctuation
(continued)
Cell contains mix of Latin DLP;;EDM ;; DLP;;EDM;;;; (if The indexed content is a
and CJK characters with WIP true) multi-token cell.
internal punctuation.
DLP;;EDM ;; (if During detection,
WIP true) punctuation between the
Latin and Asian characters
is treated as a single
whitespace and leading and
trailing punctuation is
ignored.
Table 20-24 Additional use cases for multi-token cells with punctuation
(continued)
Cell contains mix of Latin DLP EDM DLP EDM The indexed content is a
and CJK characters with multi-token cell.
DLP;EDM ; (if WIP
internal punctuation.
false) During detection,
punctuation between the
DLP;EDM;;; (if WIP
Latin and Asian characters
false)
is treated as a single
whitespace and leading and
trailing punctuation is
ignored. Thus, it matches as
indexed.
Note: It is a best practice to always validate your index against the recognized
system patterns when the data source includes one or more such column fields.
See Map data source column to system fields to leverage validation on page 457.
The general rule for system-recognized patterns is that the WIP setting does not
apply during detection. Instead, the rules for that particular pattern apply. In other
Detecting content using Exact Data Matching (EDM) 415
Using multi-token matching
words, if the pattern is recognized during detection, the WIP setting is not checked.
This is always true if the pattern is a string of characters such as an email address,
and if the cell contains a number that conforms to one of the recognized number
patterns (such as CCN or SSN).
In addition, even if the pattern is a generic number such as account number that
does not conform to one of the recognized number patterns, the WIP setting may
still not apply. To ensure accurate matching for generic numbers that do not conform
to one of the system-recognized patterns, you should not include punctuation in
these number cells. If the cell contents conforms to one of the system-recognized
patterns, the punctuation rules for that pattern apply and the WIP setting does not.
See Do not use the comma delimiter if the data source has number fields
on page 457.
See Table 20-25 on page 415. lists and describes examples for detecting
system-recognized data patterns.
Caution: This list is not exhaustive. It is provided for informational purposes only to
ensure that you are aware that data that matches system-defined patterns takes
precedence and the WIP setting is ignored. Before deploying your EDM policies
into production, you must test detection accuracy and adjust the index accordingly
to ensure that the data that you have indexed matches as expected during detection.
Table 20-25 Some special use cases for system-recognized data patterns
Table 20-25 Some special use cases for system-recognized data patterns
(continued)
### #### ### ### #### ### Must match exactly. The
pattern ###-####-### does
not match even if WIP is set
to false.
Apostrophe '
Tilde ~
Exclamation point !
Ampersand &
Dash -
Period (dot) .
Detecting content using Exact Data Matching (EDM) 417
Using multi-token matching
Question mark ?
At sign @
Dollar sign $
Percent sign %
Asterisk *
Caret symbol ^
Open parenthesis (
Close parenthesis )
Open bracket [
Close bracket ]
Open brace {
Close brace }
Forward slash /
Back slash \
Pound sign #
Equal sign =
Plus sign +
Semicolon ;
Table 20-27 provides examples for match counting. All examples assume that the
policy is set to match three out of four column fields and that the profile index
contains the following cell contents:
Kathy | Stevens | 123-45-6789 | 1111-1111-1111-1111
Kathy | Stevens | 123-45-6789 | 2222-2222-2222-2222
Kathy | Stevens | 123-45-6789 | 3333-3333-3333-3333
If
EDM.HighlightAllMatchesInProximity=true,
EDM matches all tokens within the
proximity window. The token set for each
row is as follows:
1111-1111-1111-1111 1 3 If
Kathy Stevens 123-45-6789 EDM.HighlightAllMatchesInProximity=false,
2 2 EDM matches the left-most tokens for
each profile data row. The token set for
3 2: if
each row is as follows:
EDM.HighlightAllMatchesInProximity=false
(default) Row # 1: 1111-1111-1111-1111 Kathy
Stevens
1: if
EDM.HighlightAllMatchesInProximity=true Row # 2: Kathy Stevens 123-45-6789
Row # 3: Kathy Stevens 123-45-6789
If
EDM.HighlightAllMatchesInProximity=true,
EDM matches all tokens within the
proximity window. The token set for each
row is as follows:
distinction at run-time between the two. Thus, tabular data is treated the same as
free text data and the proximity check is performed beyond the scope of the length
of the row contents
For example, assuming the default radius of 35 and a policy set to match 3 out of
4 column fields, the proximity range is 105 tokens (3 x 35). If the policy matches 2
out of 3 the proximity range is 70 tokens (35 x 2).
Warning: While you can decrease the value of the proximity radius, Symantec does
not recomment increasing this value beyond the default (35). Doing so may cause
performance issues. See Configuring Advanced Server Settings for EDM policies
on page 405.
Table 20-28 shows a proximity matching example based on the default proximity
radius setting. In this example, the detected content produces 1 unique token set
match, described as follows:
The proximity range window is 105 tokens (35 x 3).
The proximity range window starts at the leftmost match ("Stevens") and ends
at the rightmost match ("123-45-6789").
The total number of tokens from "Stevens" to the SSN (including both) is 105
tokens.
The stopwords "other" and "a" are counted for proximity range purposes.
"Bank of America" is a multi-token. Each sub-token part of a multi-token is
counted as a single token for proximity purposes.
Detecting content using Exact Data Matching (EDM) 421
Updating EDM indexes to the latest version
Last_Name | Employer | Match 3 of 3 Radius = 35 Zendrerit inceptos Kathy Stevens lorem ipsum pharetra
SSN tokens (default) convallis leo suscipit ipsum sodales rhoncus, vitae dui
nisi volutpat augue maecenas in, luctus id risus magna
Stevens | Bank of America
arcu maecenas leo quisque. Rutrum convallis tortor
| 123-45-6789
urna morbi elementum hac curabitur morbi, nunc dictum
primis elit senectus faucibus convallis surfrent.
Aptentnour gravida adipiscing iaculis himenaeos,
himenaeos a porta etiam viverra. Class torquent uni
other tristique cubilia in Bank of America. Dictumst
lorem eget ipsum. Hendrerit inceptos other sagittis
quisque. Leo mollis per nisl per felis, nullam cras mattis
augue turpis integer pharetra convallis suscipit
hendrerit? Lubilia en mictumst horem eget ipsum.
Inceptos urna sagittis quisque dictum odio hendrerit
convallis suscipit ipsum wrdsrf 123-45-6789.
1 Upgrade the Enforce Server Refer to the Symantec Data Loss Prevention Upgrade Guide for details.
to 14.0.
Do not upgrade the EDM detection server(s) now.
The 14.0 Enforce Server can continue to receive incidents from non-14.0
detection servers during the upgrade process. Policies and other data cannot
be pushed out to non-14.0 detection servers (one-way communication only
between Enforce 14.0 and non-14.0 detection servers).
2 Create a 14.0-compatible Using the 14.0 Enforce Server administration console, create a new EDM
remote EDM profile profile template for remote EDM indexing.
template.
See Creating an EDM profile template for remote indexing on page 438.
Download the *.edm profile template and copy it to the remote data source
host system.
See Downloading and copying the EDM profile file to a remote system
on page 441.
3 Install the 14.0 Remote EDM Install the Symantec Data Loss Prevention 14.0 Remote EDM Indexer on the
Indexer on the remote data remote data source host so that you can index the data source.
source host.
See Remote EDM indexing on page 435.
4 Calculate the memory that Calculate the memory that is required for indexing before you attempt to index
is required to index the data the data source. Although the Remote EDM Indexer is allocated sufficient
source and adjust the memory to index most data sources, if you have a very large index you may
indexer memory setting. have to allocate more memory.
Table 20-29 Update process using the Remote EDM Indexer (continued)
5 Index the data source using The result of this process is multiple 14.0-compatible *.rdx files that you
the 14.0 Remote EDM can load into a 14.0 Enforce Server system.
Indexer.
If you have a data source file prepared, run the Remote EDM Indexer and
index it.
See Remote indexing examples using data source file on page 442.
If the data source is an Oracle database and the data is clean, use the SQL
Preindexer to pipe the data to the Remote EDM Indexer.
6 Calculate the memory that You need to calculate how much RAM the detection server requires to load
is required to load and and process the index at run-time. These calculations are required for each
process the index and adjust EDM index you want to deploy.
the detection server memory
See Memory requirements for EDM on page 426.
setting for each EDM
detection server host.
7 Update the EDM profile by Copy the *.pdx and *.rdx files from the remote host to the 14.0 Enforce
loading the 14.0 index. Server host file system.
Load the index into the EDM profile you created in Step 2.
See Copying and loading remote index files to the Enforce Server
on page 444.
8 Upgrade one or more EDM Once you have created the 14.0-compliant EDM profiles and upgraded the
detection servers to 14.0. Enforce Server, you can then upgrade the detection server(s).
Refer to the Symantec Data Loss Prevention Upgrade Guide for details.
Make sure you have calculated and verified the memory requirements for
loading and processing multi-token indexes on the detection server.
9 Test and verify the updated Legacy EDM indexes and policies run on 14.0 detection servers but do not
index. make use of 14.0 features. To test the upgraded system and updated index,
you can create a new policy that references the updated index. Meanwhile,
the legacy index and policy remains deployed and running.
10 Remove out-of-date EDM Once you have verified the new EDM index and policy, you can retire the
indexes. legacy EDM index and policy.
Detecting content using Exact Data Matching (EDM) 424
Updating EDM indexes to the latest version
1 Upgrade the Enforce Server Refer to the Symantec Data Loss Prevention Upgrade Guide for details.
to 14.0.
Do not upgrade the EDM detection server(s) now.
The 14.0 Enforce Server can continue to receive incidents from non-14.0
detection servers during the upgrade process. Policies and other data cannot
be pushed out to non-14.0 detection servers (one-way communication only
between Enforce 14.0 and non-14.0 detection servers).
2 Create, prepare, and copy Copy the data source file to the /SymantecDLP/Protect/datafiles
the data source file to the directory on the upgraded 14.0 Enforce Server host file system.
14.0 Enforce Server host.
See Creating the exact data source file for EDM on page 382.
See Preparing the exact data source file for indexing on page 384.
See Uploading exact data source files to the Enforce Server on page 386.
3 Calculate memory the Calculate the memory that is required for indexing before you attempt to index
memory that is required to the data source.
index the data source and
See Memory requirements for EDM on page 426.
update the indexer memory
setting.
4 Create a new Create a new EDM profile using the 14.0 Enforce Server administration
14.0-compliant EDM profile console.
and index the data source
Choose the option Reference Data Source on Manager Host for uploading
file.
the data source file (assuming that you copied it to the /datafiles directory).
5 Calculate memory the You need to calculate how much RAM the detection server requires to load
memory that is required to and process the index and run-time. These calculations are required for each
load and process the index EDM index you want to deploy and the memory adjustments are cumulative.
at run-time and adjust the
See Memory requirements for EDM on page 426.
memory settings for each
EDM detection server host.
Detecting content using Exact Data Matching (EDM) 425
Updating EDM indexes to the latest version
6 Upgrade the EDM detection Once you have created the 14.0-compliant EDM profile you can then upgrade
server(s) to 14.0. the detection server(s).
Refer to the Symantec Data Loss Prevention Upgrade Guide for details.
Make sure you have calculated and verified the memory requirements for
loading and processing multi-token indexes on the detection server.
7 Test and verify the updated Legacy EDM indexes and policies run on 14.0 detection servers but do not
index. make use of 14.0 features. To test the upgraded system and updated index,
you can create a new policy that references the updated index. Meanwhile,
the legacy index and policy remains deployed and running.
8 Remove out-of-date EDM Once you have verified the new EDM index and policy, you can retire the
indexes. legacy EDM index and policy.
Enforce Server error 2928 One or more profiles are out-of-date and must be reindexed.
event
See Updating EDM indexes to the latest version on page 421.
Enforce Server error 2928 Check the Manage > Data Profiles > Exact Data page for more details.
event detail The following EDM profiles are out-of-date: Profile X, Profile XY, and so
forth.
System Event error 2928 One or more profiles are out-of-date and must be reindexed.
Detecting content using Exact Data Matching (EDM) 426
Memory requirements for EDM
Table 20-31 Error messages for non-compliant Exact Data Profiles (continued)
Exact Data Profile error N/A This profile is out-of-date, and must be reindexed.
Table 20-32 Workflow for determining memory requirements for EDM indexes
Table 20-32 Workflow for determining memory requirements for EDM indexes
(continued)
2 Increase the indexer See Increasing the memory for the Enforce Server
memory according to EDM indexer on page 429.
your calculations.
See Increasing the memory for the Remote EDM
indexer on page 430.
4 Increase the detection See Increasing the memory for the detection server
server memory (File Reader) on page 433.
according to your
calculations.
1 Estimate the memory requirements See Determining requirements for both local and remote
for the indexer. indexers on page 428.
2 Increase the indexer memory. The next step is to increase the memory allocated to the
indexer. The procedure for increasing the indexer memory
differs depending on whether you are using the EDM indexer
local to the Enforce Server or the Remote EDM Indexer.
Table 20-33 Memory requirements for indexing the data source (continued)
3 Restart the Vontu Manager service. You must restart this service after you have changed the
memory allocation.
4 Index the data source. The last step is to index the data source. You need to do this
before you calculate remaining memory requirements.
Serial indexing
If you create the indexes serially (no two are created in parallel), the memory
requirement for the biggest index is:
2 billion cells 0 .5 billion default x 3 bytes = 4.5 GB rounded to 5 GB additional
memory.
As explained in detail later, set wrapper.java.maxmemory to 7 GB (7168M). This
7 GB includes the 2 GB (2048 MB) default memory for Enforce and the 5 GB
additional memory.
Table 20-34 provides examples for how the data source size affects indexer memory
requirements for serial indexes.
100 million cells 2048 MB (default) No additional RAM is needed for the indexer.
Detecting content using Exact Data Matching (EDM) 429
Memory requirements for EDM
500 million cells 2048 MB (default) No additional RAM is needed for the indexer.
1 billion cells 4 GB If you have a single data source with 1 billion cells (for
example, 10 columns by 100 million rows), you need
extra memory for 0.5 billion cells (1 billion cells 0.5
million default) 0.5 million x 3 bytes, or 1.5 GB of RAM
(rounded to 2 GB) to index the data source. This
amount is added to the default indexer RAM allotment.
2 billion cells 7 GB If you have a single data source with 2 billion cells (for
example, 10 columns by 200 million rows), you need
extra memory for 1.5 billion cells (2 billion cells 0.5
million default) 1.5 million x 3 bytes, or 4.5 GB of RAM
(rounded to 5 GB) to index the data source.
Parallel indexing
If you index these four files in Table 20-34 simultaneously (in parallel), you are
indexing more than 500 million cells. So, the additional memory (3.6 billion cells
0.5 billion cells provided by default) required is as follows:
3.1 billion cells x 3 bytes = 9.3 GB rounded to 10 GB additional memory.
As explained in detail later, you set wrapper.java.maxmemory to 12 GB. This 12
GB includes 2048 MB default memory for Enforce and an additional 9 GB from the
additional memory calculation above.
Note: For CJK language indexes, or indexes that are predominantly multi-token,
these formulas should use a multiplier of 4 bytes instead of 3 bytes. In both of these
cases, a 350-million cell data source is supported by default.
See Increasing the memory for the Enforce Server EDM indexer on page 429.
Note: This result is added to the existing memory setting; it is not used to
replace the existing memory setting.
The *.vmoptions file accepts one JVM option per line. For example, you can specify
the following option in a file you save as RemoteEDMIndexer.vmoptions:
-Xmx11G
See Overview of configuring memory and indexing the data source on page 427.
To deploy the *.vmoptions file, copy it to the following locations:
For Linux: /opt/SymantecDLP/Protect/bin/RemoteEDMIndexer.vmoptions
For Windows: \SymantecDLP\Protect\bin\RemoteEDMIndexer.exe.vmoptions
See Generating remote index files on page 441.
Detecting content using Exact Data Matching (EDM) 431
Memory requirements for EDM
The memory settings for a detection server are set in the Enforce Server console
at the Server Detail - Advanced Server Settings page, using the
BoxMonitor.FileReaderMemory. property. The format is -Xrs -Xms1200M Xmx4G
Note: When you update this setting, only change the -Xmx value in this property.
For example, only change "4G." to a new value, and leave all other values the
same.
The examples in Table 20-35 show the settings for five different situations.
Example 1: Single small index Memory required is: 2 million default settings
with 2 million cells to load * 14 bytes = 28 MB
These instructions assume that you have performed the necessary calculations.
To increase the memory for detection server processing
1 In the Enforce Server administration console, navigate to the Server Detail -
Advanced Server Settings screen for the detection server where the EDM
index is deployed or to be deployed.
2 Locate the following setting: BoxMonitor.FileReaderMemory.
3 Change the -Xmx4G value in the following string to match the calculations you
have made.
-Xrs -Xms1200M -Xmx4G -XX:PermSize=128M -XX:MaxPermSize=256M
For example: -Xrs -Xms1200M -Xmx11G -XX:PermSize=128M
-XX:MaxPermSize=256M
4 Save the configuration and restart the detection server.
To compute the RAM required to run your indexes, enter the following information:
1. Obtain the number of message chains from the MessageChain.NumChains
advanced server setting and enter that number into # of Message Chains.
2. Obtain the number of cells in each index (you can specify up to 10 indexes)
and enter that number into # of cells in Index.
Detecting content using Exact Data Matching (EDM) 435
Remote EDM indexing
When you change any value, the spreadsheet updates the Required RAM field.
The value in the Required RAM field is the amount of memory that is required to
run the indexes specified. See Increasing the memory for the detection server (File
Reader) on page 433. for information on updating the -Xmx parameter in the
BoxMonitor.FileReaderMemory setting.
Step 1 Install the Remote EDM See About installing and running the Remote EDM Indexer and SQL
Indexer on a computer that Preindexer utilities on page 438.
is not part of the Symantec
Data Loss Prevention
system.
Step 2 Create an Exact Data Profile On the Enforce Server, generate an EDM Profile template using the *.edm
on the Enforce Server to use file name extension and specifying the exact number of columns to be indexed.
with the Remote EDM
See Creating an EDM profile template for remote indexing on page 438.
Indexer.
Step 3 Copy the Exact Data Profile Download the profile template from the Enforce Server and copy it to the
file to the computer where remote data source host computer.
the Remote EDM Indexer
See Downloading and copying the EDM profile file to a remote system
resides.
on page 441.
Step 4 Run the Remote EDM If you have a cleansed data source file, use the RemoteEDMIndexer with the
Indexer and create the index -data, -profile and -result options.
files.
If the data source is an Oracle database, use the SqlPreindexer and the
RemoteEDMIndexer to index the data source directly with the -alias (oracle
DB host), -username and -password credentials, and the -query string or
-query_path
Step 5 Copy the index files from the Copy the resulting *.pdx and *.rdx files from the remote machine to the
remote machine to the Enforce Server host at C:\SymantecDLP\Protect\index.
Enforce Server.
See Copying and loading remote index files to the Enforce Server on page 444.
Step 6 Load the index files into the Update the EDM profile by loading the externally generated index.
Enforce Server.
Submit the profile for indexing.
See Copying and loading remote index files to the Enforce Server on page 444.
Step 7 Troubleshoot any problems Verify that indexing is started and completes.
that occur during the
Check the system events for Code 2926 ("Created Exact Data Profile" and
indexing process.
"Data source saved").
Step 8 Create policy with EDM You should see the column data for defining the EDM condition.
condition.
See Configuring the Content Matches Exact Data policy condition on page 399.
About installing and running the Remote EDM Indexer and SQL
Preindexer utilities
The Remote EDM Indexer is installed from the same installation program as the
other Symantec Data Loss Prevention components. The SQL Preindexer is installed
automatically when you install the Remote EDM Indexer. Both utilities are run from
the command line and are stored at /SymantecDLP/Protect/bin.
See Generating remote index files on page 441.
To install the Remote EDM Indexer, copy the ProtectInstaller.exe (Windows)
or the ProtectInstaller.sh (Linux) file to the remote computer where the data
to be indexed resides. When running the installer, choose to install the "Indexer"
only and no other components. The Linux installer for the Remote EDM Indexer is
a program that you run from the command console.
See Installing the Remote EDM Indexer (Windows) on page 450.
See Installing the Remote EDM Indexer (Linux) on page 451.
Both the Remote EDM Indexer and the SQL Preindexer run from the command
line. If you are on a Linux system, change users to the protect user before running
the SQL Preindexer. (The installation program creates the protect user.)
See Generating remote index files on page 441.
Note: For two- and three-tier Data Loss Prevention installations, you should not
install the Remote EDM Indexer on the same system that hosts a detection server.
Refer to the Symantec Data Loss Prevention Installatio Guide for more information.
10 Click Next to map the column headings from the data source to the profile.
11 In the Field Mappings section, map the Data Source Field to the System
Field for each column by selecting the column name from the System Field
drop-down list.
The Data Source Field lists the number of columns you specified at the
previous screen. The System Field contains a list of standard column headings.
If any of the column headings in your data source match the choices available
in the System Field list, map each accordingly. Be sure that you match the
selection in the System Field column to its corresponding numbered column
in the Data Source Field.
For example, for a data source that you have specified in the profile as having
three columns, the mapping configuration may be:
12 If a Data Source Field does not map to a heading value in the options available
from the System Field column, click the Advanced View link.
In the Advanced View the system displays a Custom Name column beside
the System Field column.
Enter the correct column name in the text box that corresponds to the
appropriate column in the data source.
Optionally, you can specify the data type for the Custom Name you entered
by selecting the data type from the Type drop-down list. These data types are
system-defined. Click the description link beside the Type name for details
on each system-defined data type.
13 If you intend to use the Exact Data Profile to implement a policy template that
contains one or more EDM rules, you can validate your profile mappings for
the template. To do this, select the template from the Check mappings against
policy template drop-down list and click Check now. The system indicates
any unmapped fields that the template requires.
14 Do not select any Indexing option available at this screen, since you intend
to index remotely.
15 Click Finish to complete the profile creation process.
Detecting content using Exact Data Matching (EDM) 441
Remote EDM indexing
Remote EDM Indexer with data source Specify data source file, EDM profile, Use when you have a cleansed data
file. output directory. source file; use for upgrading to DLP
14.0.
Remote EDM Indexer with SQL Query DB and pipe output to stdin of Requires Oracle DB and clean data.
Preindexer Remote EDM Indexer.
See Remote indexing examples using
SQL Preindexer on page 443.
For example:
RemoteEDMIndexer -data=C:\EDMIndexDirectory\CustomerData.dat
-profile=C:\EDMIndexDirectory\RemoteEDMProfile.edm
-result=C:\EDMIndexDirectory\
This command generates an EDM index using the local data source flat file
CustomerData.dat and the local RemoteEDMProfile.edm file that you generated
and copied from the Enforce Server to the remote host, where \EDMIndexDirectory
is the directory for placing the generated index files.
When the generation of the indexes is successful, the utility displays the message
"Successfully created index" as the last line of output.
In addition, the following index files are created and placed in the -result directory:
ExternalDataSource.CustomerData.pdx
ExternalDataSource.CustomerData.rdx
For example:
With this command the SQL Preindexer utility connects to the Oracle database and
runs the SQL query to retrieve name and salary data from the employee table. The
SQL Preindexer returns the result of the query to stdout (the command console).
The SQL query must be in quotes. The Remote EDM Indexer command runs the
utility and reads the query result from the stdin console. The Remote EDM Indexer
indexes the data using the ExportEDMProfile.edm profile as specified by the profile
file name and local file path.
When the generation of the indexes is successful, the utility displays the message
"Successfully created index" as the last line of output.
In addition, the utility places the following generated index files in the
EDMIndexDirectory -result directory:
ExternalDataSource.CustomerData.pdx
ExternalDataSource.CustomerData.rdx
Here is another example using SQL Preindexer and Remote EDM Indexer
commands:
As an alternative to the -query SQL string you can use the -query_path option and
specify the file path and name for the SQL query (*.sql). If you do not specify a
query or query path the entire DB is queried.
ExternalDataSource.<DataSourceName>.rdx.0 -
ExternalDataSource.<DataSourceName>.rdx.11
After you create the index files on a remote machine, the files must be copied to
the Enforce Server, loaded into the previously created remote EDM profile, and
indexed.
See Creating an EDM profile template for remote indexing on page 438.
To copy and load the files on the Enforce Server
1 Go to the directory where the index files were generated. (This directory is the
one specified in the -result option.)
2 Copy all of the index files with .pdx and .rdx extensions to the index directory
on the Enforce Server. This directory is located at
\SymantecDLP\Protect\Index (Windows) or /var/SyantecDLP/index (Linux).
3 From the Enforce Server administration console, navigate to the Manage >
Policies > Exact Data screen.
This screen lists all the Exact Data Profiles in the system.
4 Click the name of the Exact Data Profile you used with the Remote EDM
Indexer.
5 To load the new index files, go to the Data Source section of the Exact Data
Profile and select Load Externally Generated Index.
Detecting content using Exact Data Matching (EDM) 445
Remote EDM indexing
-alias Oracle DB connect string Specifies the database alias that is used to connect to the
database in the following format:
Required
@//oracle_DB_host:port/SID
For example:
-alias=@//myhost:1521/ORCL
-alias=@//localhost:1521/CUST
-driver Oracle JDBC driver class Specifies the JDBC driver class, for example:
oracle.jdbc.driver.OracleDriver.
-encoding Character encoding Specifies the character encoding of the data to index. The
(iso-8859-1) default is iso-8859-1.
-query SQL query This option specifies the SQL query to perform. The statement
must be enclosed in quotes.
If you omit the -query option the utility indexes the entire
database.
-query_path SQL script Specifies the file name and local path that contains a SQL
query to run. Must be full path.
-separator Output column separator Specifies whether the output column separator is a comma,
(tab) pipe, or tab. The default separator is a tab.
-subprotocol Oracle thin driver Specifies the JDBC connect string subprotocol (for example,
oracle:thin).
Required
-verbose Print verbose output for Displays a statistical summation of the operation when it is
debugging. complete.
If you are on Linux, change users to the protect user before running the Remote
EDM Indexer. (The installation program creates the protect user.)
The Remote EDM Indexer provides a command line interface. The syntax for running
the utility is as follows:
-data Data source to be indexed Specifies the data source to be indexed. If this option is not
(stdin) specified, the utility reads data from stdin.
Required if you use a flat file Required if using data source file and not the SQL Preindexer.
-encoding Character encoding of data Specifies the character encoding of the data to index. The
to be indexed (ISO-8859-1) default is ISO-8859-1.
-ignore_date Ignore expiration date of the Overrides the expiration date of the Exact Data Profile if the
EDM profile profile has expired. (By default, an Exact Data Profile expires
after 30 days.)
-profile File containing the EDM Specifies the Exact Data Profile to be used. This profile is the
profile one that is selected by clicking the download link on the
Exact Data screen in the Enforce Server management console
Required
Detecting content using Exact Data Matching (EDM) 448
Remote EDM indexing
-result Directory to place the Specifies the directory where the index files are generated.
resulting indexes
Required
-verbose Display verbose output Displays a statistical summation of the indexing operation
when the index is complete.
Index files not Use the -verbose option in the Specifying the verbose option when running the Remote EDM
generated command to reveal error Indexer provides a statistical summary of information about the
message. indexing operation after it completes. This information includes
the number of errors and where the errors occurred.
"Failed to create Verify file and path names. Verify that you included the full path and proper file name for
index" the -data file and the -profile file (*.edm). The paths must be
local to the host.
"Cannot compute
index"
"Unable to generate
index"
"Destination is not a Directory path not correct. Verify that you properly entered the full path to the destination
directory" directory for the required -result argument.
*.idx file instead Did not use -data argument The -data option is required if you are using a data source file
of *.rdx file and not the SQL Preindexer. In other words, the only time you
don't use the -data argument is when you are using the SQL
Preindexer.
If you run the Remote EDM Indexer without the -data option
and no SQL Preindexer query, you get an *.idx and *.rdx
file that cannot be used as for the EDM index. Rerun the index
using the -data option or a SQL Preindexer -query or
-query-path.
Detecting content using Exact Data Matching (EDM) 450
Remote EDM indexing
In addition, you may encounter errors when you index large amounts of data. Often
the set of data contains a data record that is incomplete, inconsistent, or incorrectly
formatted. Data rows that contain more columns than expected or incorrect data
types often cannot be properly indexed and are unrecognized during indexing. The
rows of data with errors cannot be indexed until those errors are corrected and the
Remote EDM Indexer rerun. Symantec provides a couple of ways to get information
about any errors and the ultimate success of the indexing operation.
To see the actual rows of data that the Remote EDM Indexer failed to index, modify
the Indexer.properties file.
To modify the Indexer.properties file and view remote indexing errors
1 Locate the Indexer.properties file at
\SymantecDLP\Protect\config\Indexer.properties (Windows) or
/opt/SymantecDLP/Protect/config/Indexer.properties (Linux).
cd /tmp
4 You may need to change permissions on the file before you can run the file. If
so, type:
5 Once the file permissions have been changed you can run the
ProtectInstaller_14.0.sh file, by typing:
./ProtectInstaller_14.0.sh -i console
Once the console mode installation launches, the Introduction step is displayed.
For most circumstances, it is recommended to use the defaults during
installation whenever possible. Press Enter to proceed to the next step.
6 At the Choose Install Set step, specify the component to install. To install the
Remote EDM Indexer, type the number beside the option and press Enter.
7 At the Install Folder step, type the absolute path to the directory where you
want to install the files. The default location can be selected by pressing Enter.
8 At the Pre-Installation Summary step, review the installation configuration
that you have selected. If you are satisfied with the selections, press Enter to
begin the installation. Or, type back and press Enter until you reach the step
you want to change.
9 When the installation completes, press Enter to close the installer.
The files to uninstall the Remote EDM Indexer are located in the root level of the
Symantec Data Loss Prevention installation directory. Follow this procedure to
uninstall the utility on Linux.
To remove a Remote EDM Indexer from the command line
1 Log on as root and change to the Uninstall directory by typing:
cd /opt/SymantecDLP/Uninstall
./Uninstall -i console
Ensure that the data source file contains at least one See Ensure data source has at least one column of unique
column of unique data. data on page 454.
Eliminate duplicate rows and blank columns before See Cleanse the data source file of blank columns and
indexing. duplicate rows on page 455.
To reduce false positives, avoid single characters, quotes, See Remove ambiguous character types from the data
abbreviations, numeric fields with less than 5 digits, and source file on page 456.
dates.
Understand multi-token indexing and clean up as See Understand how multi-token cell matching functions
necessary. on page 456.
Use the pipe (|) character to delimit columns in your data See Do not use the comma delimiter if the data source
source. has number fields on page 457.
Review an example cleansed data source file. See Ensure that the data source is clean for indexing
on page 458.
Map data source column to system fields to leverage See Map data source column to system fields to leverage
validation during indexing. validation on page 457.
Leverage EDM policy templates whenever possible. See Leverage EDM policy templates when possible
on page 458.
Include the column headers as the first row of the data See Include column headers as the first row of the data
source file. source file on page 458.
Check the system alerts to tune Exact Data Profiles. See Check the system alerts to tune profile accuracy
on page 459.
Use stopwords to exclude common words from matching. See Use stopwords to exclude common words from
detection on page 459.
Automate profile updates with scheduled indexing. See Use scheduled indexing to automate profile updates
on page 459.
Detecting content using Exact Data Matching (EDM) 454
Best practices for using EDM
Match on two or three columns in an EDM rule. See Match on 3 columns in an EDM condition to increase
detection accuracy on page 460.
Leverage exception tuples to avoid false positives. See Leverage exception tuples to avoid false positives
on page 461.
Use a where clause to detect records that meet a specific See Use a WHERE clause to detect records that meet
criteria. specific criteria on page 462.
Use the minimum matches field to fine tune EDM rules. See Use the minimum matches field to fine tune EDM
rules on page 462.
Consider using Data Identifiers in combination with EDM See Combine Data Identifiers with EDM rules to limit the
rules. impact of two-tier detection on page 462.
Include an email address field in the Exact Data Profile for See Include an email address field in the Exact Data
profiled DGM. Profile for profiled DGM on page 463.
Use profiled DGM for Network Prevent for Web identity See Use profiled DGM for Network Prevent for Web
detection identity detection on page 463.
The following data fields are usually unique: The following data fields are not unique:
Account number First name
Bank Card number Last name
Phone number City
Email address State
Social security number Zip code
Tax ID number Password
Drivers license number PIN number
Employee number
Insurance number
Cleanse the data source file of blank columns and duplicate rows
The data source file should be as clean as possible before you create the EDM
index, otherwise the resulting profile may create false positives.
When you create the data source file, avoid including empty cells or blank columns.
Blank columns or fields count as errors when you generate the EDM profile. A
data source error is either an empty cell or a cell with the wrong type of data (a
name appearing in a phone number column). If the errors exceed the error threshold
percentage for the profile (by default, 5%), the system stops indexing and displays
an indexing error message.
The best practice is to remove blank columns and empty cells from the data source
file, rather than increasing the error threshold. Keep in mind that if you have many
empty cells, it may require a 100% error threshold for the system to create the
profile. If you specify 100% as the error threshold, the system indexes the data
source without checking for errors.
In addition, do not fill empty cells or blank fields with bogus data so that the error
threshold is met. Adding fictitious or "null" data to the data source file will reduce
the accuracy of the EDM profile and is strongly discouraged. Content you want to
monitor should be legitimate and not null.
See About cleansing the exact data source file on page 377.
See Preparing the exact data source file for indexing on page 384.
See Ensure that the data source is clean for indexing on page 458.
Detecting content using Exact Data Matching (EDM) 456
Best practices for using EDM
Single characters Single character fields should be eliminated from the data source file. These are
more likely to cause false positives, since a single character is going to appear
frequently in normal communications.
Abbreviations Abbreviated fields should be eliminated from the data source file for the same reason
as single characters.
Small numbers Indexing numeric fields that contain less than 5 digits is not recommended because
it will likely yield many false positives.
Dates Date fields are also not recommended. Dates are treated like a string, so if you are
indexing a date, such as 12/6/2007, the string will have to match exactly. The indexer
will only match 12/6/2007, and not any other date formats, such as Dec 6, 2007,
12-6-2007, or 6 Dec 2007. It must be an exact match.
Do not use the comma delimiter if the data source has number fields
Of the three types of column delimiters that you can choose from for separating the
fields in the data source file (pipe, tab, or comma), the pipe or tab (default) is
recommended. The comma delimiter is ambiguous and should not be used,
especially if one or more fields in your data source contain numbers. If you use a
comma-delimited data source file, make sure there are no commas in the data set
other than those used as column delimiters.
Note: Although the system also treats the pound sign, equals sign, plus sign,
semicolon, and colon characters as separators, you should not use these because
like the comma their meaning is ambiguous.
Include column headers as the first row of the data source file
When you extract the source data to the data source file, you should include the
column headers as the first row in the data source file. Including the column headers
will make it easier for you to identify the data you want to use in your policies.
Detecting content using Exact Data Matching (EDM) 459
Best practices for using EDM
The column names reflect the column mappings that were created when the exact
data profile was added. If there is an unmapped column, it is called Col X, where
X is the column number (starting with 1) in the original data profile.
If the Exact Data Profile is to be used for DGM, the file must have a column with a
heading of email, or the DGM will not appear in the Directory EDM drop-down list
(at the remediation page).
If you update your data sources occasionally (for example, less than once a
month), generally there is no need to create a schedule. Index the data each
time you update the data source.
Schedule indexing for times of minimal system use. Indexing affects performance
throughout the Symantec Data Loss Prevention system, and large data sources
can take time to index.
Index a data source as soon as you add or modify the corresponding exact data
profile, and re-index the data source whenever you update it. For example,
consider a scenario whereby every Wednesday at 2:00 P.M. you generate an
updated data source file. In this case you could schedule indexing every
Wednesday at 3:00 P.M., giving you enough time to cleanse the data source
file and copy it to the Enforce Server.
Do not index data sources daily as this can degrade performance.
Monitor results and modify your indexing schedule accordingly. If performance
is good and you want more timely updates, for example, schedule more frequent
data updates and indexing.
Consider using scheduled indexing with remote EDM indexing to keep an EDM
profile up to date. For example, you can schedule a cron job on the remote machine
to run the Remote EDM Indexer on a regular basis. The job can also copy the
generated index files to the index directory on the Enforce Server. You can then
configure the Enforce Server to load the externally generated index and submit it
for indexing on a scheduled basis.
See About index scheduling on page 378.
See Scheduling Exact Data Profile indexing on page 395.
See Copying and loading remote index files to the Enforce Server on page 444.
Consider the following example. You want to create an EDM policy condition based
on an Exact Data Profile that contains the following 5 columns of indexed data:
First Name
Last Name
Social security number (SSN)
Phone Number
Email Address
If you select all 5 columns to be included in the policy, consider the possible results
based on the number of fields you require for each match.
If you choose "1 of the selected fields" to match, the policy will undoubtedly generate
a large number of false positives because the record will not be unique enough.
(Even if the condition only matches the SSN field, there may still be false positives
because there are other types of nine-digit numbers that may trigger a match.).
If you choose "2 of the selected fields" to match, the policy will still produce false
positives because there are potential worthless combinations of data: First Name
+ Last Name, Phone Number + Email Address, or First Name + Phone Number.
If you choose to match on 4 or all 5 of the column fields, you will not be able to
exclude certain data field combinations because that option is only available for
matches on 2 or 3 fields.
See Leverage exception tuples to avoid false positives on page 461.
In this example, to ensure that you generate the most accurate match, the
recommendation is that you choose "3 of the selected fields to match." In this way
you can reduce the number of false positives while using one or more exceptions
to exclude the combinations that do not present a concern, such as First Name +
Last Name + Phone Number
Whatever number of fields you choose to match, ensure that you are including the
column with the most unique data, and that you are matching at least 2-column
fields.
EDM also allows more complex rules such as looking for N of M fields, but excluding
specified tuples. For example, this type of rule definition is required to identify
incidents in violation of state data privacy laws, such as California SB 1386, which
requires a first name and last name in combination with any of the following: SSN,
bank account number, credit card number, or driver's license number.
While exception tuples can help you reduce false positives, if you are using several
exception tuples, it may be a sign your index is flawed. In this case, consider redoing
your index so you do not have to use so many excluded combinations to achieve
the desired matches.
Combine Data Identifiers with EDM rules to limit the impact of two-tier
detection
When implementing EDM policies, it is recommended that you combine Data
Identifiers (DIs) rules with the EDM condition to form compound policies. As
reference, note that all system-provided policy templates that implement EDM rules
also implement Data Identifier rules in the same policy.
Data Identifiers and EDM are both designed to protect personally identifiable
information (PII). Including Data Identifiers with your EDM rules make your policies
more robust and reusable across detection servers because unlike EDM rules Data
Identifiers are executed on the endpoint and do not require two-tier detection. Thus,
Detecting content using Exact Data Matching (EDM) 463
Best practices for using EDM
if an endpoint is off the network, the Data Identifier rules can protect PII such as
SSNs.
Data Identifier rules are also useful to use in your EDM policies while you are
gathering and preparing your confidential data for EDM indexing. For example, a
policy might contain the US SSN Data Identifier and an EDM rule for as yet
unindexed or unknown SSNs.
Include an email address field in the Exact Data Profile for profiled
DGM
You must include the appropriate fields in the Exact Data Profile to implement
profiled DGM.
See Creating the exact data source file for profiled DGM on page 384.
If you include the email address field in the Exact Data Profile for profiled DGM and
map it to the email data validator, email address will appear in the Directory EDM
drop-down list (at the remediation page).
Use profiled DGM for Network Prevent for Web identity detection
If you want to implement DGM for Network Prevent for Web, use one of the profiled
DGM conditions to implement identity matching. For example, you may want to use
identity matching to block all web traffic for a specific users. For Network Prevent
for Web, you cannot use synchronized DGM conditions for this use case.
See Creating the exact data source file for profiled DGM on page 384.
See Configuring the Sender/User based on a Profiled Directory condition
on page 678.
Chapter 21
Detecting content using
Indexed Document
Matching (IDM)
This chapter includes the following topics:
Exact file Match is based on the binary signature of the file. Detection server
See Using IDM to detect exact files on page 472. DLP Agent for Windows
Exact file contents Match is a 100% match of the extracted and normalized Detection server
file contents.
DLP Agent for Windows
See Using IDM to detect exact and partial file contents
on page 473.
Detecting content using Indexed Document Matching (IDM) 466
Introducing Indexed Document Matching (IDM)
Partial file contents Match of discrete passages of extracted and normalized Detection server
file contents.
Agent IDM The DLP Agent for Windows performs exact file and file See Agent IDM detection
contents matching locally on the endpoint. on page 466.
Server IDM The detection server performs exact file matching, exact See Server IDM detection
file contents matching, and partial file contents matching. on page 467.
Two-tier IDM The DLP Agent sends the data to the detection server for See Two-tier IDM detection
policy evaluation. on page 467.
For most IDM deployments there is no need to configure the indexer. If necessary
you can configure key settings for the indexer using the file
\SymantecDLP\Protect\config\Indexer.properties.
Note: To index documents on a SharePoint server using the Remote SMB Share
option, you must deploy the Enforce Server to a supported Windows Server
operating system host. Data Loss Prevention depends on Windows NTLM services
to mount a WebDAV server.
The server index is a binary file named DocSource.rdx. The server index supports
exact file, exact file contents, and partial file contents matching. If the document
data source is large, the server index may span multiple *.rdx files.
The endpoint index is a secure, binary file named EndpointDocSource.rdx. The
endpoint index supports exact file and exact file contents matching. The endpoint
index is always one file.
See Supported forms of matching for IDM on page 465.
To create the index entries for exact file and exact file contents matching, the system
uses the MD5 message-digest algorithm. This algorithm is a one-way hash function
that takes as input a message of arbitrary length and produces as output a 128-bit
message-digest or "fingerprint" of the input. If the message input is a text-based
document that the system can crack, such as a Microsoft Word file, the system
extracts 100% of the file contents, normalizes it by removing whitespaces,
punctuation, and formatting, and creates an MD5 hash. Otherwise, if the message
input is a file that the system cannot crack, such as an image file, small file, or
unsupported file type, the system creates an MD5 hash based on the binary
signature of the file
See Using IDM to detect exact files on page 472.
See Using IDM to detect exact and partial file contents on page 473.
In addition, for file formats the system can crack, the indexer creates hashes for
discrete sections of content or text passages. These hashes are used for partial
matching and are exclusive to the server index. The system uses a statistical
sampling method to store hashed sections of partial content so that not all extractable
text is indexed. The hash function ensures that the server index does not contain
actual document content. To keep the size of the endpoint index file small, partial
file contents hashes are not included in the endpoint index.
Table 21-3 summarizes the types of matching supported by the endpoint and server
indexes.
Detecting content using Indexed Document Matching (IDM) 471
Introducing Indexed Document Matching (IDM)
Table 21-3 Types of matching supported by the endpoint and server indexes
Binary file, custom file, A single MD5 hash based on the Exact file binary DocSource.rdx
small file, encapsulated file binary signature of the file
EndpointDocSource.rdx
Table 21-4 summarizes how IDM indexes are deployed and the logs files to check
to troubleshoot index deployment.
Text-based file format the Proprietary or non-supported If the system cannot crack the file format, you can
system cannot crack document format use IDM to detect that specific file using exact binary
matching.
Binary file GIF, MPG, AVI, CAD design, You can use IDM to detect binary file types that
JPEG files, audio/video files cannot be cracked, such as images, graphics, JPEGs,
etc.
File containing a small CAD files, Visio diagrams, and so A file containing a small amount of text will be treated
amount of text on as a binary file even if the contents are text-based
and crackable.
Encapsulated file Any file that is encapsulated when If a document data source file is encapsulated in an
indexed (even if text-based and archive file, the file contents of the subfile cannot be
crackable); for example, Microsoft extracted and only the binary signature of the file can
Word file archived in a ZIP file be fingerprinted. This does not apply to the main
document archive that contains all documents to be
indexed.
See About the document data source on page 468.
of the Indexed Document Profile. For example, consider a situation where you
index a one-page document, and that one-page document is included as part of a
100-page document. The 100-page document is considered a 100% match because
its content matches the one-page document exactly.
See About the server and agent index files on page 469.
Partial file contents matching only applies to server-based IDM indexes. For
text-based files that are crackable, in addition to creating the MD5 fingerprint for
exact file contents matching, the system uses a rolling hash algorithm to register
discrete sections or passages of content. In this case the system uses a statistical
sampling method to store hashed sections of content; not all text is hashed in the
index. The index does not contain actual document content.
Table 21-6 lists the requirements to match file contents using IDM.
Requirement Description
Crackable file format The system must be able to crack the file format and extract file content. Data Loss Prevention
supports context extraction for over 100 file types.
Natural file state To match file contents, the source file cannot be encapsulated in an archive file when the
source file is indexed. If a file in the document source is encapsulated in an archive file, the
system does not index the file contents of the encapsulated file. Any encapsulated file is
considered for exact matches only, like image files and other unsupported file formats.
Minimum amount of For exact file contents matching, the source file must contain at a minimum 50 characters of
text normalized text before the cracked content is indexed. Normalization involves the removal of
punctuation and whitespaces. A normalized character therefore is either a number or a letter.
This size is set by the min_normalized_size=50 parameter in the file
\SymantecDLP\Protect\config\Indexer.properties. If file contents is less than 50
normalized characters, the system performs an exact file match against the file binary.
For partial file contents matching, there must be at least 300 normalized characters. However,
the exact length is variable depending on the file contents and encoding.
Requirement Description
Maximum amount of The maximum size of the document that can be processed for content extraction at run-time
text is 30 MB.
If the file is over 30 MB and binary, it will match. If the file is over 30 MB and text-based content
that the system can extract, it will also match.
For example, consider a crackable file that is 50 MB. During indexing an MD5 will be created
for the entire 50 MB. During detection, the file would be truncated to 30 MB. Further, the text
would still be extracted, assuming it can be. The result would be no match since the index
contains a hash of the full 50 MB text and detection hash is only the first 30 MB
Table 21-7 Minimum document exposure settings for the IDM condition
Exact matching File contents 100% of the extracted and Microsoft Word
normalized file contents, if
See Using IDM to detect
the file is text-based and
exact and partial file
crackable
contents on page 473.
Partial (10% to 90%) File contents Discrete passages of text Microsoft Word
Automatic File Binary signature of the file, JPEG, small file, custom file,
if the file is not text-based or archived subfile
See Using IDM to detect
is not crackable
exact files on page 472.
Note: Whitelisting only applies to partial file contents matching; it does not apply to
exact file contents matching. The whitelisting file is not checked at run-time when
the system computes the MD5 hashes for exact file contents matching.
1 Identify the content you want to protect and See Using IDM to detect exact and partial file contents
collect the documents that contain this on page 473.
content.
See Using IDM to detect exact files on page 472.
2 Prepare the documents for indexing. See Preparing the document data source for indexing
on page 478.
3 Whitelist headers, footers, and boilerplate See Whitelisting file contents to exclude from partial
text. matching on page 479.
4 Create an Indexed Document Profile and See Creating and modifying Indexed Document Profiles
specify the document source. on page 482.
5 Configure any document source filters. See Filtering documents by file name on page 492.
6 Schedule indexing as necessary. See Scheduling document profile indexing on page 494.
Detecting content using Indexed Document Matching (IDM) 478
Configuring IDM profiles and policy conditions
7 Configure one ore more IDM policy conditions See Configuring the Content Matches Document Signature
or exceptions. policy condition on page 499.
8 Test and troubleshoot your IDM See Troubleshooting policies on page 357.
implementation.
1 Collect all of the documents Collect all of the documents you want to index and put them in a folder.
you want to protect.
See About the document data source on page 468.
2 Uncompress all the files you The files you index should be in their natural, uncompressed state. Check
want to index. the document collection to make sure none of the files are encapsulated in
an archive file, such as ZIP, TAR, or RAR. If a file is embedded in an archive
file, extract the source file from the archive file and remove the archive file.
See Using IDM to detect exact and partial file contents on page 473.
3 Separate the documents if To protect a large amount of content and files, create separate collections
you have more than 650,000 for each set of documents over 650,00 files in size, with all files in their
files to index. natural, uncompressed state. For example, if you have 1,000,000 documents
you want to index, separate the files by folders, one folder containing 650,000
files, and another folder containing the remaining 350,000 files.
See Create separate profiles to index large document sources on page 520.
Detecting content using Indexed Document Matching (IDM) 479
Configuring IDM profiles and policy conditions
4 Decide how you are going to The indexing process is a separate process that runs on the Enforce Server.
make the document source To index the document source you must make the files accessible to the
files available to the Enforce Enforce Server. You have several options. Decide which one works best
Server. for your needs and proceeding accordingly.
See Using the remote SMB share option to index file shares on page 488.
5 Configure the document The next step is to configure the document profile, or, alternatively, if you
profile. want to exclude specific document content from detection, whitelist it.
See Whitelisting file contents to exclude from partial matching on page 479.
1 Copy the content you want to Copy only noncritical content you want to exclude, such as standard
exclude from matching into a text boilerplate text and document headers and footers, to the text file. By
file. default, for file contents matching the file to be indexed must contain
at least 300 characters. This default setting applies to the
Whitelisted.txt file as well. For whitelisted text you can change
this default setting.
2 Save the text file as The Whitelisted.txt file is the source file for storing content you
Whitelisted.txt. want to exclude from matching.
4 Configure the Indexed When you index the document data source, the Enforce Server looks
Document Profile and generate for the Whitelisted.txt file. If the file exists, the Enforce Server
the index. copies it to Whitelisted.x.txt, where x is a unique identification
number corresponding to the Indexed Document Profile. Future
indexing of the profile uses the profile-specific Whitelisted.x.txt
file, not the generic Whitelisted.txt file.
Column Description
Add IDM profile Click Add Document Profile to create a new Indexed Document Profile.
See Configuring IDM profiles and policy conditions on page 477.
Edit IDM profile Click the name of the Document Profile, or click the pencil icon to the far right of the profile, to
modify an existing Document Profile.
Column Description
Remove IDM profile Click the red X icon next to the far right of the document profile row to delete that profile from
the system. A dialog box confirms the deletion.
Note: You cannot edit or remove a profile if another user currently modifies that profile, or if a
policy exists that depends on that profile.
Refresh IDM profile Click the refresh arrow icon at the upper right of the Indexed Documents screen to fetch the
status latest status of the indexing process. If you are in the process of indexing, the system displays
the message "Indexing is starting." The system does not automatically update the screen when
the indexing process is complete.
Column Description
Detection server The name of the detection server that indexes the Document Profile and the Document Profile
version.
Click the triangle icon beside the Document Profile name to display this information. It appears
beneath the name of the Document Profile.
Location The location of the file(s) on the Enforce Server that the system has profiled and indexed.
Documents The number of documents that the system has indexed for the document profile.
Status The current status of the document indexing process, which can be any of the following:
In addition, beneath the status of the indexing process, the system displays the status of each
detection server, which can be any of the following:
Error messages The Indexed Document screen also displays any error messages in red (for example, if the
document profile is corrupted or does not exist).
Detecting content using Indexed Document Matching (IDM) 482
Configuring IDM profiles and policy conditions
1 Navigate to the screen Manage You must be logged on to the Enforce Server administration console
> Data Profiles > Indexed as an administrator or policy author.
Documents.
See Policy authoring privileges on page 294.
2 Click Add Document Profile. Select an existing Indexed Document Profile to edit it.
3 Enter a Name for the Document Choose a name that describes the data content and the index type
Profile. (for example, "Research Docs IDM"). The name is limited to 255
characters.
4 Select the Document Source Select one of the four options for indexing the document data source,
method for indexing. depending on how large your data source is and how you have
packaged it.
5 Optionally, configure any Filters. You can specify file name and file size filters in the document profile.
The filters tell the system which files to include or ignore during
indexing.
Enter files to include in the File Name Include Filters field, or enter
files to exclude in the File Name Exclude Filters field.
Select file sizes to ignore, either Ignore Files Smaller Than or Ignore
Files Larger Than.
6 Select one of the Indexing As part of creating a document profile, you can set up a schedule for
options. indexing the document source.
You do not have to select an indexing option to create a profile that
you can reference in a policy, but you must select an indexing option
to generate the index and actually detect matches using an IDM policy.
Table 21-14 Requirements for using the Upload Document Archive to Server
Now option
Requirement Description
ZIP file only The document archive must be a ZIP file; no other encapsulation formats are supported
for this option.
50 MB or less You cannot use this option if the document archive ZIP file is more than 50 MB because
files exceeding that size limit can take too long to upload and slow the performance of the
Enforce Server. If the document archive ZIP file is over 50 MB, use the Reference Archive
on Enforce Server method instead.
UTF-8 file names only The IDM indexing process fails (and presents you with an "unexpected error") if the
document archive (ZIP file) contains non-ASCII file names in encodings other that UTF-8.
If the ZIP file contains files with non-ASCII file names, use either of the following options
instead to make the files available to the Enforce Server for indexing:
Note: If the ZIP file is less than 50 MB, you can use the Upload Document Archive
to Server Now option instead. See Uploading a document archive to the Enforce
Server on page 484.
To use the Reference Archive on Enforce Server option, you copy the ZIP file to
the \SymantecDLP\Protect\documentprofiles folder on the Enforce Server file
system host. Once you have copied the ZIP file to the Enforce Server, you can
select the document source from the pull-down menu at the Add Document Profile
screen. See Creating and modifying Indexed Document Profiles on page 482.
To reference the document archive on the Enforce Server describes the procedure
for using the Reference Archive on Enforce Server option.
To reference the document archive on the Enforce Server
1 Copy the ZIP file to the Enforce Server.
On Windows, copy the ZIP file to directory
\SymantecDLP\Protect\documentprofiles
Note: The system deletes the document data source file after the indexing
process completes.
Table 21-15 Requirements to use the option Reference Archive on Enforce Server
Requirement Description
ZIP file only The document archive must be a ZIP file; no other encapsulation formats are supported
for this option.
2 GB or less 2 GB is the maximum file size of the IDM profile. Consider using a third-party solution (such
as Secure FTP), to copy the ZIP file securely to the Enforce Server.
Subfiles not archived Make sure the subfiles are proper and not encapsulated in an archive (other than the
top-level profile archive).
UTF-8 file names only Do not use this method if any of the names of the files you are indexing contain non-ASCII
file names.
Use either of the following options instead:
Note: If the files you index include a file that is more than 2 GB in size, the system
will index all the files except the 2 GB file. This only applies to the Use Local Path
on Enforce Server option. It does not apply to the Reference Archive on Enforce
Server option.
Note: Symantec Data Loss Prevention does not delete documents after indexing
when you use the Use Remote SMB Share option.
Note: To index documents on a SharePoint server using the Remote SMB Share
option, you must deploy the Enforce Server to a supported Windows Server
operating system host. Data Loss Prevention depends on Windows NTLM services
to mount a WebDAV server.
Table 21-16 provides the procedure for remotely indexing SharePoint documents
using WebDAV
1 Enable WebDAV for See Enabling WebDAV for Microsoft IIS on page 490.
SharePoint.
2 Start the WebClient service. From the computer where the Enforce Server is installed, start the WebClient
service using the "Services" console. If this service is "disabled," right-click it
and select Properties. Enable the service, set it to Manual, then Start it.
Note: You must have administrative privileges to enable this service.
3 Access the SharePoint From the computer where your Enforce Server is installed, access SharePoint
instance. using your browser and the following address format:
http://<server_name>:port
5 Locate the documents to In SharePoint, navigate to the documents you want to scan. Often SharePoint
scan. documents are stored at the Home > Shared Documents screen. Your
documents may be stored in a different location.
Detecting content using Indexed Document Matching (IDM) 490
Configuring IDM profiles and policy conditions
6 Find the UNC path for the In SharePoint for the documents you want to scan, select the option Library
documents. > Open with Explorer. Windows Explorer should open a window and display
the documents. Look in the Address field for the path to the documents. This
address is the UNC path you need to scan the documents remotely. For
example: \\protect-x64\Shared Documents. Copy this path to the
Clipboard or a text file.
7 Create the IDM Index. See Creating and modifying Indexed Document Profiles on page 482.
9 Verify success. At the Manage > Data Profiles > Indexed Documents screen you should see
that the index was successfully created. Check the "Status" and the number
of documents indexed. If the index was successfully created you can now use
it to create IDM policies.
Filter Description
File Name Include Filters If the File Name Include Filters field is empty, matching is performed on all documents
in the document profile. If you enter anything in the File Name Include Filters field, it is
treated as an inclusion filter. In this case the document is indexed only if it matches the
filter you specify.
For example, if you enter *.docx in the File Name Include Filters field, the system will
index only the *.docx files in the document source.
File Name Exclude Filters The Exclude Filters field lets you specify the documents to exclude in the matching
process.
If you leave the Exclude Filters field empty, the system performs matching on all
documents in the ZIP file or file share. If you enter any values in the field, the system
scans only those documents that do not match the filter.
The system treats forward slashes (/) and backslashes (\) as equivalent. The system
ignores whitespace at the beginning or end of the pattern. File name filtering does
not support escape characters, so you cannot match on literal question marks,
commas, or asterisks.
Table 21-18 describes the syntax accepted by the File Name Filters feature. The
syntax for the Include and Exclude filters is the same.
Operator Description
Table 21-19 provides sample filters and descriptions of behavior if you enter them
in the File Name Include Filters field:
*.txt,*.docx The system indexes only .txt and .docx files in the ZIP file or file share, ignoring
everything else.
?????.docx The system indexes files with the .docx extension and files with five-character
names, such as hello.docx and stats.docx, but not good.docx or
marketing.docx.
*/documentation/*,*/specs/* The system indexes only files in two subdirectories below the root directory, one
called "documentation" and the other called "specs."
Example with wildcards and IDM indexing fails or ignores the filter setting if the File Name Includes / Excludes
sub-directories: filter string starts with an alphanumeric character and includes a wildcard, for
example: l*.txt. The workaround is to configure the include/exclude filter with
*\scan_dir\l*.txt
the filter string as indicated in this example, that is, *\scan_dir\l*.txt.
For example, the filter 1*.txt does not work for a file path
\\dlp.symantec.com\scan_dir\lincoln-LyceumAddress.txt. However,
if the filter is configured as *\scan_dir\l*.txt, the indexer will acknowledge
the filter and index the file.
Filter Description
Ignore Files Smaller Than To exclude files smaller than a particular size:
Enter a number in the field for Ignore Files Smaller Than.
Select the appropriate unit of measure Bytes, KB (kilobytes), or MB (megabytes)
from the drop-down list.
For example, to prevent indexing of files smaller than one kilobyte (1 KB), enter 1 in
the field and select KB from the corresponding drop-down list.
Ignore Files Larger Than To exclude files larger than a particular size:
For example, to prevent indexing of files larger than two megabytes (2 MB), enter 2
in the field and select MB from the corresponding drop-down list.
Note: The Enforce Server can index only one document profile at a time. If one
indexing process is scheduled to start while another indexing process is running,
the new process does not begin until the first process completes.
Parameter Description
Index Once On Enter the date to index the document profile in the format MM/DD/YY. You can also click
the date widget and select a date.
Until Select this check box to specify a date in the format MM/DD/YY when the indexing
should stop. You can also click the date widget and select a date.
Detecting content using Indexed Document Matching (IDM) 495
Configuring IDM profiles and policy conditions
Parameter Description
Index Weekly Day of the week Select the day(s) to index the document.
At Select the hour to start indexing.
Until Select this check box to specify a date in the format MM/DD/YY when the indexing
should stop. You can also click the date widget and select a date.
Index Monthly Day Enter the number of the day of each month you want the indexing to occur. The number
must be 1 through 28.
Until Select this check box to specify a date in the format MM/DD/YY when the indexing
should stop. You can also click the date widget and select a date.
low_threshold_k=50
Detecting content using Indexed Document Matching (IDM) 496
Configuring IDM profiles and policy conditions
4 Change the numerical portion of the parameter value to reflect the wanted
minimum number of characters that are allowed in Whitelisted.txt.
For example, to change the minimum to 30 characters, modify the value to
look like the following:
low_threshold_k=30
The value for this parameter must match the min_normalized_size value.
The default for min_normalized_size is 50.
5 Save the file.
In addition, the maximum size that can be processed for content extraction at
run-time is 30 MB and is set by the max_bin_match_size=30000000 parameter.
Increasing this number is not recommended.
1 Upgrade Data Loss You must upgrade the Enforce Server and Endpoint Servers to version
Prevention to version 14.0. 14.0.
2 Reindex existing IDM profiles. To use Agent IDM you must update each Indexed Document Profiles so
that the endpoint index is generated.
Table 21-22 Using Agent IDM after upgrade to version 14.0 (continued)
3 Upgrade DLP Agent to To use exact match IDM on the endpoint you must upgrade the DLP Agent
version 14.0. to version 14.0.
4 Enable Agent IDM. Agent IDM is disabled for an Endpoint Server upgraded to version 14.0.
To use Agent IDM you must enable it.
5 Apply the configuration to Apply the agent configuration settings to DLP Agents.
DLP Agents.
See Applying agent configurations to an agent group on page 1433.
Once the configuration is applied, the DLP Agent will download the endpoint
index from the Endpoint Server the next time the agent connects.
5 Test IDM policies. It is recommended that you test your IDM policies after you have upgraded
the system and updated the IDM profiles.
See To turn two-tier detection on or off on page 498. provides steps for enabling
and disabling exact match IDM on the endpoint.
To turn two-tier detection on or off
1 Log on to the Enforce Server administration console.
2 Navigate to System > Agents > Agent Configuration.
3 Select the applicable agent configuration.
4 Select the Advanced Agent Settings tab.
5 Locate the Detection.TWO_TIER_IDM_ENABLED.str parameter.
6 Change the value to either "ON" or "OFF" (case insensitive) depending on your
requirements.
See Table 21-23 on page 498.
7 Click Save at the top of the page to save the changes.
8 Apply the agent configuration to the agent group or groups.
See Applying agent configurations to an agent group on page 1433.
Table 21-23 Advanced agent settings for exact match IDM on the endpoint
Number of files indexed Total Memory (KB) Memory per file (bytes)
10000 956 97
When the same number of files are indexed and the endpoint index is deployed to
a 64-bit DLP Agent for Windows, there is different memory consumption on the
endpoint than for 32-bit DLP Agents. This difference has to do with the way memory
is used on 32-bit systems versus 64-bit systems. The memory usage on 64-bit
systems is not exactly double that of 32-bit systems because of the way the index
is stored.
Number of files indexed Total Memory (KB) Memory per file (bytes)
Action Description
Choose a percentage between 10% and 90% to match document contents partially.
Select the components to Select one of the available message components to match on:
Match On.
Body The content of the message.
Attachments Any files that are attached to or transferred by the message.
Configure additional Select this option to create a compound condition. All conditions must be met to trigger or
conditions to Also Match. except a match.
You can Add any available condition from the drop-down menu.
Test and tune the policy. See Test and tune policies to improve match accuracy on page 365.
See Use parallel IDM rules to tune match thresholds on page 521.
Feature Description
Feature Description
Note: The Indexer includes both the Remote IDM Indexer and the Remote
EDM Indexer. See the Symantec Data Loss Prevention Administration Guide
for details on using the Remote EDM Indexer.
Platform Installer
Linux ProtectInstaller64_14.0.sh
Windows ProtectInstaller64_14.0.exe
Detecting content using Indexed Document Matching (IDM) 503
Remote IDM indexing
GUI RemoteIDMIndexerUI.exe
Indexing the document data source using the GUI edition (Windows
only)
To configure the UI edition of the Remote IDM Indexer, you enter the parameters
into the required fields. Optionally you can provide additional parameters, such as
a whitelist file for filters.
On successful completion of indexing, the preindex file (*.prdx) is generated. You
move this file to the Enforce Server to complete the indexing process.
Figure 21-1 shows the GUI edition of the Remote IDM Indexer.
Table 21-30 provides instructions for configuring the GUI edition of the Remote
IDM Indexer.
Detecting content using Indexed Document Matching (IDM) 504
Remote IDM indexing
Table 21-30 Configuring the Remote IDM Indexer using the GUI edition
1 Enter the Source URI path. The source URI is the local file path (directory folder) where the files to be
indexed are stored, or a shared file system path accessible by the host.
If the document data source requires credentials you provide them in the
URI Credentials section.
2 Enter the Output File Specify the file path and name for the preindex file that the tool will generate.
name.
Include the *.prdx file extension when specifying the output file name.
3 Optionally, enter the Specify the file path to the whitelist.txt file.
Whitelist File path.
Text in the whitelist file is ignored during detection for server-based partial
matching.
See the Symantec Data Loss Prevention Administration Guide for details on
whitelisting.
4 Optionally, enter one or Enter one or more file names to include for indexing or to exclude for indexing.
more File Name Filters.
The File Name Include Filter includes the named files for indexing.
The File Name Exclude Filter excludes the named files from indexing.
The format for the include and exclude filters accepts both comma-separated
and newline-separated values.
If you use a filter, use one type but not both. For example, if you choose to
use a file name include filter, do not also provide a file name exclude filter.
See the Symantec Data Loss Prevention Administration Guide for details on
whitelisting.
5 Optionally, enter a File Size If you choose Ignore Files Smaller Than, files under the specified size are
Filter. not indexed.
If you choose Ignore Files Larger Than, files over the specified size are not
indexed.
See the Symantec Data Loss Prevention Administration Guide for details.
6 Click Run to index the data When you click Run the indexing process begins.
source immediately.
Alternatively, you can click Schedule to schedule indexing. The tool opens
the Windows Task Utility.
Table 21-30 Configuring the Remote IDM Indexer using the GUI edition
(continued)
7 Enter the Password for the For security purposes you must provide a password for the preindex file.
preindex file.
The password must meet the one of the following requirements:
The password you enter here will be required to load the preindex into the
Enforce Server for indexing
8 Verify indexing Progress. When you click Run, the status bar shows the scanning completion
percentage.
Current File: The name of the file that is currently being indexed.
Caution: If you run the tool from the command line with arguments, those arguments
will overwrite the parameters in the properties file.
Table 21-33 lists and describes required parameters for running the Remote IDM
Indexer from the command line.
Detecting content using Indexed Document Matching (IDM) 507
Remote IDM indexing
Note: Refer to the Symantec Data Loss Prevention Administration Guide for details
on preparing the document data source for indexing.
param.out= This parameter is the file path and name of the preindex
file that the tool will generate.
Table 21-34 lists and describes optional parameters for running the Remote IDM
Indexer from the command line.
Note: Refer to the Symantec Data Loss Prevention Administration Guide for details
on using whitelisting and on using file type and file size filters.
param.whitelist= This parameter is the full file path (including the name) to
the whitelist.txt file. The whitelist file must be local
to the Remote IDM Indexer.
param.min_filesize_bytes= This parameter is the minimum file size filter. File sizes
under the specified size will not be indexed
param.max_filesize_bytes= This parameter is the maximum file size filter. File sizes
over the specified size are not indexed
Detecting content using Indexed Document Matching (IDM) 508
Remote IDM indexing
Caution: If you run the tool from the command line with arguments, those arguments
will overwrite the parameters in the properties file.
Table 21-33 lists and describes required parameters for running the Remote IDM
Indexer from the command line.
Note: Refer to the Symantec Data Loss Prevention Administration Guide for details
on preparing the document data source for indexing.
-out This parameter is the file path and name of the preindex
file that the tool will generate.
Table 21-34 lists and describes optional parameters for running the Remote IDM
Indexer from the command line.
Note: Refer to the Symantec Data Loss Prevention Administration Guide for details
on using whitelisting and on using file type and file size filters.
Detecting content using Indexed Document Matching (IDM) 509
Remote IDM indexing
-min_filesize_bytes This parameter is the minimum file size filter. Files under
the specified size are not indexed.
-max_filesize_bytes This parameter is the maximum file size filter. Files over
the specified size are not indexed.
If you are using the Windows GUI version of the Remote IDM Indexer, you can
schedule or edit a task directly from the tool. The following screen shots illustrate
the process.
See To schedule indexing using the Windows GUI version of the tool on page 511.
See To edit an existing scheduled task using the Windows GUI version of the tool
on page 512.
Detecting content using Indexed Document Matching (IDM) 510
Remote IDM indexing
Incremental indexing
You can incrementally index a remote data source by specifying an existing preindex
file (*.prdx) in the command line argument when you run the tool.
In the GUI version of the tool you can browse to and select an existing *.prdx file
for the Output File path.
The indexing process will append newly indexed files and file contents to the existing
preindex entries.
The tool compares the last modified date of the file. If the file has been modified
after the file that was pre-indexed, the tool will update the pre-index with the changes
that were made to the file. If the file modified date is the same, the pre-index is not
updated. If you change any include, exclude, or size filters in your existing preindex
file, those filters will be applied to any previously indexed files. For example, for a
remote data source with 10 .docx files and 10 .pptx files, if your first remote
indexing job has no filters, all files will be indexed. If you add an exclude filter for
.docx files (-exclude_filter=*.docx) and run the indexing job again, the .docx
files will be removed from the index and only the .pptx files will remain.
The log presents error messages that indicate if file access was denied and if file
indexing failed.
You can use FTP or FTP/S to copy the *.prdx file to the Enforce Server host file
system.
Note: If you have not copied the preindex file to the proper directory on the Enforce
Server host (\SymantecDLP\Protect\config\documentprofiles), the file does
not appear in the drop-down field for selection.
indexed documents exactly based on their binary stamp, including not only
text-based documents but also graphics and media files
Because of the broad range of matching supported by IDM, you should consider
the best practices in this section to implement IDM policies that accurately match
the data you want to protect.
Table 21-35 summarizes the IDM considerations discussed in this section, with
links to individual topics for each.
Consideration Description
Reindex IDM profiles after upgrade. See Reindex IDM profiles after major upgrade
on page 515.
Do not compress documents whose content you want to See Do not compress files in the document source
fingerprint. on page 515.
Do not use IDM solely to protect binary files. See Avoid using IDM solely for binary files on page 516.
Do not index text-based documents without content. See Do not index empty documents on page 516.
Use exact matching IDM on the endpoint instead of two-tier See Prefer exact match over two-tier detection on the
detection wherever possible. endpoint on page 517.
Be aware of the limitations of exact matching. See Understand limitations of exact matching on page 517.
Use whitelisting to exclude partial file contents from See Use whitelisting to exclude non-sensitive content
matching and reduce false positives. from partial matching on page 518.
Filter non-critical documents from indexing to reduce false See Filter documents from indexing to reduce false
positives. positives on page 519.
Use IDM as an exception to exclude files from exact See Distinguish IDM exceptions from whitelisting and
matching. filtering on page 519.
Create more than one profile to index more than 650,000 See Create separate profiles to index large document
of documents. sources on page 520.
Use remote indexing for large document sets. See Use WebDAV or CIFS to index remote document
data sources on page 520.
Use scheduled indexing to automate profile updates. See Use scheduled indexing to keep profiles up to date
on page 521.
Use multiple IDM rules in parallel to establish and tune See Use parallel IDM rules to tune match thresholds
match thresholds. on page 521.
Detecting content using Indexed Document Matching (IDM) 515
Best practices for using IDM
Consideration Description
Use VML with exact match agent IDM on the endpoint. See Use agent IDM with VML for partial match validation
on page 522.
the Enforce Server for indexing contains one or more embedded archive files (such
as a ZIP), the system performs an exact binary match on any file contained in the
embedded archive file
See Creating and modifying Indexed Document Profiles on page 482.
Note: This behavior has not been observed with XLSX files; that is, false positives
do not get created if the blank files are different.
See Using IDM to detect exact and partial file contents on page 473.
Detecting content using Indexed Document Matching (IDM) 517
Best practices for using IDM
For some applications the Windows Print operation may alter the file data such
that extracted file contents will not match exactly. Known file types that are
affected by this include Microsoft Office documents.
Table 1 lists some known limitations with exact content matching. This list is not
exhaustive and there may be other file formats that change on resave.
Note: Whitelisting does not apply to exact file or exact file contents matching.
Note: Whitelisting is not available for exact file or file contents matching; it is only
available for partial content matching.
Detecting content using Indexed Document Matching (IDM) 520
Best practices for using IDM
IDM Use
Configuration
See Use whitelisting to exclude non-sensitive content from partial matching on page 518.
See Filter documents from indexing to reduce false positives on page 519.
A document might contain much more content, but Symantec Data Loss Prevention
protects only the content that is indexed as part of a document profile. For example,
consider a situation where you index a one-page document, and that one-page
document is included as part of a 100-page document. The 100-page document is
considered a 100 percent match because its content matches the one-page
document exactly. In addition, the matched document does not have to be of the
same file type or format as the indexed document. For example, if you index a Word
document as part of a document profile, and its contents are pasted into the body
of an email message or used to create a PDF, the engine considers it a match
A rule-of-thumb for setting the Minimum Document Exposure setting is 60%.
Minimum Document Exposures set to less than 50% typically create many false
positives. Starting with rate of 60% should give you enough information to determine
whether you should go to a higher or lower match percentage without creating
excessive false positives
As an alternative, consider taking a tiered approach to establishing Minimum
Document Exposure settings. For example, you can create multiple IDM rules, each
with a different threshold percentage, such as 80% for documents with a high match
percentage, 50% for documents with a medium match percentage, and 10% with
a low match percentage. Using this approach will help you filter out false positives
and help you establish an accurate Minimum Document Exposure setting for each
IDM index you deploy as part of your policies.
false positives for explicit pre-release data that is not sensitive. VML may work well
here because you can train against the content that causes the false positives and
create an exception to ignore those features. Refer to the VML documentation for
details.
Chapter 22
Detecting content using
Vector Machine Learning
(VML)
This chapter includes the following topics:
representative of the type of content you want to protect. And, you must select good
examples of content you want to ignore that are closely related to the content you
want to protect.
See Configuring VML profiles and policy conditions on page 528.
The following table summarizes the baseline requirements for the content you
collect for VML profile training.
Minimum: 50
documents 30 MB per upload
Single, specific Text-based
business use case (primarily) No size limit per
Negative Approximately the Content you do
category.
same amount as not want to protect
the positive yet thematically
category. related to the
positive category.
Base False Positive Rate The percentage of the content in the negative training set that is statistically similar to the
(%) positive content.
Detecting content using Vector Machine Learning (VML) 527
Introducing Vector Machine Learning (VML)
Base False Negative The percentage of the content in the positive training set that is statistically similar to
Rate (%) negative content.
Similarity Description
Similarity Threshold The Similarity Threshold is a configurable parameter between 0 and 10 that is unique to each
VML profile. The default setting is 10, which requires the most similar match between the VML
profile features and the detected message content. As such, this setting is likely to produce
fewer incidents. A setting of 0 produces the most number of matches, many of which are likely
to be false positives.
Similarity Description
Similarity Score The Similarity Score is a read-only runtime statistic between 0 and 10 reported by the system
based on the detection results of a VML policy. To report an incident, the Similarity Score must
be higher than the Similarity Threshold, otherwise the VML policy does not report a match.
Discover Server Discover scanning does not begin until all policy dependencies are loaded. As such, a
Discover scan based on a VML policy will not start until the referenced VML profile is
accepted. In this case the system displays a message in the Discover scanning interface
indicating the scan is waiting on the dependency to load.
Network and Endpoint For a simple rule, or compound rule where the conditions are ANDed, the entire rule
Servers fails because the VML condition cannot match. If this is the only rule in the policy, the
policy will not work.
For a policy where there are multiple rules that are ORed, only the VML rule fails; the
other rules in the policy are evaluated.
Step 1 Collect the example documents for Collect a representative amount of example documents containing
training the system. positive content you want to protect and negative content you want
to ignore.
Step 2 Create a new VML profile. Define a new VML profile based on the specific business category
of data from which you have derived your positive and negative
training sets.
Step 3 Upload the example documents. Upload separately to the Enforce Server the example positive and
negative training sets.
Step 4 Train the VML profile. Train the system to learn the type of content you want to protect
and generate the VML profile.
Step 5 Accept or reject the trained profile. Accept the trained profile to deploy it. Or, reject the profile, update
one or both of the training sets (by adding or removing example
documents), and restart the training process.
Step 6 Create a VML policy and test Create a VML policy that references the VML profile.
detection.
See Configuring the Detect using Vector Machine Learning Profile
condition on page 540.
Step 7 Tune the VML profile. Adjust the Similarity Threshold setting as necessary to optimize
detection results.
Step 8 Follow VML best practices. See Best practices for using VML on page 547.
Detecting content using Vector Machine Learning (VML) 530
Configuring VML profiles and policy conditions
Note: You must have Enforce Server administrator privileges to create VML profiles.
This version is an editable version of the VML profile. This version has not been
trained, or accepted, or both; it cannot be deployed to a policy.
Initially, when you create a new VML profile, the system displays only the Current
Profile tab with an empty training set. After you train and accept the VML profile
for the first time, the Trained Set table in the Current Profile tab becomes populated
with details about the training set. The information that is displayed in this table and
tab is read-only.
To edit a VML profile
Click Manage Profile to the far right of the Current Profile tab.
The system displays the editable version of the profile in the Temporary
Workspace tab. You can now proceed with training and managing the profile.
See Training VML profiles on page 533.
The Temporary Workspace tab remains present in the user interface until you
train and accept a new version of the VML profile. In other words, there is no way
to close the Temporary Workspace tab without training and accepting, even if you
made no changes to the profile.
Once you accept a new version of the VML profile, the system overwrites the
previous Current Profile with the newly accepted version. You cannot revert to a
previously accepted Current Profile. However, you can revert to previous versions
of the training set for a Temporary Profile.
See Managing training set documents on page 536.
Note: While you can upload individual documents, it is recommended that you
upload a document archive (such as ZIP, RAR, or TAR) that contains the
recommended (250) or minimum (50) number of example documents. The maximum
upload size is 30 MB. You can partition the documents across archives if you have
more than 30 MB of data to upload. See About the content you train on page 525.
Detecting content using Vector Machine Learning (VML) 532
Configuring VML profiles and policy conditions
9 Click Upload Contents to repeat the process for the other training set.
The profile is not complete and cannot be trained until you have uploaded the
minimum number of positive and negative example documents.
See Table 22-1 on page 526.
10 Once you have successfully uploaded both training sets you are ready to train
the VML profile .
See Training VML profiles on page 533.
Step 1 Enable training mode. Select the VML profile you want to train from the Manage > Data Profiles >
Vector Machine Learning screen. Or, create a new VML profile.
Click Manage Profile to the far right of the Current Profile tab. The system
displays the profile for training in the Temporary Workspace tab.
See Working with the Current Profile and Temporary Workspace tabs
on page 530.
Step 2 Upload the training Familiarize yourself with the training set requirements and recommendations.
content.
See About the content you train on page 525.
Upload the positive and negative training sets in separate document archives to
the Enforce Server.
Step 3 Adjust the memory The default value is "High" which generally results in the best training set accuracy
allocation (only if rates. Typically you do not need to change this setting. For some situations you
necessary). may want to choose a "Medium" or "Low" memory setting (for example, deploying
the profile to the endpoint).
Step 4 Start the training Click Start Training to begin the profile training process.
process. During the training process, the system:
Step 5 Verify training When the training process completes, the system indicates if the training profile
completion. was successfully created.
If the training process failed, the system displays an error. Check the debug log
files and restart the training process.
Note: If you previously accepted the profile, the system also displays the Current
Profile statistics for side-by-side comparison.
Detecting content using Vector Machine Learning (VML) 535
Configuring VML profiles and policy conditions
Step 6 Accept or reject the If the training process is successful, the system prompts you to accept or reject
training profile. the training profile. Your decision is based on the Accuracy Rate from Training
percentages.
See About the base accuracy from training percentage rates on page 526.
To accept or reject the training profile:
Click Accept to save the training results as the active Current Profile.
Once you accept the training profile, it appears in the Current Profile tab
and the Temporary Workspace tab is removed.
Click Reject to discard the training results.
The profile remains in the Temporary Workspace tab for editing. You can
adjust one or both of the training sets by adding or removing documents and
retraining the profile.
See Managing training set documents on page 536.
Note: A trained VML profile is not active until you accept it. While the system
lets you create a policy based on a VML profile that has not been trained or
accepted, the VML profile is not deployed to that policy until the profile is accepted.
See About using unaccepted VML profiles in policies on page 528.
Step 7 Test and tune the Once you have successfully trained and accepted the VML profile, you can now
profile. use it to define policy rules and tune the VML profile.
See Configuring the Detect using Vector Machine Learning Profile condition
on page 540.
See About the Similarity Threshold and Similarity Score on page 527.
Note: For more information, refer to the Symantec Data Loss Prevention Vector
Machine Learning Best Practices Guide, available at the DLP Knowledgebase
(https://kb-vontu.altiris.com/), article number 54340.
Note: You must have Enforce Server administrator privileges to manage and create
VML profiles.
Detecting content using Vector Machine Learning (VML) 538
Configuring VML profiles and policy conditions
Action Description
View and sort The system lists all existing VML profiles and their state at the Vector
profiles. Machine Learning screen.
Click the column header to sort the VML profiles by name or status.
Manage and train Select a VML profile from the list to display and manage it.
profiles.
The Current Profile tab displays the active profile.
See Working with the Current Profile and Temporary Workspace tabs
on page 530.
Monitor profiles. The system lists and describes the status of all VML profiles.
Memory Required (KB)
The minimum amount of memory required to load the profile in
memory for detection.
See Adjusting memory allocation on page 535.
Status
The present status of the profile.
See Table 22-7 on page 539.
Deployment Status
The historical status of the profile.
See Table 22-8 on page 539.
Remove profiles. Click the X icon at the far right to delete an existing profile.
If you delete an existing profile, the system removes the profile metadata
and the Training Set from the Enforce Server.
The Status field displays the current state of each VML profile.
Detecting content using Vector Machine Learning (VML) 539
Configuring VML profiles and policy conditions
The Deployment Status field indicates if the VML profile has ever been accepted
or not.
Accepted on <date> The VML profile was accepted on the date indicated.
Note: You do not have to retrain a profile if you change the name or description.
Detecting content using Vector Machine Learning (VML) 540
Configuring VML profiles and policy conditions
Step 1 Create and train the VML See Creating new VML profiles on page 530.
profile.
See Training VML profiles on page 533.
Step 3 Add the VML rule to the policy. From the Configure Policy screen:
Step 4 Configure the VML detection Name the rule and configure the rule severity.
rule.
See Configuring policy rules on page 334.
Detecting content using Vector Machine Learning (VML) 541
Configuring VML profiles and policy conditions
Step 5 Select components to match Select one or both message components to Match On:
on.
Body, which is the content of the message
Attachments, which are any files transported by the message
Note: On the endpoint, the Symantec DLP Agent matches on the entire
message, not individual message components.
Step 6 Configure additional conditions Optionally, you can create a compound detection rule by adding more
(optional). conditions to the rule.
Step 7 Save the policy configuration. Click OK then click Save to save the policy.
Step 1 Create and train the VML profile. See Creating new VML profiles on page 530.
Step 3 Add a VML exception to the From the Configure Policy screen:
policy.
Select Add Exception.
Select the Detect using Vector Machine Learning profile exception
from the list of content exceptions.
Select the VML profile you want to use from the drop-down menu.
Click Next.
Detecting content using Vector Machine Learning (VML) 542
Configuring VML profiles and policy conditions
Entire Message
Select this option to compare the exception against the entire
message. If an exception is found anywhere in the message, the
exception is triggered and no matching occurs.
Matched Components Only
Select this option to match the exception against the same
component as the rule. For example, if the rule matches on the Body
and the exception occurs in an attachment, the exception is not
triggered.
Step 5 Configure the condition. Generally you can accept the default condition settings for policy
exceptions.
Step 6 Save the policy configuration. Click OK then click Save to save the policy.
Note: You do not have to retrain the VML profile after you adjust the Similarity
Threshold, unless you modify a training set based on testing results.
Step 1 Train the VML profile. Follow the recommendations set forth in this guide for defining the category and
uploading the training set documents. Adjust the memory allocation before you
train the profile. Refer to the Symantec Data Loss Prevention Administration Guide
for help performing the tasks involved.
Step 2 Set the Similarity The default Similarity Threshold is 10. At this value the system does not generate
Threshold to 0. any incidents. A setting of 0 produces the most amount of incidents, many of which
are likely to be false positives. The purpose of setting the value to 0 is to see the
entire range of potential matches and to tune the profile to be just above the highest
false positive score.
Step 3 Create a VML policy. Create a policy that references the VML profile you want to tune. The profile must
be accepted to be deployable to a policy.
Detecting content using Vector Machine Learning (VML) 544
Configuring VML profiles and policy conditions
Step 4 Test the policy. Test the VML policy using a corpus of test data. For example, you can use the
DLP_Wikipedia_sample.zip file to test your VML policies against. Create
some mechanism to detect incidents, such as a Discover scan target of a local
file folder where you place the test data, or a DLP Agent scan of a copy/paste
operation.
Step 5 Review any incidents. Review any matches at the Incident Snapshot screen. Verify a relatively low
Similarity Score for each match. A relatively low Similarity Score indicates a false
positive. If one or more test documents produce a match with a relatively high
Similarity Score, you have a training set quality issue. In this case you need to
review the content and if appropriate add the document(s) to the positive training
set. You then need to retrain and retune the profile.
See Log files for troubleshooting VML training and policy detection on page 546.
Step 6 Adjust the Similarity By reviewing the incidents you should now be able to determine the highest
Threshold. Similarity Score among the detected false positives that you have tested the profile
against. At this point you can adjust the Similarity Threshold for the profile to be
just above the highest Similarity Score for the false positives.
For example, if the highest detected false positive has a Similarity Score of 4.5,
set the Similarity Threshold to 4.6. This will filter the known false positives from
being reported as incidents.
Manager.properties Property file for the Enforce Server; contains 1 VML setting.
The following table lists and describes the VML training parameters available for
configuration in properties file MLDTraining.properties.
Parameter Description
Lowering this value can help reduce the size of the profile.
However, adjusting this setting is not recommended.
Instead, use the memory allocation setting to tune the size
of the profile.
Parameter Description
Parameter Description
machinelearning_training.log Records the accuracy from training percentage rates for each fold of the
evaluation process for each VML profile training run.
This log file is useful for examining the quality of each training set at a granular,
per-fold level.
This log file is useful for examining all messages or documents evaluated by
VML policies, including positive matches with similarity percentages beneath
the Similarity Threshold, or messages the system has categorized as negative
(expressed as a negative "distance" number).
machinelearning_training_native_manager.log Records the total number of features modeled and the number of features
kept to generate the profile for each training run.
The total number of features modeled versus the number of features kept for
the profile depends on the memory allocation setting:
Recommended Use VML to protect unstructured, text-based content. Do not use VML to protect graphics, binary
uses for VML data, or personally identifiable information (PII).
Category of content Define the VML profile based on a single category of content that you want to protect and that
is derived from a specific business use case. Narrowly defined categories are better than broadly
defined ones.
Positive training set Archive and upload the recommended (250) number of example documents for the positive
training set, or at least the minimum (50).
Negative training Archive and upload the example documents for the negative training set. Ideally the negative
set training set contains a similar number of well-categorized documents as the positive training set.
In addition, add some documents containing generic or neutral content to your negative training
set.
Profile sizing Consider adjusting the memory allocation to low. Internal testing has shown that setting the
memory allocation to low may improve accuracy in certain cases.
Training set quality Reject the training result and adjust the example documents if either of the base accuracy rates
from training are more than 5%.
Profile tuning Tune the VML profile by performing negative testing using a corpus of testable data.
Profile deployment Remove accepted profiles not in use by policies to reduce detection server load. Tune the
Similarity Threshold before deploying a profile into production across all endpoints to avoid
network overhead.
for protecting sensitive content that you cannot adequately describe and achieve
high matching accuracy.
The following table summarizes the recommended uses cases for VML.
It is not possible or practical Often collecting all of the content you want to protect for fingerprinting is an impossible
to fingerprint all the data you task. This situation arises for many forms of unstructured data: marketing materials,
want to protect. financial documents, patient records, product formulas, source code, and so forth.
VML works well for this situation because you do not have to collect all of the content
you want to protect, only a smaller set of example documents.
You cannot adequately Often describing the data you want to protect is difficult without sacrificing some
describe the data you want to accuracy. This situation may arise when you have long keyword lists that are hard to
protect. generate, tune, and maintain.
VML works well in these situations because it automatically models the features
(keywords) you want to protect, and lets you easily manage and update the source
content.
A policy reports frequent false Sometimes a certain category of information is a constant source of false positives.
positives. For example, a weekly sales report may consistently produce false positives for a Data
Identifier policy looking for social security numbers.
VML may work well here because you can train against the content that causes the
false positives and create a policy exception to ignore those features.
Note: The false positive contents must belong to a well-defined category for VML to
be an effective solution for this use case. See Recommendations for training set
definition on page 550.
Protect personally identifiable Exact Data Matching (EDM) and Data Identifiers are the best option for protecting the
information (PII). common types of PII.
Detecting content using Vector Machine Learning (VML) 550
Best practices for using VML
Protect binary files and Indexed Document Matching (IDM) is the best option to protect content that is largely
images. binary, such as image files or CAD files.
Note: While a completely generic negative training set is not recommended, seeding
the negative training set with some neutral-content documents does have value.
See Guidelines for training set sizing on page 551.
The following table provides some example categories and possible positive and
negative training sets comprising those categories.
Product Source Code Proprietary product source code Source code from open source
projects
Quarterly Earnings Pre-release earnings; sales estimates; Details of published annual accounts
accounting documents
Detecting content using Vector Machine Learning (VML) 551
Best practices for using VML
Mergers and Acquisitions Confidential legal documents; M&A Publicly available materials; press
documents releases
document threshold and equal the number of negative documents. Note that you
should use this technique for development and testing purposes only. Production
profiles should be trained against at least the minimum number of documents for
both training sets.
The table below lists the optimal, recommended, and minimum number of documents
to include in each training set.
Note: These training set guidelines assume an average document size of 3 KB. If
you have larger-sized documents, fewer in number may be sufficient.
allocation setting, the more in-depth the feature extraction and the plotting of the
model, and the larger the profile. In general, for server-based policy detection, the
recommended memory allocation setting is high, which is the default setting.
On the endpoint, the VML profile is deployed to the host computer and loaded into
memory by the DLP Agent. (Unlike EDM and IDM, VML does not rely on two-tier
detection for endpoint policies.) Because memory on the endpoint is limited, the
recommendation is to allocate low or medium memory for endpoint policies. Internal
testing has shown that reducing the memory allocation does not reduce the accuracy
of the profile and may improve accuracy in certain situations.
Note: You can use the log file machinelearning_training.log to evaluate per-fold
training accuracy rates.
See Log files for troubleshooting VML training and policy detection on page 546.
Fold evaluation Per fold category accuracy rates and cross-fold averages
Fold evaluation Per fold category accuracy rates and cross-fold averages
Cross-fold Avg False Positive Rate 1.214855808019638 Avg False Negative Rate
1.0730373203754424
medium, and narrowso you can fine-tune your detection results. Data identifiers
offer broad support for detecting international content.
If a system-defined data identifier does not meet your needs, you can modify it.
You can also define your own custom data identifiers to detect any content that you
can describe.
See System-defined data identifiers on page 557.
See Selecting a data identifier breadth on page 570.
Category Description
Personal Identity Detect various types of identification numbers for the regions of North America, Europe, and
Asia Pacific.
Financial Detect financial identification numbers, such as credit card numbers and ABA routing numbers.
See Table 23-2 on page 558. lists system-defined data identifiers for the Asia Pacific
region.
Australian Tax File Number See Australian Tax File Number data identifier
on page 720.
South Korean Resident Registration Number See South Korea Resident Registration Number data
identifier on page 756.
See Table 23-3 on page 558. lists system-defined data identifiers for the European
region.
UK National Health Service (NHS) Number See UK National Health Service (NHS) Number data
identifier on page 764.
UK Electoral Roll Number See UK Electoral Roll Number data identifier on page 763.
French INSEE Code See French INSEE Code data identifier on page 741.
Detecting content using data identifiers 559
Introducing data identifiers
Swiss AHV Number See Swiss AHV Number data identifier on page 760.
Table 23-4 lists system-defined data identifiers for the North American region.
Randomized US Social Security Number (SSN) See Randomized US Social Security Number (SSN) data
identifier on page 754.
US Social Security Number (SSN) See US Social Security Number (SSN) data identifier
on page 775.
Note: This data identifer is replaced by the Randomized
US SSN data identifier.
Canadian Social Insurance Number See Canadian Social Insurance Number data identifier
on page 721.
US Individual Tax ID Number (ITIN) See UK Tax ID Number data identifier on page 770.
Driver's License Number CA State See Drivers License Number CA State data identifier
on page 734.
Driver's License Number IL State See Drivers License Number - IL State data identifier
on page 737.
Driver's License Number NJ State See Drivers License Number - NJ State data identifier
on page 738.
Driver's License Number NY State See Drivers License Number - NY State data identifier
on page 739.
Driver's License Number FL, MI, MN States See Drivers License Number - FL, MI, MN States data
identifier on page 735.
Credit Card Number See Credit Card Number data identifier on page 726.
ABA Routing Number See ABA Routing Number data identifier on page 717.
Credit Card Magnetic Stripe Data See Credit Card Magnetic Stripe Data data identifier
on page 724.
National Drug Code See National Drug Code (NDC) data identifier
on page 751.
See Use custom keywords for system data identifiers on page 621.
Note: Not all system data identifiers provide each breadth of detection. Refer to the
complete list of data identifiers and breadths to determine what is available.
See Selecting a data identifier breadth on page 570.
Note: Optional validators only apply to the policy instance you are actively
configuring; they do not apply system-wide.
When you edit a system data identifier, the system exposes the pattern for viewing
and editing. The system-defined data identifier patterns have been tuned and
optimized for precise content matching.
See Selecting a data identifier breadth on page 570.
In addition, you can create a custom data identifier in which case you are required
to implement at least one pattern. The best way to understand how to write patterns
is to examine the system-defined data identifier patterns.
See Writing data identifier patterns to match data on page 589.
the validated data and the matched data must exist in the same component to
trigger or except an incident.
See Detection messages and message components on page 309.
For example, consider a scenario where you implement the Randomized US Social
Security Number (SSN) data identifier. This data identifier detects on various 9-digits
patterns and uses a keyword validator to narrow the scope of detection. (The
keyword and phrases in the list are "social security number, ssn, ss#"). If the
detection engine receives a message with the number pattern 123-45-6789 and
the keyword "social security number" and both data items are contained in the
message attachment component, the detection engine reports a match. However,
if the attachment contains the number but the body contains the keyword validator,
the detection engine does not consider this to be a match.
See Configuring the Content Matches data identifier condition on page 567.
See Randomized US Social Security Number (SSN) data identifier on page 754.
Breadth Patterns
You can implement any breadth the data identifier You cannot modify the match patterns at the instance
supports at the instance level. level.
Optional Validators Active Validators
You can select one or more optional validators at You cannot modify, add, or remove required validators at
the instance level. the instance level.
1 Decide the type of data See Introducing data identifiers on page 556.
identifier you want to
implement.
2 Decide the data identifier See About data identifier breadths on page 562.
breadth.
3 Configure the data See Configuring the Content Matches data identifier condition on page 567.
identifier.
4 Test and tune the data See Best practices for using data identifiers on page 594.
identifier policy.
Action Description
Edit a data identifier. Select the data identifier from the list to modify it.
See Selecting a data identifier breadth on page 570.
Define a custom data Click Add data identifier to create a custom data identifier.
identifier.
See Custom data identifier configuration on page 587.
A pencil icon to the left means that the data identifier is modified from its original state, or is
custom.
Remove a data Click the X icon on the right side to delete a data identifier.
identifier.
The system does not let you delete system data identifiers. You can only delete custom data
identifiers.
Note: The system does not export data identifiers in a policy template. The system
exports a reference to the system data identifier. The target system where the policy
template is imported provides the actual data identifier. If you modify a
system-defined data identifier, the modifications do not export to the template.
Detecting content using data identifiers 567
Configuring data identifier policy conditions
Step 1 Clone the system data identifer Clone the system data identifier before you modify it.
you want to modify.
See Cloning a system data identifier before modifying it on page 580.
Step 2 Edit the cloned data identifier. If you modify a system data identifier, click the plus sign to display the breadth
and edit the data identifier.
Step 3 Edit one or more Patterns. You can modify any pattern that the Data Identifier provides.
Step 4 Edit the data input for any See Editing pattern validator input on page 581.
validator that accepts input.
See List of pattern validators that accept input data on page 581.
Step 5 Optionally, you can add or See Selecting pattern validators on page 592.
remove Validators, as
necessary.
Step 6 Save the data identifier. Click Save to save the modifications.
Once the data identifier is saved, the icon at the Data Identifiers screen
indicates that it is modified from its original state, or is custom.
Step 7 Implement the data identifier See Configuring the Content Matches data identifier condition on page 567.
in a policy rule or exception.
Step 1 Add a data identifier rule Select the Content Matches data identifier condition at the Add Detection
or exception to a policy, Rule or Add Exception screen.
or configure an existing
See Adding a rule to a policy on page 332.
one.
See Adding an exception to a policy on page 341.
Step 2 Choose a data identifier. Choose a data identifier from the list and click Next.
Step 3 Select a Breadth of Use the breadth option to narrow the scope of detection.
detection.
See About data identifier breadths on page 562.
Wide is the default setting and detects the broadest set of matches. Medium
and narrow breadths, if available, check additional criteria and detect fewer
matches.
Step 4 Select and configure one Optional validators restrict the match criteria and reduce false positives.
or more Optional
See About optional validators for data identifiers on page 562.
Validators.
Step 6 Configure the message Select one or more message components on which to match.
components to Match
On the endpoint, the detection engine matches the entire message, not
On.
individual components.
If the data identifier uses optional or required keyword validators, the keyword
must be present in the same component as the matched data identifier content.
Step 7 Configure additional Optionally, you can Add one or more additional conditions from any available
conditions to Also Match. in the Also Match condition list.
Breadth Description
Wide The wide breadth defines a single or multiple patterns to create the greatest number of matches.
In general this breadth produces a higher rate of false positives than the medium and narrow
breadths.
Medium The medium breadth may refine the detection pattern(s) and/or add one or more data validators
to limit the number of matches.
Narrow The narrow breadth offers the tightest patterns and strictest validation to provide the most accurate
positive matches. In general this option requires the presence of a keyword or other validating
restriction to trigger a match.
Detecting content using data identifiers 570
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
Detecting content using data identifiers 571
Configuring data identifier policy conditions
Narrow
Detecting content using data identifiers 572
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
Require beginning Match the characters that begin (lead) the matched data item.
characters
For example, for the CA Drivers License data identifier, you could require the beginning
character to be the letter "C." In this case the engine matches a license number C6457291.
Require ending characters Match the characters that end (trail) the matched data item.
Exclude beginning Exclude from matching characters that begin (lead) the matched data.
characters
See Acceptable characters for optional validators on page 575.
Exclude ending Exclude from matching the characters that end (trail) the matched data item.
characters
See Acceptable characters for optional validators on page 575.
Find keywords Match one or more keywords or key phrases in addition to the matched data item.
The keyword must be detected in the same message component as the data identifier
content to repot a match.
See List of pattern validators that accept input data on page 581.
Note: The Find keyword optional validator accepts any characters as values for
all data identifiers .
The type of data expected by the optional validator depends on the data identifier.
Most data identifier/optional validator pairings accept numbers only; some accept
alphanumeric values, and a few accept any characters. If you enter unacceptable
input and attempt to save the policy, the system reports an error.
See Configuring optional validators on page 574.
Driver's License Number CA State Numbers only Any characters (normalized to lowercase)
Driver's License Number IL State Numbers only Any characters (normalized to lowercase)
Driver's License Number NJ State Numbers only Any characters (normalized to lowercase)
Driver's License Number FL, MI, Numbers only Any characters (normalized to lowercase)
MN States
First match is unique A unique match is the first match found in a message component.
Match count updated for each unique The match count is incremented by 1 for each unique pattern match.
match
Detecting content using data identifiers 578
Configuring data identifier policy conditions
Only unique matches are highlighted Duplicate matches are neither counted nor highlighted at the Incident Snapshot
screen
Uniqueness does not span message For example, if the same SSN appears in both the message body and
components attachment, two unique matches will be generated, not one. This is because
each instance is detected in a separate message component.
Compound rule with data identifier In a compound rule combining a data identifier condition with a keyword condition
and keyword proximity conditions that specifies keyword proximity logic, the reported match will not be the first
match found, but the first match within the distance of the keyword proximity
range.
No backward combatability Unique match counting is only available for policies configured using version
11.6 or later Enforce Server. In addition, only version 11.6 or later Detection
Servers and DLP Agents can run policies containing unique match counting.
Note: The system does not export modified and custom data identifiers in a policy
template. The system exports a reference to the system Data identifier. The target
system where the policy template is imported provides the actual Data identifier.
See Clone system-defined data identifiers before modifying to preserve original
state on page 596.
Note: Input you use for beginning and ending validators concern the text of the
match itself. Input you use for prefix and suffix validators concern characters before
and after matched text.
Validator Description
Exact Match Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude beginning characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Detecting content using data identifiers 582
Modifying system data identifiers
Validator Description
Exclude ending characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude exact match Enter a comma-separated list of values. Each value can be of any length.
Exclude prefix Enter a comma-separated list of values. Each value can be of any length.
Exclude suffix Enter a comma-separated list of values. Each value can be of any length.
Find keywords Enter a comma-separated list of values. Each value can be of any length.
Require beginning characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Require ending characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Codice Fiscale Italian codice fiscal, dati anagrafici, partita tax code, personal data, VAT
I.V.A., p. iva number, VAT number
French INSEE Code French INSEE, numro de scu, code scu INSEE, social security number,
social security code
International Bank French Code IBAN, numro IBAN IBAN Code, IBAN number
Account Number (IBAN)
Central
International Bank French Code IBAN, numro IBAN IBAN Code, IBAN number
Account Number (IBAN)
East
International Bank French Code IBAN, numro IBAN IBAN Code, IBAN number
Account Number (IBAN)
West
Table 23-19 Keyword list for international PII data identifiers (continued)
Swiss AHV Number French Numro AVS, numro d'assur, AVS number, insurance number,
identifiant national, numro national identifier, national
d'assurance vieillesse, numro de insurance number, social security
scurit soclale, Numro AVH number, AVH number
Component Description
Patterns Define one or more regular expression patterns, separated by line breaks.
Validators Add or remove validators to perform validation checks on the data detected by the
pattern(s).
Data Entry Provide comma-separated data values for any validators that require data input.
Normalizer Select a normalizer to standardize the data before matching against it.
Step 1 Select Manage > Policies > The data identifiers screen lists all data identifiers available in the system.
data identifiers.
Step 2 Select Add data identifier. Enter a Name for the custom data identifier.
Step 3 Enter one or more Patterns You must enter at least one pattern for the custom data identifier to be valid.
to match data.
Separate multiple patterns by line breaks.
Digits
Digits and Letters
Lowercase
Swift codes
Do nothing
Select this option if you do not want to normalize the data.
Step 5 Select zero or more Including a validator to check and verify pattern matching is optional.
Validators.
See Selecting pattern validators on page 592.
Detecting content using data identifiers 587
Creating custom data identifiers
Step 6 Save the custom data Click Save at the upper left of the screen.
identifier.
Once you define and save a custom data identifier, it appears alphabetically
in the list of data identifiers at the data identifiers screen.
Step 7 Implement the custom data The system lists all custom data identifiers beneath the Custom category
identifier in one or more for the "Content Matches data identifier" condition at the Configure Policy
policies. - Add Rule and the Configure Policy - Add Exception screens.
See Configuring the Content Matches data identifier condition on page 567.
You can configure optional validators at the policy instance level for custom
data identifiers.
Character Description
* The asterisk (*), pipe (|), and dot (.) characters are not supported for Data identifier
patterns.
|
\s The \s construct cannot be used to match a whitespace character; instead, use an actual
whitespace.
Grouping Grouping only works at the beginning of the pattern, for example:
\d{2} /19 \d{2} does not work; instead use \d{2} /[1][9] \d{2}
Groupings are allowed at the beginning of the pattern, like in the credit card Data identifier.
6 In the Patterns field, modify an existing pattern, or enter one or more new
patterns, separated by line breaks.
Data identifier patterns are implemented as regular expressions. However,
much of the regular expression syntax is not supported.
See Using the data identifier pattern language on page 588.
7 Click Save to save the data identifier.
Table 23-24 Available validators for system and custom data identifiers
Validator Description
ABA Checksum Every ABA routing number must start with the following two digits:
00-15,21-32,61-72,80 and pass an ABA specific, position-weighted check sum.
Advanced KRRN Validation Validates that 3rd and 4th digit are a valid month, that 5th and 6th digit a valid day,
and the checksum matches the check digit.
Advanced SSN Validator checks whether SSN contains zeros in any group, the area number (first
group) is less than 773 and not 666, the delimiter between the groups is the same,
the number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
Australian Tax File validation Computes the checksum and validates the pattern against it.
check
China ID checksum validator Computes the checksum and validates the pattern against it.
Codice Fiscale Control Key Computes the control key and checks if it is valid.
Check
Cusip Validation Validator checks for invalid CUSIP ranges and computes the CUSIP checksum
(Modulus 10 Double Add Double algorithm).
Custom Script* Enter a custom script to validate pattern matches for this Data identifier breadth.
DNI control key check Computes the control key and checks if it is valid.
Detecting content using data identifiers 591
Creating custom data identifiers
Table 23-24 Available validators for system and custom data identifiers
(continued)
Validator Description
Duplicate digits Ensures that a string of digits are not all the same.
Exact Match* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude beginning characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Note: Beginning and ending validators concern the text of the match itself. Prefix
and suffix validators concern characters before and after matched text.
Exclude ending characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude exact match* Enter a comma-separated list of values. Each value can be of any length.
Exclude prefix* Enter a comma-separated list of values. Each value can be of any length.
Note: Prefix and suffix validators concern characters before and after matched text.
Beginning and ending validators concern the text of the match itself.
Exclude suffix* Enter a comma-separated list of values. Each value can be of any length.
Find keywords* Enter a comma-separated list of values. Each value can be of any length.
Hong Kong ID Computes the checksum and validates the pattern against it.
INSEE Control Key Validator computes the INSEE control key and compares it to the last 2 digits of the
pattern.
IP Basic Check Every IP address must match the format x.x.x.x and every number must be less than
256.
IP Octet Check Every IP address must match the format x.x.x.x, every number must be less than
256, and no IP address can contain only single-digit numbers (1.1.1.2).
IP Reserved Range Check Checks whether the IP address falls into any of the "Bogons" ranges. If so the match
is invalid.
Luhn check Validator computes the Luhn checksum which every Canadian Insurance Number
must pass.
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the complete match.
Table 23-24 Available validators for system and custom data identifiers
(continued)
Validator Description
Require beginning characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Require ending characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Singapore NRIC Computes the Singapore NRIC checksum and validates the pattern against it.
SSN Area-Group number For a given area number (first group), not all group numbers (second group) might
have been assigned by the SSA. Validator eliminates SSNs with invalid group
numbers.
UK Drivers License Every UK drivers license must be 16 characters and the number at the 8th and 9th
position must be larger than 00 and smaller than 32.
Note: The active validators that allow for and define input are not to be confused
with the "Optional validators" that can be configured for any runtime instance of a
particular data identifier. Optional validators are always configurable at the instance
level. Active validators are only configurable at the system level.
Select a validator from the "Validation Checks" list on the left, then click Add
Validator to the right. If the validator requires input, provide the required data using
a comma-separated list and then click Add Validator.
See Selecting pattern validators on page 592.
Detecting content using data identifiers 593
Creating custom data identifiers
Normalizer Description
Note: Refer to the Symantec Data Loss Prevention Detection Customziation Guide
for details on using the Symantec Data Loss Prevention Scripting Language.
Use data identifiers instead of regular epressions when See Use data identifiers instead of regular expressions
possible. to improve accuracy on page 595.
Modify data identifier definitions when you want tuning to See Modify data identifier definitions when you want tuning
apply globaly. to apply globally on page 596.
Detecting content using data identifiers 595
Best practices for using data identifiers
Close system-defined data identifiers before modifying See Clone system-defined data identifiers before
them. modifying to preserve original state on page 596.
Consider using multiple data identifer breadth in parallel See Consider using multiple breadths in parallel to detect
different severities of confidential data on page 597.
Avoid matching on the Envelope over HTTP See Avoid matching on the Envelope over HTTP to reduce
false positives on page 597.
Use the Randomized US SSN data identifier to detect See Use the Randomized US SSN data identifier to detect
traditional and randomized SSNs SSNs on page 597.
Use unique match counting to improve accuracy and ease See Use unique match counting to improve accuracy and
remediation ease remediation on page 598.
Note: The data identifier pattern language is a limited subset of the regular
expression language. Not all regular expression constructs or characters are
supported for data identifier patterns. See Using the data identifier pattern language
on page 588.
Detecting content using data identifiers 596
Best practices for using data identifiers
to SSNs issued on or after June 25, 2011. It does not apply to SSNs issued before
that date.
To support the new randomized SSN scheme, Symantec Data Loss Prevention
provides the system-defined Randomized US Social Security Number (SSN)
data identifier.
See Randomized US Social Security Number (SSN) data identifier on page 754.
The Randomized US SSN data identifier detects both traditional and randomized
SSNs. The Randomized US SSN data identifier replaces the US SSN data identifier,
which only detects traditional SSNs. In addition, the patterns for the Randomized
US SSN data identifier are updated for version 14.0.
Symantec recommends that you use the Randomized US SSN data identifier for
all new policies that you want to use to detect SSNs, and that you update your
existing SSN policies to use the Randomized US SSN data identifier. For your
existing policies that already implement the traditional US SSN data identifier, you
can add the Randomized US SSN data identifier as an OR'd rule so that both run
in parallel as you test the policy to ensure it accurately detects both styles of SSNs.
See Updating policies to use the Randomized US SSN data identifier on page 584.
Chinese, Japanese, and Korean (CJK) languages with token verification enabled for the
server
See About keyword matching for Chinese, Japanese, and Korean (CJK) languages
on page 600.
Mixed languages
Server Enable token verification on the detection server and use whole word matching
See Enabling and using CJK token verification for server keyword matching on page 608.
Behavior Description
Whole word matching With whole word matching, keywords match at word boundaries only (\W in the regular
expression lexicon). Any characters other than A-Z, a-z, and 0-9 are interpreted as word
boundaries.
With whole word matching, keywords must have at least one alphanumeric character (a letter
or a number). A keyword consisting of only white-space characters, such as "..", is ignored.
Quotation marks Do not use quotation marks when you enter keywords or phrases because quotes are interpreted
literally and will be required in the match.
White space The systems strips out the white space before and after keywords or key phrases. Each
whitespace within a keyword phrase is counted.
Case sensitivity The case sensitivity option that you choose applies to all keywords in the list for that condition.
Detecting content using keyword matching 602
Introducing keyword matching
Behavior Description
Plurals and verb All plurals and verb inflections must be specifically listed. If the number of enumerations
inflections becomes complicated use the wildcard character (asterisk [*]) to detect a keyword suffix (in
whole word mode only).
Keyword phrases You can enter keyword phrases, such as social security number (without quotes). The system
looks for the entire phrase without returning matches on individual constituent words (such as
social or security).
Keyword variants The system only detects the exact keyword or key phrase, not variants. For example, if you
specify the key phrase social security number, detection does not match a phrase that
contains two spaces between the words.
Matching multiple The system implies an OR between keywords. That is, a message component matches if it
keywords contains any of the keywords, not necessarily all of them. To perform an ALL (or AND) keyword
match, combine multiple keyword conditions in a compound rule or exception.
Alpha-numeric During keyword matching, only a letter or a digit is considered a valid keyword start position.
characters Special characters (non-alphanumeric) are treated as delimiters (ignored). For example, the
ampersand character ("&") and the underscore character ("_") are special characters and are
not considered for keyword start position.
____keyword__
Keyword
&&akeyword&&
123Keyword__
For these examples, the valid keyword start positions are as follows: k, K, a, and 1.
Note: This same behavior applies to keyword validators implemented in data identifiers.
Proximity The word distance (proximity value) is exclusive of detected keywords. Thus, a word distance
of 10 allows for a proximity window of 12 words.
CONFIDENTIAL
key phrase internal use only internal use only internal use
hacker hacker
hacks
privilege prevent
privy
privity
privs
priv
keyword dictionary account number, account ps, american If any keyword or phrase is amx
express, americanexpress, amex, bank present, the data is matched:
creditcard
card, bankcard, card num, card number,
cc #, cc#, ccn, check card, checkcard, amex master card
credit card, credit card #, credit card credit card car
number, credit card#, debit card,
debitcard, diners club, dinersclub, mastercard
discover, enroute, japanese card bureau,
jcb, mastercard, mc, visa, (etc....)
If token verification is enabled, the message size must be sufficient for the token
validator to recognize the language. For example: the message
is too small fo a message for the token validation process to recognize the
language of the message. The following message is a sufficient size for token
validation processing:
See About keyword matching for Chinese, Japanese, and Korean (CJK) languages
on page 600.
Token validation for CJK language keywords is not available on the endpoint. To
match CJK on the endpoint, you configure the condition to match on whole words
only.
Chinese
Japanese
Korean
and Caldicott policy templates is a manual process that you should perform to
ensure your HIPAA or Caldicott policies are up to date.
See Updating the Drug, Disease, and Treatment keyword lists for your HIPAA and
Caldicott policies on page 609.
See Keep the keyword lists for your HIPAA and Caldicott policies up to date
on page 611.
See HIPAA and HITECH (including PHI) policy template on page 805.
See Caldicott Report policy template on page 781.
Match on whole or partial keywords Separate each keyword or phrase by a newline or comma.
and key phrases
See Keyword matching examples on page 602.
Match on the wildcard asterisk (*) Match the wildcard at the end of a keyword, in whole word mode only.
character
See Keyword matching examples on page 602.
Find keywords Implement one or more keywords in data identifiers to refine the scope of
detection.
Policy rules and exceptions You can implement keyword matching conditions in policy rules and exceptions.
Keyword dictionary If you have a large dictionary of keywords, you can index the keyword list.
See Use VML to generate and maintain large keyword dictionaries on page 612.
CJK token verification Enable on the detection server for CJK languages and match on whole words
only.
Action Description
Enter the match type. Select if you want the keyword match to be:
Choose the keyword Select the keyword separator you to delimit multiple keywords:
separator.
Newline or Comma.
Match any keyword. Enter the keyword(s) or key phrase(s) you want to match. Use the separator you have selected
(newline or comma) to delimit multiple keyword or key phrase entries.
You can use the asterisk (*) wildcard character at the end of any keyword to match one or more
suffix characters in that keyword. If you use the asterisk wildcard character, you must match
on whole words only. For example, a keyword entry of confid* would match on "confidential"
and "confide," but not "confine." As long as the keyword prefix matches, the detection engine
matches on the remaining characters using the wildcard.
Action Description
Configure keyword Keyword proximity matching lets you specify a range of detection among keyword pairs.
proximity matching
See About keyword proximity on page 601.
(optional).
To implement keyword proximity matching:
Select (check) the Keyword Proximity matching option in the "Conditions" section of the
rule builder interface.
Click Add Pair of Keywords.
Enter a pair of keywords.
Specify the Word distance.
The maximum distance between keywords is 999, as limited by the three-digit length of the
Word distance field. The word distance is exclusive of detected keywords. For example,
a word distance of 10 allows for a range of 12 words, including the two words comprising
the keyword pair.
Repeat the process to add additional keyword pairs.
The system connects multiple keyword pair entries the OR Boolean operator, meaning that
the detection engine evaluates each keyword pair independently.
Match on whole or Select the option On whole words only to match on whole keywords only (by default this
partial keywords. option is selected).
You must match on whole words only if you use the asterisk (*) wildcard character in any
keyword you enter in the list.
Configure match Keyword matching lets you specify how you want to count condition matches.
conditions. Select one of the following options:
Action Description
Select components Keyword matching detection supports matching across message components.
to match on.
See Selecting components to match on on page 340.
Select one or more message components to match on:
Note: On the endpoint the DLP Agent matches on the entire message, not individual
components.
Also match one or Select this option to create a compound condition. All conditions must be met to report a match.
more additional
You can Add any available condition from the list.
conditions.
See Configuring compound match conditions on page 346.
Enable keyword token verification for CJK describes how to enable and use token
verification for CJK keywords.
Detecting content using keyword matching 609
Configuring keyword matching
Updating the Drug, Disease, and Treatment keyword lists for your
HIPAA and Caldicott policies
If you have created a policy derived from the HIPAA or Caldicott template and have
not made any changes or customizations to the derived policy, after upgrade you
can create a new policy from the appropriate template and remove the old policy
from production. If you have made changes to a policy derived from either the
HIPAA or Caldicott policy template and you want to preserve these changes, you
can copy the updated keyword lists from either the HIPAA or Caldicott policy
template and use the copied keyword lists to update your HIPAA or Caldicott policies.
See About updates to the Drug, Disease, and Treatment keyword lists on page 604.
See Keep the keyword lists for your HIPAA and Caldicott policies up to date
on page 611.
To update the Drug, Disease, and Treatment keyword lists for HIPAA and Caldicott
policies provides instructions for updating the keyword lists for your HIPAA and
Caldicot policies.
Detecting content using keyword matching 610
Best practices for using keyword matching
To update the Drug, Disease, and Treatment keyword lists for HIPAA and Caldicott
policies
1 Create a new policy from a template and choose either the HIPAA or Caldicott
template.
See Creating a policy from a template on page 316.
2 Edit the detection rules for the policy.
See Configuring policy rules on page 334.
3 Select the Patient Data and Drug Keywords (Keyword Match) rule.
4 Select the Content Matches Keyword condition.
5 Select all the keywords in the Match any Keyword data field and copy them
to the Clipboard.
6 Paste the copied keywords to a text file named Drug Keywords.txt.
7 Cancel the rule edit operation to return to the policy Detection tab.
8 Repeat the same process for the Patient Data and Treatment Keywords
(Keyword Match) rule.
9 Copy and paste the keywords from the condition to a text file named Treatment
Keywords.txt.
10 Repeat the same process for the Patient Data and Disease Keywords
(Keyword Match) rule.
11 Copy and paste the keywords from the condition to a text file named Disease
Keywords.txt.
12 Update your HIPAA and Caldicott policies derived from the HIPAA or Caldicott
templates using the keyword *.txt files you created.
13 Test your updated HIPAA and Caldicott policies.
Enable linguistic validation for CJK keyword See Enable token verification on the server to reduce false
detection on the server. positives for CJK keyword detection on page 611.
Update keyword lists for your Caldicott and HIPAA See Keep the keyword lists for your HIPAA and Caldicott policies
policies. up to date on page 611.
Tune keyword validators to improve data identifier See Tune keywords lists for data identifiers to improve match
accuracy. accuracy on page 612.
Use VML to profile long keyword lists and See Use VML to generate and maintain large keyword
dictionaries dictionaries on page 612.
Use keyword matching for metadata detection. See Use keyword matching to detect document metadata
on page 612.
Keep the keyword lists for your HIPAA and Caldicott policies up to
date
For each Symantec Data Loss Prevention relese, the Drug, Disease, and Treatment
keyword lists are updated based on information from the U.S. Federal Drug
Administration (FDA) and other sources. These keyword lists are used in the HIPAA
and HITECH (including PHI) and Caldicott Report policy templates.
See About updates to the Drug, Disease, and Treatment keyword lists on page 604.
Detecting content using keyword matching 612
Best practices for using keyword matching
If you have upgraded to the latest Data Loss Prevention version and you have
existing policies derived from either the HIPAA or Caldicott policy template, consider
updating your HIPAA and Caldicott policies to use the Drug, Disease, and Treatment
keyword lists provided with this Data Loss Prevention version.
See Updating the Drug, Disease, and Treatment keyword lists for your HIPAA and
Caldicott policies on page 609.
Note: Data Identifier pattern matching is based on the regular expression syntax.
However, not all regular expression constructs listed in the table below are supported
by Data Identifier patterns. See About data identifier patterns on page 562.
[] Elements inside brackets are a character class (For example, [abc] matches 1 character:
a, b, or c.)
^ At the beginning of a character class, negates it (For example, [^abc] matches anything
except a, b, or c.)
+ Following a regular expression means 1 or more (For example, \d+ means 1 or more digit.)
* Following a regular expression means any number (For example, \d* means 0, 1, or more
digits.)
(?i) At the beginning of a regular expression makes it case-insensitive (Regular expressions are
case-sensitive by default.)
| Means OR (For example, A|B means regular expression A or regular expression B.)
Action Description
Check for existence reports a match count of 1 if there are one or more matches. For
compound rules or exceptions, all conditions must be configured this way.
Count all matches reports the sum of all matches; applies if any condition uses this
parameter.
Detecting content using regular expressions 616
Best practices for using regular expression matching
Action Description
Match on one or more Configure cross-component matching by selecting one or more message components to
message components. match on.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Use Data Identifiers instead of regular expressions where See Use regular expressions sparingly to support efficient
possible. performance on page 618.
Use regular expressions sparingly to support efficent policy See Test regular expressions before deployment to
performance. improve accuracy on page 618.
Use look ahead and behind characters to improve regex See Use look ahead and look behind characters to
performance. improve regex accuracy on page 617.
Detecting content using regular expressions 617
Best practices for using regular expression matching
Test regular expressions for accuracy and performance. See Use look ahead and look behind characters to
improve regex accuracy on page 617.
Operation Construct
and
(?<=(^|(?:[^)+\d][^-\w+])|\t))
Detecting content using regular expressions 618
Best practices for using regular expression matching
Canadian Social Insurance Numbers This policy detects patterns indicating Canadian social insurance numbers.
UK Data Protection Act 1998 This policy protects personal identifiable information.
See Data Protection Act 1998 (UK) policy template on page 789.
EU Data Protection Directives This policy detects personal data specific to the EU directives.
UK Human Rights Act 1998 This policy enforces Article 8 of the act for UK citizens.
SWIFT Codes (International banking) This policy detects codes that banks use to transfer money across
international borders.
UK National Health Service Number This policy detects personal identification numbers issued by the NHS.
See UK National Health Service (NHS) Number policy template on page 843.
Codice Fiscale Italian codice fiscal, dati anagrafici, partita tax code, personal data, VAT
I.V.A., p. iva number, VAT number
French INSEE Code French INSEE, numro de scu, code scu INSEE, social security number,
social security code
International Bank French Code IBAN, numro IBAN IBAN Code, IBAN number
Account Number (IBAN)
Central
International Bank French Code IBAN, numro IBAN IBAN Code, IBAN number
Account Number (IBAN)
East
International Bank French Code IBAN, numro IBAN IBAN Code, IBAN number
Account Number (IBAN)
West
Swiss AHV Number French Numro AVS, numro d'assur, AVS number, insurance number,
identifiant national, numro national identifier, national
d'assurance vieillesse, numro de insurance number, social security
scurit soclale, Numro AVH number, AVH number
Note: File type matching does not crack the file and detect content; it only detects
the file type based on the binary signature of the file. To detect content, use a
content matching condition.
See Configuring the Message Attachment or File Type Match condition on page 627.
See About custom file type identification on page 625.
Note: The Symantec Data Loss Prevention Scripting Language only identifies
custom file formats; it does not extract content from custom file types.
Message Attachment or File Detect or except specific files and attachments by type.
Type Match
See About file type matching on page 624.
See Configuring the Message Attachment or File Type Match condition on page 627.
Detecting file properties 627
Configuring file property matching
Message Attachment or File Detect or except specific files and attachments by size.
Size Match
See About file size matching on page 626.
See Configuring the Message Attachment or File Size Match condition on page 628.
Message Attachment or File Detect or except specific files and attachments by name.
Name Match
See About file name matching on page 626.
See Configuring the Message Attachment or File Name Match condition on page 629.
Action Description
Select the file type or types Select all of the formats you want to match.
to match.
See Supported formats for file type identification on page 684.
To select all formats within a certain category (for example, all word-processing formats),
click the section heading.
The system implies an OR operator among all file types you select. For example, if you
select Microsoft Word and Microsoft Excel file type attachments, the system detects all
messages with Word or Excel documents attached, not messages with both attachment
types
Match on attachments only. This condition only matches on the Message Attachments component.
Also match on one or more Select this option to create a compound condition. All conditions must match to trigger
additional conditions. or except an incident.
Action Description
Enter the Size to match. Enter a number, and select the unit of measure: bytes, kilobytes (KB), megabytes (MB),
or gigabytes (GB).
Select More Than to specify the minimum size of the file to match.
Select Less Than to specify the maximum size of the file to match.
Match on the body or Select one or both of the following message components on which to base the match:
attachments.
Body The content of the message.
Attachments Any files that are attached to or transferred by the message.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Action Description
Specify the File Name. Specify the file name to match using the DOS pattern matching language to represent
patterns in the file name.
Separate multiple matching patterns with commas or by placing them on separate lines.
Match on attachments. This condition only matches on the Message Attachments component.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Operator Description
* Use an asterisk as a wild card to match any number of characters (including none).
To match a Word file name that begins with ENG- followed ENG-????????.doc
by any eight characters:
If you are not sure how many characters are in the name: ENG-*.*
To match all file names that begin with ENG- and all file Enter as comma separated values:
names that begin with ITA-:
ENG-*.*,ITA-*
ENG-*.*
ITA-*
Action Description
Enter the Script Name. Specify the name of the script. The name must be unique across policies.
Enter the custom file Enter the File Type Matches Signature script for detecting the binary signature of the custom
type script. file type.
See the Symantec Data Loss Prevention Detection Customization Guide for details on
writing custom scripts.
Match only on This condition only matches on the Message Attachments component.
attachments.
See Detection messages and message components on page 309.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Example
Any characters you enter (other than the DOS operators) match exactly.
For example, to match a Word file name that begins with ENG- followed by any eight characters, enter:
ENG-????????.doc
If you are not sure how many characters follow ENG-, enter: ENG-*.*
To match all file names that begin with ENG- and all file names that begin with ITA-, enter: ENG-*.*,ITA-* (comma
separated), or you can separate the file names by line space.
Note: The Classification Server is used only with the Symantec Data Classification
for Enterprise Vault solution, which is licensed separately from Symantec Data Loss
Prevention. You must configure the Enterprise Vault Data Classification Services
filter and Classification Server to communicate with one another. See the Symantec
Enterprise Vault Data Classification Services Implementation Guide for more
information.
Detecting email for data classification services 636
About matching on the message Subject for Data Classification Services
The following table highlights the key policy configuration components that are
associated with Data Classification for Enterprise Vault.
Policy actions to enable classification See Enabling classification test mode on page 636.
test mode and limit generated
classification results
Classify Enterprise Vault Content See Configuring the Classify Enterprise Vault Content
response rule action response action on page 894.
the tag to ignore the outcome of the classification response for that policy, but still
performs archiving as if no classification service is running
When a classification policy runs in test mode, the Enforce Server creates a
classification event each time a message matches the policy. You can view these
classification events in the incident lists of the Enforce Server administration console
(Incidents > Classification). The test mode configuration also enables you to limit
the number of classification events that are recorded.
Note: The Enforce Server creates classification events only for those policies that
run in test mode. When you disable test mode for production use, no classification
incidents are recorded for that policy.
After you are confident that the classification policy works as intended, you can
disable test mode so that Enterprise Vault actively classifies or deletes messages
as defined in the policy.
Note: The parameters that are listed have no effect unless the policy uses the
Classification: Classify Enterprise Vault Content response rule.
Parameter Description
Enable Classification This setting is enabled by default and adds a test mode flag to
Test Mode the policy detection result for this policy. The flag indicates that
Enterprise Vault should perform no action for the returned
classification result.
Maximum for This setting specifies the maximum number of classification events
Classification Test that Symantec Data Loss Prevention creates for this policy while
Mode Events in test mode. Limit the number of classification events for test
mode policies, because each message that is posted to the
Classification Server should generate a classification result.
Specify a limit that enables you to evaluate the performance of
your classification policy. You may choose to delete these
classification events from the Enforce Server database after you
activate the policy (disable test mode). The default setting records
a maximum of 100 events.
Note: The Classification Server is used only with the Symantec Data Classification
for Enterprise Vault solution, which is licensed separately from Symantec Data Loss
Prevention. You must configure the Data Classification for Enterprise Vault filter
and Classification Server to communicate with one another.
The Message/Email Properties and Attributes detection rule examines the various
Messaging Application Programming Interface (MAPI) properties and attributes that
Exchange has assigned to the email. Use these attributes to determine whether a
message should be archived or deleted, and whether to flag the message for
compliance review or E-Discovery searches.
MAPI Description
Attribute
Normal
Personal
Private
Confidential
The detection rule matches if the message contains any of the selected
Message Sensitivity levels.
Detecting email for data classification services 639
Configuring the Message/Email Properties and Attributes condition
MAPI Description
Attribute
Message This attribute describes the type of message, or the type of content that
Class the message contains. Select Message Class and then select one or more
classes from the Available Message Classes column. Use the arrows to
move selected classes into the Selected Message Classes column.
The following classes of interpersonal messages (IPM) appear in the
Available Message Classes column:
MAPI Description
Attribute
Also Match Select this option to create a compound rule. All conditions must match for
the rule to trigger an incident. You can add any available condition from
the drop-down menu.
Note: Exchange messages that are delivered from a Classification Server
do not include envelope information.
Protocol Description
Email/SMTP Simple Mail Transfer Protocol (SMTP) is a protocol for sending email messages between servers.
FTP The file transfer protocol (FTP) is used on the Internet for transferring files from one computer
to another.
HTTP The hypertext transfer protocol (HTTP) is the underlying protocol that supports the World Wide
Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers
and browsers should take in response to various commands.
Detecting network and mobile incidents 642
Introducing protocol monitoring for mobile
Protocol Description
HTTP/SSL Hypertext transfer protocol over Secure Sockets Layer (HTTPS) is a protocol for sending data
securely between a client and server.
IM:MSN Instant messaging is a type of communications service that enables you to create a private chat
room with another individual.
IM:AIM
Data Loss Prevention supports detection on the following IM channels.:
IM:AIM
AIM instant messaging
MSN instant messaging
Yahoo! Instant messaging
NNTP Network News Transport Protocol (NNTP), which is used to send, distribute, and retrieve USENET
messages.
TCP:custom_protocol The Transmission Control Protocol (TCP) is used to reliably exchange data between computers
across the Internet. This option is only available if you have defined a custom TCP port.
Protocol Description
FTP File transfer protocol (FTP) is used on the Internet for transferring files from one computer to
another.
HTTP The hypertext transfer protocol (HTTP) is the underlying protocol that supports the World Wide
Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers
and browsers should take in response to various commands.
HTTP/SSL Hypertext transfer protocol over Secure Sockets Layer (HTTPS) is a protocol for sending data
securely between a client and server.
Detecting network and mobile incidents 643
Configuring the Protocol Monitoring condition for network detection
Action Description
Add or modify the Protocol Add a new Protocol or Endpoint Monitoring condition to a policy rule or exception, or
or Endpoint Monitoring modify an existing rule or exception condition.
condition.
See Configuring policies on page 330.
Select one or more To detect Network incidents, select one or more Protocols.
protocols to match.
Email/SMTP
FTP
HTTP
HTTPS/SSL
IM:AIM
IM:MSN
IM:Yahoo
NNTP
Configure endpoint See Configuring the Endpoint Monitoring condition on page 650.
monitoring.
Match on the entire The Protocol Monitoring condition matches on the entire message, not individual message
message. components.
The Envelope option is selected by default. You cannot select individual message
components.
Action Description
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Action Description
Add or modify the Protocol Add a new Protocol or Endpoint Monitoring condition to a policy rule or exception, or
or Endpoint Monitoring modify an existing rule or exception condition.
condition.
See Configuring policies on page 330.
Select one or more To detect Mobile incidents, select one or more Protocols:
protocols to match.
FTP
File transfer protocol is used on the Internet for transferring files from one computer
to another.
HTTP
The hypertext transfer protocol is the underlying protocol that supports the World Wide
Web. HTTP defines how messages are formatted and transmitted, and what actions
Web servers and browsers should take in response to various commands.
HTTPS/SSL
Hypertext transfer protocol over Secure Sockets Layer, which is a protocol for sending
data securely between a client and server.
Custom network protocol. Mobile monitoring only supports FTP, HTTP, and HTTP/S.
Detecting network and mobile incidents 645
Best practices for using network protocol matching
Action Description
Configure endpoint See Configuring the Endpoint Monitoring condition on page 650.
monitoring.
Match on the entire The Protocol Monitoring condition matches on the entire message, not individual message
message. components.
The Envelope option is selected by default. You cannot select individual message
components.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Protocol Description
Email/SMTP Simple Mail Transfer Protocol (SMTP) is a protocol for sending email messages between servers.
Detecting endpoint events 648
Introducing endpoint event detection
Protocol Description
FTP The file transfer protocol (FTP) is used on the Internet for transferring files from one computer
to another.
HTTP The hypertext transfer protocol (HTTP) is the underlying protocol that supports the World Wide
Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers
and browsers should take in response to various commands.
HTTP/SSL Hypertext transfer protocol over Secure Sockets Layer (HTTPS) is a protocol for sending data
securely between a client and server.
IM:MSN Instant messaging is a type of communications service that enables you to create a private chat
room with another individual.
IM:AIM
Data Loss Prevention supports detection on the following IM channels.:
IM:AIM
AIM instant messaging
MSN instant messaging
Yahoo! Instant messaging
Destination Description
CD/DVD The CD/DVD burner on the endpoint computer. This destination can be any type of
third-party CD/DVD burning software.
Removable Storage Device Detect data that is transferred to any eSATA, FireWire, or USB connected storage
device.
Copy to Network Share Detect data that is transferred to any network share or remote file access.
Printer/Fax Detect data that is transferred to a printer or to a fax that is connected to the endpoint
computer. This destination can also be print-to-file documents.
Clipboard The Windows Clipboard used to copy and paste data between Windows applications.
Detecting endpoint events 649
Introducing endpoint event detection
Endpoint Device or Class ID Detect when users move endpoint data to a specific device.
Endpoint Location Detect when the endpoint is on or off the corporate network.
Note: This topic does not address network protocol monitoring configuration.
See Configuring the Protocol Monitoring condition for network detection
on page 643.
Detecting endpoint events 651
Configuring endpoint event detection conditions
Action Description
Add or modify the Add a new Protocol or Endpoint Monitoring condition to a policy
Endpoint Monitoring rule or exception, or modify an existing rule or exception condition.
condition.
See Configuring policy rules on page 334.
Select one or more To detect Endpoint incidents, select one or more Endpoint Protocols:
endpoint protocols
Email/SMTP
to match.
HTTP
HTTPS/SSL
IM:MSN
IM:AIM
IM:Yahoo
FTP
Select one or more To detect when users move data on the endpoint, select one or more
endpoint Endpoint Destinations:
destinations.
Local Drive
CD/DVD
Removable Storage Device
Copy to Network Share
Printer/Fax
Clipboard
Monitor endpoint To detect when endpoint applications access files, select the
applications. Application File Access option.
Match on the entire The DLP Agent evaluates the entire message, not individual message
message. components.
Action Description
Also match one or Select this option to create a compound condition. All conditions must
more additional match to trigger or except an incident.
conditions.
You can Add any condition available from the list.
Action Description
Add or modify the Add a new Endpoint Location detection condition to a policy rule or
Endpoint Location exception, or modify an existing policy rule or exception.
condition.
See Configuring policy rules on page 334.
Select the location Select one of the following endpoint locations to monitor:
to monitor.
Off the corporate network
Select this option to detect or except events when the endpoint
computer is off of the corporate network.
On the corporate network
Select this option to detect or except events when the endpoint
computer is on the corporate network.
This option is the default selection.
Match on the entire The DLP Agent evaluates the entire message, not individual message
message. components.
Action Description
Also match one or Select this option to create a compound condition. All conditions must
more additional match to trigger or except an incident.
conditions.
You can Add any condition available from the list.
Action Description
Add or modify an Add a new Endpoint Device Class or ID condition to a policy rule or
Endpoint Device exception, or modify an existing one.
condition.
See Configuring policy rules on page 334.
Select one or The condition matches when users move data from an endpoint computer
more devices. to the selected device(s).
Match on the The DLP Agent matches on the entire message, not individual message
entire message. components.
Action Description
Also match one Select this option to create a compound condition. All conditions must
or more match to trigger or except an incident.
additional
You can Add any condition available from the drop-down menu.
conditions.
See Configuring compound match conditions on page 346.
Note: You can use the DeviceID utility for Windows and Mac endpoints to generate
removable storage device information. See About the Device ID utilities
on page 1528.
CD Drive IDE\\DISKST9160412ASG__________________0002SDM1\\4&F4ACADA&0&0\.0\.0
SD Card SDC&346128262
You might often combine group and detection methods on the endpoint. Keep
in mind that the policy language ANDs detection and group methods, whereas
methods of the same type, two rules for example, are ORed.
See Policy detection execution on page 312.
Chapter 31
Detecting described
identities
This chapter includes the following topics:
fr, cu All SMTP email that is addressed to a .fr Any email that is addressed to French
(France) or .cu (Cuba) addresses. company with the .com extension instead of
.fr.
company.com All SMTP email that is addressed to the Any SMTP email that is not addressed to the
specific domain URL, such as specific domain URL.
symantec.com.
3rdlevel.company.com All SMTP email that is addressed to the Any SMTP email that is not addressed to the
specific 3rd level domain, such as specific 3rd level domain.
dlp.symantec.com.
[email protected] All SMTP email that is addressed to Any email not specifically addressed to
[email protected]. [email protected], such as:
*/dlp/qa/test/local/Sym*
Sender/User Matches Pattern Matches on an email address, domain address, IP address, Windows user
name, or IM screen name/handle.
Recipient Matches Pattern Matches on an email address, domain address, IP address, or newsgroup.
Action Description
john.smith, jsmith
IM Screen Name
Enter one or more IM screen names that are used in instant messaging systems, for
example:
john_smith, jsmith
IP Address
Enter one or more IP addresses that map to the domain you want to match, for example:
Select a Reusable Sender You can select a Sender Pattern that you have saved for reuse in your policies. Select
Pattern Reusable Sender Pattern, then choose the pattern you want from the dropdown list.
Detecting described identities 662
Configuring described identity matching policy conditions
Action Description
Match on the entire message. This condition matches on the entire message. The Envelope option is selected by
default. You cannot select any other message component.
Also match additional Select this option to create a compound condition. All conditions must match to trigger
conditions. an incident.
5 To edit a saved Reusable Sender Pattern, on the Manage > Policies >
Sender/Recipient Patterns page, click the dropdown arrow next to the name
of the pattern you want to edit, then select Edit.
6 To delete a saved Reusable Sender Pattern, on the Manage > Policies >
Sender/Recipient Patterns page, click the dropdown arrow next to the name
of the pattern you want to delete, then select Delete.
Note: You cannot delete a Reusable Sender Pattern that is currently in use in
any policy.
Action Description
Enter one or more IP address patterns that resolve to the domain that you want to
match. You can use the asterisk (*) wildcard character for one or more fields. You can
enter both IPv4 and IPv6 addresses separated by commas.
URL Domain
Enter one or more URL Domains to match Web-based traffic, including Web-based
email and postings to a Web site. For example, if you want to prohibit the receipt of
certain types of data using Hotmail, enter hotmail.com.
Detecting described identities 664
Configuring described identity matching policy conditions
Action Description
Select a Reusable Recipient You can select a Recipient Pattern that you have saved for reuse in your policies.
Pattern Select Reusable Recipient Pattern, then choose the pattern you want from the
dropdown list.
Configure match counting. Select one of the following options to specify the number of email recipients that must
match:
All recipients must match (Email Only) does not count a match unless ALL email
message recipients match the specified pattern.
At least _ recipients must match (Email Only) lets you specify the minimum
number of email message recipients that must match to be counted.
Select one of the following options to specify how you want to count the matches:
Match on the entire message. This condition matches on the entire message. The Envelope option is selected by
default. You cannot select any other message component.
Also match additional Select this option to create a compound condition. All conditions in a rule or exception
conditions. must match to trigger an incident.
You can Add any available condition from the list.
Note: You cannot delete a Reusable Recipient Pattern that is currently in use
in any policy.
For both described identity matching rules, the system implies an OR between all
comma-separated list items and between all fields. For example, if any single email
address among a list of email addresses matches, the condition reports (or excepts)
an incident. Or, if either an email address, a domain name, or an IP address
matches, the condition reports (or excepts) an incident.
See Detection messages and message components on page 309.
Table 31-5 describes the types of patterns you can use for described identity
matching.
The email address field does not match the sender or recipient of a Web post. For
example, the email address [email protected] does not match if Bob uses a Web
browser to send or receive email. In this case, you must use the domain pattern
mail.yahoo.com to match [email protected].
The system does not resolve URL domains to IP addresses. For example, you
specify an IP address of 192.168.1.1 for a specific domain. If users access the
domain URL using a Web browser, the system does not match emails that are
Detecting described identities 667
Best practices for using described identity matching
Group that contains the CEO's identity as a sole group member. You then define
a policy exception that references the CEO User Group. At runtime the policy will
ignore messages sent or received by the CEO.
See User Groups on page 296.
Note: User Groups can also be used with Microsoft Exchange Server Discover
targets. See Setting up scanning of Microsoft Exchange Servers on page 1285.
Note: DLP Agents installed on Mac endpoints do not support User Groups that use
Active Directory (AD) group conditions in policies. The Mac agent treats such
conditions as Not Matched.
Detecting synchronized identities 670
Configuring User Groups
Note: If this is the first time you are configuring the User Group, you must select
the option Refresh the group directory index on Save to populate the User
Group.
4 After you locate the users you want, use the Add and Remove options to
include or exclude them in the User Group.
5 Click Save.
Action Description
Enter the group The Group Name is the name that you want to use to identify this group.
name.
Use a descriptive name so that you can easily identify it later on.
View which policies Initially, when you create a new User Group, the Used in Policy field displays None.
use the group.
If the User Group already exists and you modify it, the system displays a list of the policies that
implement the User Group, assuming one or more group-based policies is created for this User
Group.
Refresh the group Select (check) the Refresh the group directory index on Save option to synchronize the user
directory index on group profile with the most recent directory server index immediately on Save of the profile. If
Save. you leave this box unselected (unchecked), the profile is synchronized with the directory server
index based on the Directory Connection setting.
If this is the first time you are configuring the User Group profile, you must select the Refresh
the group directory index on Save option to populate the profile with the latest directory server
index replication.
Detecting synchronized identities 671
Configuring User Groups
Action Description
Select the directory Select the directory server you want to use from the Directory Server list.
server.
You must establish a connection to the directory server before you create the User Group profile.
Search the directory Enter the search string in the search field and click Search to search the directory for specific
for specific users. users. You can search using literal text or wildcard characters (*).
The search results display the Common Name (CN) and the Distinguished Name (DN) of the
directory server that contains the user. These names give you the specific user identity. Results
are limited to 1000 entries.
Click Clear to clear the results and begin a new search of the directory.
Literal text search criteria options:
Browse the directory You can browse the directory tree for groups and users by clicking on the individual nodes and
for user groups. expanding them until you see the group or node that you want.
The browse results display the name of each node. These names give you the specific user
identity.
The results are limited to 20 entries by default. Click See More to view up to 1000 results.
Add a user group to To add a group or user to the User Group profile, select it from the tree and click Add.
the profile.
After you select and add the node to the Added Groups column, the system displays the
Common Name (CN) and the Distinguished Name (DN).
Save the user group. Click Save to save the User Group profile you have configured.
Detecting synchronized identities 672
Configuring synchronized DGM policy conditions
1 Create the connection to the Establish the connection from the Enforce Server to a directory server such
directory server. as Microsoft Active Directory.
2 Create the User Group. Create one or more User Groups on the Enforce Server and populate the
User Groups with the exact identities from the users, groups, and business
units that are defined in the directory server
4 Configure one or more group Choose the type of synchronized DGM rule you want to implement and
rules or exceptions. reference the User Group. After the policy and the group are linked, the
policy applies only to those identifies in the referenced User Group.
directory group server. You can implement this condition in a policy group (identity)
rule or exception.
See Configuring policies on page 330.
Note: If the identity being detected is a user, the user must be actively logged on
to a DLP Agent-enabled system for the policy to match.
Parameter Description
Select User Groups to Select one or more User Groups that you want this policy to detect.
include in this policy
If you have not created a User Group, click Create a new User Group.
Match On This condition matches on the entire message. The Envelope option is selected by default.
You cannot select any other message component.
Also Match Select this option to create a compound condition. All conditions in a rule or exception
must match to trigger an incident.
1 Select User Groups to Select the User Group(s) that you want this policy to match on.
include in this policy
If you have not created a User Group, click Create a new Endpoint User
Group option.
2 Match On This rule detects the entire message, not individual components. The Envelope
option is selected by default. You cannot select any other message component.
3 Also Match Select this option to create a compound condition. All conditions in a rule or
exception must match to trigger an incident.
See About two-tier detection for EDM on the endpoint on page 380.
You cannot combine either type of profiled DGM condition with an Endpoint: Block
or Endpoint: Notify response rule in a policy. If you do, the system reports that
the policy is misconfigured.
See Troubleshooting policies on page 357.
1 Create the data source file. Create a data source file from the directory server or database you want to
profile. Make sure the data source file contains the appropriate fields.
The following fields are supported for profiled DGM:
Email address
IP address
Window user name (in the format domain\user)
IM screen name
See Creating the exact data source file for profiled DGM on page 384.
2 Prepare the data source See Configuring Exact Data profiles on page 381.
file for indexing.
See Preparing the exact data source file for indexing on page 384.
3 Create the Exact Data This includes uploading the data source file to the Enforce Server, mapping
Profile. the data fields, and indexing the data source.
See Uploading exact data source files to the Enforce Server on page 386.
4 Define the profiled DGM See Configuring the Sender/User based on a Profiled Directory condition
condition. on page 678.
5 Test the profiled DGM Use a test policy group and verify that the matches the policy generates are
policy. accurate.
See Test and tune policies to improve match accuracy on page 365.
Sender/User based on a Directory If this condition is implemented as a policy rule, a match occurs only if the
from <EDM Profile> sender or user of the data is contained in the index profile. If this condition is
implemented as a policy exception, the data will be excepted from matching
if it is sent by a sender/user listed in the index profile
Recipient based on a Directory from If this condition is implemented as a policy rule, a match occurs only if the
<EDM Profile> recipient of the data is contained in the index profile. If this condition is
implemented as a policy exception, the data will be excepted from matching
if it is received by a recipient listed in the index profile.
After you select the Exact Data Profile, when you configure the rule, the directory
you selected and the sender identifier(s) appear at the top of the page.
Table 33-3 describes the parameters for configuring the Sender/User based on a
Directory an EDM Profile condition.
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing,Sales in the text
box. If the condition is implemented as a rule, in this example a match occurs only if the sender or
user works in Marketing or Sales (as long as the other input content meets all other detection criteria).
If the condition is implemented as an exception, in this example the system ignores from matching
messages from a sender or user who works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any sender
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
Table 33-4 Configuring the Recipient based on a Directory from an EDM profile
condition
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing, Sales in the text
box. For a detection rule, this example causes the system to capture an incident only if at least one
recipient works in Marketing or Sales (as long as the input content meets all other detection criteria).
For an exception, this example prevents the system from capturing an incident if at least one recipient
works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any recipient
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
Include an email address field in the Exact Data Profile for profiled
DGM
You must include the appropriate fields in the Exact Data Profile to implement
profiled DGM.
See Creating the exact data source file for profiled DGM on page 384.
If you include the email address field in the Exact Data Profile for profiled DGM and
map it to the email data validator, email address will appear in the Directory EDM
drop-down list (at the remediation page).
Detecting profiled identities 681
Best practices for using profiled DGM
Use profiled DGM for Network Prevent for Web identity detection
If you want to implement DGM for Network Prevent for Web, use one of the profiled
DGM conditions to implement identity matching. For example, you may want to use
identity matching to block all web traffic for a specific users. For Network Prevent
for Web, you cannot use synchronized DGM conditions for this use case.
See Creating the exact data source file for profiled DGM on page 384.
See Configuring the Sender/User based on a Profiled Directory condition
on page 678.
Chapter 34
Supported file formats for
detection
This chapter includes the following topics:
Note: While there is some overlap among file types supported for extraction and
for identification (because if the system can can crack the file it must be able to
identify its type), the supported formats for each operation are distinct and
implemented using different match conditions. The number of file formats supported
for type identification is much broader than those supported for content extraction.
File type Symantec Data Loss Prevention does Explicitly using the Message See Supported formats for file
identification not rely on file extensions to identify the Attachment or File Type type identification
format. File type is identified by the Match file property condition. on page 684.
unique binary signature of the file
format.
File contents File contents is any text-based content Implicitly using one or more See Supported formats for
extraction that can be viewed through the native content match conditions, content extraction
or source application. including EDM, IDM, VML, on page 699.
data identifiers, keyword,
regular expressions.
Subfile Subfiles are files encapsulated in a Implicitly using one or more See Supported encapsulation
extraction parent file. Subfiles are extracted and content match conditions, formats for subfile extraction
(Subfile) processed individually for identification including EDM, IDM, VML, on page 706.
and content extraction. If the subfile data identifiers, keyword,
format is not supported by default, a regular expressions.
custom method can be used to detect
and crack the file.
Supported file formats for detection 684
Supported formats for file type identification
Metadata Metadata is information about the file, Available for content-based See Supported file formats
extraction such as author, version, or user-defined match conditions. Must be for metadata extraction
(Metadata) tags. Generally limited to Microsoft enabled. on page 707.
Office documents (OLE-enabled) and
Adobe PDF files. Metadata support may
differ between agent and server.
ACT
Adobe FrameMaker
Adobe PDF
ANSI
Apple Double
Apple Single
Applix Alis
Applix Asterix
Applix Graphics
Applix Presents
Applix Spreadsheets
Applix Words
ARC/PAK Archive
ASCII
AutoCAD Drawing
AutoDesk WHIP
AutoShade Rendering
BinHex
Corel Presentations
CorelDRAW
CPT Communication
dBase Database
DCX Fax
DECdx
DG CEOwrite
DIF Spreadsheet
DisplayWrite
EBCDIC Text
ENABLE
Enhanced Metafile
Envoy (EVY)
Executable- Other
Executable- UNIX
Executable- VAX
Executable- SUN
FileMaker (Macintosh)
Framework
Framework II
Fujitsu Oasys
GIF
GZIP
Harvard Graphics
Hewlett-Packard
Supported file formats for detection 689
Supported formats for file type identification
HTML
IBM DCA-FFT
Informix SmartWare II
Interleaf
Java Archive
JPEG
JustSystems Ichitaro
KW ODA G4 (G4)
Lasergraphics Language
Legato Extender
Lotus Pic
Lotus SmartMaster
Lyrix MacBinary
MacBinary
Macintosh Raster
MacPaint
MacWrite
MacWrite II
Supported file formats for detection 691
Supported formats for file type identification
MASS-11
Micrografx Designer
Microsoft Access
Microsoft OneNote
Microsoft Outlook
Microsoft PowerPoint PC
Microsoft Project
Microsoft Publisher
Microsoft Visio
Microsoft Word PC
Microsoft Works
Microstation
MIDI
MPEG-1 Video
MPEG-2 Audio
MultiMate 4.0
Multiplan Spreadsheet
Navy DIF
NeXT/Sun Audio
NIOS TOP
Nota Bene
ODA/ODIF
Office Writer
OLIDIF
OmniOutliner (OO3)
Open PGP
PC COM executable
PC Library Module
PC Object Module
PC PaintBrush
PCD Image
PeachCalc Spreadsheet
Persuasion Presentation
Philips Script
PKZIP
Plan Perfect
PostScript File
PRIMEWORD
QuickTime Movie
RAR archive
Real Audio
Reflex Database
RIFF MIDI
SAMNA Word IV
SGML
SMTP document
Supercalc Spreadsheet
SYLK Spreadsheet
Symphony Spreadsheet
Tape Archive
Truevision Targa
Ultracalc Spreadsheet
Unicode Text
Uniplex (V6.01)
UNIX Compress
Usenet format
UUEncoding
Volkswriter
VRML
WANG PC
Wang WITA
Windows Bitmap
Windows Metafile
Windows Palette
WinZip
Word Connection
WordERA (V 1.0)
WordPad
WordPerfect Graphics 1
WordPerfect Graphics 2
WordStar
WordStar 2000
WordStar 6.0
WriteNow
X Bitmap (XBM)
Supported file formats for detection 699
Supported formats for content extraction
X Image
X Pixmap (XPM)
XHTML
XML (generic)
XyWrite
Word-processing file formats See Supported word-processing formats for content extraction on page 700.
Presentation file formats See Supported presentation formats for content extraction on page 701.
Spreadsheet file formats See Supported spreadsheet formats for content extraction on page 702.
Text and markup file formats See Supported text and markup formats for content extraction on page 703.
Email file formats See Supported email formats for content extraction on page 704.
CAD file formats See Supported CAD formats for content extraction on page 705.
Supported file formats for detection 700
Supported formats for content extraction
Table 34-3 Supported file format categories for content extraction (continued)
Graphics file formats See Supported graphics formats for content extraction on page 705.
Database file formats See Supported database formats for content extraction on page 705.
Other file formats See Other file formats supported for content extraction on page 706.
Encapsulation file formats See Supported encapsulation formats for subfile extraction on page 706.
ApplixWords AW
DisplayWrite IP
OpenOfficeWriter SXW
OpenOfficeWriter ODT
StarOfficeWriter SXW
StarOfficeWriter ODT
WordPad RTF
XyWrite XY4
Applix Presents AG
Applix Spreadsheets AS
Table 34-7 Supported text and markup file formats for content extraction
ANSI TXT
ASCII TXT
HTML HTM
XHTML HTM
Microstation DGN
File Share Encryption (PGP You can decrypt Symantec File Share encrypted files and extract file contents for
Netshare) policy evaluation using the File Share plugin. Refer to the Symantec Data Loss
Prevention Encryption Insight Implementation Guide.
Note: Encryption Insight is only available with Network Discover/Cloud Storage
Discover.
Custom You can write a plug-in to perform content, subfile, and metadata extraction
operations on custom file formats. Refer to the Symantec Data Loss Prevention
Content Extraction Plug-in Developers Guide.
Note: Content extraction plug-ins are limited to detection servers.
7-Zip 7Z
BinHex HQX
GZIP GZ
PKZIP ZIP
WinZip ZIP
UNIX Compress Z
UUEncoding UUE
Example fields:
Microsoft Office documents, for
example: Title
For Microsoft Office documents, the
Subject
Word (DOC, DOCX) system extracts Object Linking and
Embedding (OLE) metadata. Author
Excel (XLS, XLSX)
Keywords
PowerPoint (PPT, PPTX)
Other custom fields
Example fields:
For Adobe PDF files, the system
extracts Document Information Author
Dictionary (DID) metadata. The system Title
Adobe PDF files
does not support Adobe Extensible Subject
Metadata Platform (XMP) metadata Creation
extraction.
Update dates
Use the filter utility to verify metadata See Always use the filter utility to
Other file formats (including binary and
extraction for other file formats. verify file format metadata support
text)
on page 710.
Consideration Topic
Always use filter to verify file format metadata support. See Always use the filter utility to verify file format
metadata support on page 710.
Enable metadata detection only if it is necessary. See Distinguish metadata from file content and application
data on page 712.
Avoid generating false positives by selecting keywords See Use and tune keyword lists to avoid false positives
carefully. on metadata on page 714.
Understand resource implications of endpoint metadata See Understand performance implications of enabling
extraction. endpoint metadata detection on page 714.
Create a separate endpoint configuration for metadata See Create a separate endpoint configuration for
detection. metadata detection on page 714.
Use response rules to add metadata tags to incidents. See Use response rules to tag incidents with metadata
on page 714.
Note: The data output by the filter utility is in ASCII format. Symantec Data Loss
Prevention processes data in Unicode format. Therefore, you may rely on the
existence of the fields returned by the filter utility, but the metadata detected by
Symantec Data Loss Prevention may not look identical to the filter output.
Supported file formats for detection 711
Supported file formats for metadata extraction
3 Issue the following command to run the filter program and display its syntax
and optional parameters.
filter -help
As indicated by the help, you use the following syntax to execute the filter utility:
filter [options] inputfile outputfile
The inputfile is an instance of the file format you want to verify. The
outputfile is a file the filter utility writes the extracted data to.
4 Execute filter against an instance of the file format to verify metadata extraction.
For example, on Windows you would issue the following command:
filter -i \temp\myfile.doc \temp\metadata_output.txt
Where myfile.doc is a file containing metadata you want to verify and have
copied to the \temp directory, and metadata_output.txt is the name of the file
you want the system to generate and write the extracted data to.
5 Review the filter output. The output data should be similar to the following:
1 2 1252 CodePage
1 1 "S" Title
0 0 (null)
1 1 "P" Author
0 0 (null)
0 0 (null)
0 1 "" (null)
1 1 "m" LastAuthor
1 1 "1" RevNumber
1 = valid field The type of data: The data payload for the The name of the field (empty
field. or null if the field is invalid).
0 = invalid field 1 = String
Note: You may ignore rows 2 = Integer
where the first column is 0.
3 = Date/Time
5 = Boolean
Note: This list is not exhaustive and is provided for quick reference only. There may
be other types of data that are not extracted as metadata. The best practice is to
use the filter utility to verify file format metadata support. See Always use the filter
utility to verify file format metadata support on page 710.
Application data Application data including message transport information is extracted separately from
file format extraction. For all inbound messages, the system extracts message envelope
(header) and subject information as text at the application layer. The type of application
data that is extracted depends on the channels supported by the detection server or
endpoint.
Headers and footers Document header and footer text is extracted as content, not metadata. To avoid false
positives, it is recommended that you remove or whitelist headers and footers from
documents.
See the Indexed Document Matching (IDM) chapter in the Symantec Data Loss
Prevention Administration Guide for details.
Markup text Markup text is extracted as content, not metadata. Markup text extraction is supported
for HTML, XML, SGML, and more. Markup text extraction is disabled by default.
See the "Advanced Server Settings" topic in the Symantec Data Loss Prevention
Administration Guide to enable it.
Hidden text Hidden text is extracted as content, not metadata. Hidden text extraction in the form
of tracked changes is supported for some Microsoft Office file formats. Hidden text
extraction is disabled by default.
See the "Advanced Server Settings" topic in the Symantec Data Loss Prevention
Administration Guide to enable it.
Watermarks Text-based watermarks are extracted as content, not metadata. Text-based watermark
detection is supported for Microsoft Word documents (versions 2003 and 2007). It is
not supported for other file formats.
Supported file formats for detection 714
Supported file formats for metadata extraction
Pattern
[0123678]\d{8}
[0123678]\d{3}-\d{4}-\d
ABA Checksum Every ABA routing number must start with the following
two digits: 00-15,21-32,61-72,80 and pass an ABA specific,
position-weighted check sum.
It eliminates common test numbers, such as 123456789, ranges reserved for future
use, and all the same digit.
Pattern
[0123678]\d{8}
[0123678]\d{3}-\d{4}-\d
ABA Checksum Every ABA routing number must start with the following
two digits: 00-15,21-32,61-72,80 and pass an ABA specific,
position-weighted check sum.
Exclude beginning characters With this option selected, data beginning with any of the
following list of values will not be matched.
Input: 123456789
Duplicate digits Ensures that a string of digits are not all the same.
Pattern
[0123678]\d{8}
[0123678]\d{3}-\d{4}-\d
Library of system data identifiers 719
Australian Medicare Number data identifier
ABA Checksum Every ABA routing number must start with the following
two digits: 00-15,21-32,61-72,80 and pass an ABA specific,
position-weighted checksum.
Exclude beginning characters With this option selected, data beginning with any of the
following list of values will not be matched.
Input: 123456789
Duplicate digits Ensures that a string of digits are not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched. Input:
Pattern
\d{4} \d{5} \d \d
\d{4}-\d{5}-\d-\d
Library of system data identifiers 720
Australian Tax File Number data identifier
Pattern
\d{8}
\d{9}
Australian Tax File validation check Computes the checksum and validates the pattern against
it.
Pattern
\d{9}
Pattern
\d{9}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
\d{3}-\d{3}-\d{3}
Pattern
\d{3}.\d{3}.\d{3}
\d{3}-\d{3}-\d{3}
Exclude beginning characters With this option selected, data beginning with any of the
following list of values will not be matched.
Input:
8, 123456789
Pattern
\d{3}-\d{3}-\d{3}
Library of system data identifiers 723
Codice Fiscale data identifier
Exclude beginning characters With this option selected, data beginning with any of the
following list of values will not be matched.
Input:
0, 8, 123456789
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[A-Z]{6}[0-9LMNPQRSTUV]{2}[ABCDEHLMPRST][0-9LMNPQRSTUV]{2}[A-Z] [0-9LMNPQRSTUV]{3}[A-Z]
Codice Fiscale Control Key Check Computes the control key and checks if it is valid.
Library of system data identifiers 724
Credit Card Magnetic Stripe Data data identifier
Table 35-20 Credit Card Magnetic Stripe Data medium breadth patterns
;1800\d{11}= %B3[068]\d{12}^[A-Z]{1}
;6011-\d{4}-\d{4}-\d{4}= %B3[068]\d{2} \d{6} \d{4}^[A-Z]{1}
;6011\d{12}= %B4\d{12}^[A-Z]{1}
;3[068]\d{12}= %B3[47]\d{2}-\d{6}-\d{5}^[A-Z]{1}
;4\d{12}= %B4\d{15}^[A-Z]{1}
;3[47]\d{2}-\d{6}-\d{5}= %B3[47]\d{13}^[A-Z]{1}
;5[1-5]\d{2}-\d{4}-\d{4}-\d{4}= %B5[1-5]\d{14}^[A-Z]{1}
;4\d{3}-\d{4}-\d{4}-\d{4}= %B2131\d{11}^[A-Z]{1}
;3\d{3}-\d{4}-\d{4}-\d{4}= %B3\d{15}^[A-Z]{1}
;2149\d{11}= %B2149-\d{6}-\d{5}^[A-Z]{1}
;2014\d{11}= %B2014-\d{6}-\d{5}^[A-Z]{1}
;2014-\d{6}-\d{5}=
%B1800\d{11}^[A-Z]{1}
%B6011-\d{4}-\d{4}-\d{4}^[A-Z]{1}
%B6011\d{12}^[A-Z]{1}
Library of system data identifiers 726
Credit Card Number data identifier
Table 35-21 Credit Card Magnetic Stripe Data medium breadth validator
Validator Description
Luhn Check Computes the Luhn checksum which every instance must
pass.
\d{16} 2149-\d{6}-\d{5}
\d{4}.\d{4}.\d{4}.\d{4} 3[068]\d{12}
2014-\d{6}-\d{5} 3[47]\d{2}.\d{6}.\d{5}
2149.\d{6}.\d{5} 3[47]\d{2}-\d{6}-\d{5}
2149\d{11} 4\d{12}
Luhn Check Computes the Luhn checksum which every Credit Card Number must pass.
1800\d{11} 3\d{3}.\d{4}.\d{4}.\d{4}
2014.\d{6}.\d{5} 3\d{3} \d{4} \d{4} \d{4}
2014\d{11} 3\d{3}-\d{4}-\d{4}-\d{4}
2014-\d{6}-\d{5} 4\d{3}.\d{4}.\d{4}.\d{4}
2149-\d{6}-\d{5} 5[1-5]\d{2}.\d{4}.\d{4}.\d{4}
3[068]\d{2}.\d{6}.\d{4} 5[1-5]\d{2}-\d{4}-\d{4}-\d{4}
3[068]\d{2}-\d{6}-\d{4} 6011\d{12}
3[47]\d{2}.\d{6}.\d{5} 6011-\d{4}-\d{4}-\d{4}
3[47]\d{2}-\d{6}-\d{5}
3\d{15}
Luhn Check Validator computes the Luhn checksum which every Credit Card Number must
pass.
Exclude data match Excludes anything that matches the specified text.
Library of system data identifiers 729
Credit Card Number data identifier
2014\d{11} 5[1-5]\d{14}
2014-\d{6}-\d{5} 2131\d{11}
6011-\d{4}-\d{4}-\d{4} 3\d{3}-\d{4}-\d{4}-\d{4}
6011\d{12} 3\d{15}
3[068]\d{12} 2149\d{11}
3[068]\d{2}-\d{6}-\d{4}
3[47]\d{2}-\d{6}-\d{5}
3[47]\d{13}
4\d{3}-\d{4}-\d{4}-\d{4}
3\d{3}.\d{4}.\d{4}.\d{4}
2149.\d{6}.\d{5}
2014.\d{6}.\d{5}
6011.\d{4}.\d{4}.\d{4}
3[068]\d{2}.\d{6}.\d{4}
3[47]\d{2}.\d{6}.\d{5}
4\d{3}.\d{4}.\d{4}.\d{4}
1800\d{11}
4\d{12}
4\d{15}
Library of system data identifiers 731
Credit Card Number data identifier
Luhn Check Validator computes the Luhn checksum which every Credit Card Number must
pass.
Exclude data match Excludes anything that matches the specified text.
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Find keywords inputs account number, account ps, american express, americanexpress, amex, bank
card, bankcard, card num, card number, cc #, cc#, ccn, check card, checkcard,
credit card, credit card #, credit card number, credit card#, debit card, debitcard,
diners club, dinersclub, discover, enroute, japanese card bureau, jcb, mastercard,
mc, visa
Library of system data identifiers 732
CUSIP Number data identifier
Pattern
\d{4}\w{4}\d
Cusip Validation Validator checks for invalid CUSIP ranges and computes the CUSIP checksum
(Modulus 10 Double Add Double algorithm).
Pattern
\d{4}\w{4}\d
Cusip Validation Validator checks for invalid CUSIP ranges and computes the
CUSIP checksum (Modulus 10 Double Add Double algorithm).
Find keywords With this option selected, at least one of the following keywords
or key phrases must be present for the data to be matched.
Pattern
\d{4}\w{4}\d
Cusip Validation Validator checks for invalid CUSIP ranges and computes the CUSIP checksum
(Modulus 10 Double Add Double algorithm).
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Library of system data identifiers 734
Drivers License Number CA State data identifier
Find keywords input cusip, c.u.s.i.p., Committee on Uniform Security Identification Procedures, American
Bankers Association, Standard & Poor's, S&P, National Numbering Association,
National Securities Identification Number
Pattern
\l\d{7}
Pattern
\l\d{7}
Find keywords With this option selected, at least one of the following keywords or key phrases must
be present for the data to be matched.
Find keywords input driver license, drivers license, driver's license, driver licenses, drivers licenses,
driver's licenses, dl#, dls#, lic#, lics#
Find keywords With this option selected, at least one of the following keywords or key phrases must
be present for the data to be matched.
Table 35-37 Drivers License Number- FL, MI, MN States wide breadth patterns
Patterns
\l\d{12}
\l\d{3}-\d{3}-\d{2}-\d{3}-\d
\l-\d{3}-\d{3}-\d{3}-\d{3}
Table 35-38 Drivers License Number- FL, MI, MN States medium breadth patterns
Pattern
\l\d{12}
\l\d{3}-\d{3}-\d{2}-\d{3}-\d
\l-\d{3}-\d{3}-\d{3}-\d{3}
Table 35-39 Drivers License Number- FL, MI, MN States medium breadth
validators
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Find keywords input driver license, drivers license, driver's license, driver licenses, drivers licenses,
driver's licenses, dl#, dls#, lic#, lics#
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Pattern
\\l\\d{3}-\\d{4}-\\d{4}
\l\d{11}
Pattern
\\l\\d{3}-\\d{4}-\\d{4}
Library of system data identifiers 738
Drivers License Number - NJ State data identifier
Pattern
\l\d{11}
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Find keywords input driver license, drivers license, driver's license, driver
licenses, drivers licenses, driver's licenses, dl#, dls#, lic#,
lics#
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Note: The wide breadth option does not include any validators.
Library of system data identifiers 739
Drivers License Number - NY State data identifier
Patterns
\l\d{14}
Pattern
\\l\\d{3}-\\d{4}-\\d{4}
\l\d{11}
Validators Description
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Find keywords input driver license, drivers license, driver's license, driver
licenses, drivers licenses, driver's licenses, dl#, dls#, lic#,
lics#
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Note: The wide breadth option does not include any validators.
Pattern
\d{9}
Pattern
\\l\\d{3}-\\d{4}-\\d{4}
\l\d{11}
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Library of system data identifiers 741
French INSEE Code data identifier
Find keywords input driver license, drivers license, driver's license, driver licenses, drivers licenses,
driver's licenses, dl#, dls#, lic#, lics#
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Pattern
\d{13} \d{2}
d{15}
INSEE Control Key This validator computes the INSEE control key and compares it to the last 2 digits
of the pattern.
The wide breadth edition of the Hong Kong ID data identifier detects 8 characters
in the form LDDDDDD(D) or LDDDDDD(A). The last character in the detected string
is used to validate a checksum.
Patterns
\w\d{6}(\d)
\w\d{6}(A)
U\w\d{6}(\d)
U\w\d{6}(A)
Hong Kong ID Computes the checksum and validates the pattern against it.
Pattern Description
AD\d{2}-\d{4}-\d{4}-\w{4}-\w{4}-\w{4}
AT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
Library of system data identifiers 743
IBAN Central data identifier
Pattern Description
BE\d{2}-\d{4}-\d{4}-\d{4}
CH\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w
DE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
IT\d{2}-[A-Z]\d{3}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{3}
LI\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w
LU\d{2}-\d{3}\w-\w{4}-\w{4}-\w{4}
MC\d{2}-\d{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{4}-\w\d{2}
MT\d{2}[A-Z]{4}\d{4}\d\w{3}\w{4}\w{4}\w{4}\w{3} Malta
MT\d{2}-[A-Z]{4}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w{4}-\w{3}
SM\d{2}-[A-Z]\d{3}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{3}
Library of system data identifiers 744
IBAN East data identifier
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Pattern Description
BA\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
BG\d{2}-[A-Z]{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{2}
CY\d{2}-\d{4}-\d{4}-\w{4}-\w{4}-\w{4}-\w{4}
CZ\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
Library of system data identifiers 745
IBAN East data identifier
Pattern Description
EE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
GR\d{2}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{4}-\w{3}
HR\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d
HU\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
IL\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{3}
LT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
LV\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w
ME\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
MK\d{2}-\d{3}\w-\w{4}-\w{4}-\w\d{2}
Library of system data identifiers 746
IBAN East data identifier
Pattern Description
PL\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
RO\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w{4}
RS\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
SI\d{2}-\d{4}-\d{4}-\d{4}-\d{3}
SK\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
TN59-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
TR\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w{4}-\w{2}
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Library of system data identifiers 747
IBAN West data identifier
Pattern Description
DK\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
ES\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
FI\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
FO\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
FR\d{2}-\d{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{4}-\w\d{2}
GB\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{4}-\d{2}
Library of system data identifiers 748
IBAN West data identifier
Pattern Description
GI\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w{3}
GL\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
IE\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{4}-\d{2}
IS\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
NL\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{2}
NO\d{2}-\d{4}-\d{4}-\d{3}
PT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d
SE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Library of system data identifiers 749
IP Address data identifier
Note: The patterns for the IP Address data identifier are tuned to match IPv4 address
formats. You can create a custom data identifier to detect IPv6 address formats.
See About IPv6 support for Network Monitor on page 1127.
Pattern
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[0-9]
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[1-2][0-9]?
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[3][0-2]?
Validator Description
IP Basic Check Every IP address must match the format x.x.x.x and every
number must be less than 256.
Library of system data identifiers 750
IP Address data identifier
Pattern
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[0-9]
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[1-2][0-9]?
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[3][0-2]?
IP Octet Check Every IP address must match the format x.x.x.x, every number must be less than 256,
and no IP address can contain only single-digit numbers (1.1.1.2).
Pattern
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[0-9]
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[1-2][0-9]?
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[3][0-2]?
Library of system data identifiers 751
National Drug Code (NDC) data identifier
IP Octet Check Every IP address must match the format x.x.x.x, every number must be less than 256,
and no IP address can contain only single-digit numbers (1.1.1.2).
IP Octet Check Checks whether the IP address falls into any of the "Bogons" ranges. If so the match
is invalid.
Patterns
*?\d{4}-\d{4}-\d{2}
Library of system data identifiers 752
National Drug Code (NDC) data identifier
Table 35-65 National Drug Code (NDC) wide breadth patterns (continued)
Patterns
\d{5}-*?\d{3}-\d{2}
\d{5}-\d{4}-*?\d
\d{5}-\d{4}-\d{2}
Note: The medium edition of this data identifier does not include any validators.
Note: The wide breadth edition of this data identifier allows for the NDC number to
be space-delimited; the medium breadth edition does not. That is the difference
between the wide and medium editions of this data identifier.
Pattern
*?\d{4}-\d{4}-\d{2}
\d{5}-*?\d{3}-\d{2}
\d{5}-\d{4}-*?\d
\d{5}-\d{4}-\d{2}
Library of system data identifiers 753
People's Republic of China ID data identifier
Pattern
*?\d{4}-\d{4}-\d{2}
\d{5}-*?\d{3}-\d{2}
\d{5}-\d{4}-*?\d
\d{5}-\d{4}-\d{2}
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Pattern
\d{17}[Xx]
Library of system data identifiers 754
Randomized US Social Security Number (SSN) data identifier
Pattern
\d{18}
China ID checksum validator Computes the checksum and validates the pattern against
it.
Table 35-72 lists the validators and data input used for the Randomized US SSN
data identifier.
Exclude beginning characters 666, 000, 123456789, 111111111, See Using pattern validators
222222222, 333333333, 444444444, on page 590.
555555555, 666666666, 77777777,
888888888
Number Delimiter
Pattern
[SFTGsftg]\d{7}\w
Table 35-75 South Korea Resident Registration Number wide breadth patterns
Pattern
\d{2}[01]\d[0123]\d{8}
\d{2}[01]\d[0123]\d-\d{7}
Table 35-76 South Korea Resident Registration Number wide breadth validators
Advanced KRRN Validation Validates that the 3rd and 4th digit are a valid month, that the 5th and 6th digit are
a valid day, and the checksum matches the check digit.
Table 35-77 South Korea Resident Registration Number medium breadth pattern
Pattern
\d\d[01]\d[0123]\d-\d{7}
Validator Description
Advanced KRRN Validation Validates that the 3rd and 4th digit are a valid month, that the 5th and 6th digit are
a valid day, and the checksum matches the check digit.
The wide breadth edition of the Spanish DNI ID data identifier detects an 8-digit
number followed by a hyphen and letter. Optionally the letter X and a hyphen can
appear at the beginning for foreign nationals. The last letter must match a checksum
algorithm.
Pattern
\d{8}-\w
X-\d{8}-\w
DNI control key check Computes the control key and checks if it is valid.
Pattern
[A-Z]{6}\w{2}
Library of system data identifiers 759
SWIFT Code data identifier
Pattern
[A-Z]{6}\w{5}
Require beginning characters With this option selected, any of the following list of values are required at the
beginning of the matched data.
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Find keywords input bic, bic#, international organization for standardization 9362, iso 9362, iso9362,
swift, swift#, swiftcode, swiftnumber, swiftroutingnumber.
Pattern
[A-Z]{6}\w{2}
[A-Z]{6}\w{5}
Validator Description
Require beginning characters With this option selected, any of the following list of values are required at the
beginning of the matched data.
Find keywords With this option selected, at least one of the following keywords or keyphrases
must be present for the data to be matched.
Find keywords input bic#, international organization for standardization 9362, iso 9362, iso9362, swift#,
swiftcode, swiftnumber, swiftroutingnumber, swift code, swift number, swift routing
number, bic number, bic code, bic #
Library of system data identifiers 760
Swiss AHV Number data identifier
Pattern
\d{8}-\w
X-\d{8}-\w
Validator Description
Patterns
[A-Z][12][0-3]\d{7}
[A-Z][ABCD]\d{8}
Library of system data identifiers 761
UK Drivers License Number data identifier
Validator Description
Pattern
\w{5}\d[0156]\d{4}\w{3}\l{2}
Pattern
\w{5}\d[0156]\d{4}\w{3}\l{2}
UK Drivers License Every UK drivers license must be 16 characters and the number at the 8th and 9th
position must be larger than 00 and smaller than 32.
Pattern
\w{5}\d[0156]\d{4}\w{3}\l{2}
UK Drivers License Every UK drivers license must be 16 characters and the number at the 8th and 9th
position must be larger than 00 and smaller than 32.
Find keywords: driver's At least one of the following keywords or key phrases must be present for the data
license-related to match:
Find keywords: UK-related At least one of the following keywords or keyphrases must be present for the data
to match:
Pattern
\l{2,3}\d{1,4}
The wide breadth edition of the Electoral Roll Number data identifier implements
two validators to require the presence of an electoral number-related keyword and
a UK-reated keyword.
Validator Description
Find keywords: electoral At least one of the following keywords or key phrases must be present for the data
number-related to match:
electoral #, electoral number, electoral roll #, electoral roll no., electoral roll
number, electoral roll#, electoral#, electoralnumber, electoralroll#,
electoralrollno
Library of system data identifiers 764
UK National Health Service (NHS) Number data identifier
Validator Description
Find keywords: UK-related At least one of the following keywords or key phrases must be present for the data
to match:
Note: This data identifier does not provide a wide breadth option.
Table 35-96 UK National Health Service (NHS) Number medium breadth patterns
Pattern Description
Table 35-96 UK National Health Service (NHS) Number medium breadth patterns
(continued)
Pattern Description
The medium breadth edition of the UK National Health Service (NHS) Number data
identifier implements three validators: one to validate the NHS checksum, another
to perform numerical validation using the final digit, and a third to check for the
presence of an NHS-related keyword.
Validator Description
Find keywords: NHS-related At least one of the following keywords or key phrases must
be present for the data to match:
Table 35-98 UK National Health Service (NHS) Number narrow breadth patterns
Pattern Description
The narrow breadth edition of the UK National Health Service (NHS) Number data
identifier implements four validators: one to validate the NHS checksum, another
Library of system data identifiers 766
UK National Insurance Number data identifier
to perform numerical validation using the final digit, a third to require the presence
of an NHS-related keyword, and a fourth to require the presence of a UK-related
keyword.
Table 35-99 UK National Health Service (NHS) Number narrow breadth validators
Find keywords: NHS-related At least one of the following keywords or key phrases must
be present for the data to match:
Find keywords: UK-related At least one of the following keywords or key phrases must
be present for the data to match:
The first and second letter cannot be D, F, I, Q, U and V. The second letter also
cannot be O.
Pattern Description
Pattern Description
Pattern Description
The narrow breadth edition of the UK National Insurance Number data identifier
implements a validator that requires the presence of a national insurance-related
keyword.
Find keywords: Insurance-related At least one of the following keywords or key phrases must be present for the
data to match:
Note: The wide breadth edition of the UK Passport Number data identifier does not
include any validators.
Pattern Description
Pattern Description
The medium breadth edition of the UK Passport Number data identifier implements
three validators: one to eliminate common test numbers, such as 123456789;
another to eliminate numbers with all the same digits; and a third that requires the
presence of a passport-related keyword.
Exclude beginning characters Data beginning with any of the following list of values will not be matched:
123456789
Duplicate digits Ensures that a string of digits are not all the same.
Find keywords: Passport-related At least one of the following keywords or key phrases must be present for the
data to match:
Pattern Description
The narrow breadth edition of the UK Passport Number data identifier implements
four validators: one to eliminate common test numbers, such as 123456789; another
to eliminate numbers with all the same digits; a third that requires the presence of
a passport-related keyword; and a fourth that requires the presence of a UK-related
keyword.
Exclude beginning characters Data beginning with any of the following list of values will not be matched:
123456789
Duplicate digits Ensures that a string of digits are not all the same.
Find keywords: Passport-related At least one of the following keywords or key phrases must be present for the
data to match:
Find keywords: UK-related At least one of the following keywords or key phrases must be present for the
data to match:
Note: The wide breadth edition of the UK Tax ID Number data identifier does not
include any validators.
Pattern Description
Pattern Description
The medium breadth edition of the UK Tax ID Number data identifier implements
two validators: one to eliminates common test numbers, such as 1234567890, and
another to eliminate numbers with all the same digit.
Duplicate digits Ensures that a string of digits are not all the same.
Exclude beginning characters Data beginning with any of the following list of values will
not be matched:
Pattern Description
The narrow breadth edition of the UK Tax ID Number data identifier implements
three validators: one to eliminates common test numbers, such as 1234567890;
another to eliminate numbers with all the same digit; and a third that requires the
presence of a tax identification-related keyword.
Duplicate digits Ensures that a string of digits are not all the same.
Exclude beginning characters Data beginning with any of the following list of values will
not be matched:
Find keywords: Tax ID-related At least one of the following keywords or key phrases must
be present for the data to match:
Narrow
See US Individual Tax Identification Number (ITIN) narrow breadth on page 774.
Note: The wide breadth edition of the US Individual Tax Identification Number (ITIN)
data identifier does not include any validators.
Table 35-114 US Individual Tax Identification Number (ITIN) wide breadth patterns
Pattern Description
9\d{2} [78]\d \d{4} Pattern for detecting the ITIN format separated by spaces.
Pattern Description
9\d{2} [78]\d \d{4} Pattern for detecting the ITIN format separated by spaces.
Library of system data identifiers 774
US Individual Tax Identification Number (ITIN) data identifier
Pattern Description
The medium breadth edition of the US Individual Tax Identification Number (ITIN)
data identifier implements a single validator to check the surrounding characters.
Pattern Description
9\d{2} [78]\d \d{4} Pattern for detecting the ITIN format separated by spaces.
The narrow breadth edition of the US Individual Tax Identification Number (ITIN)
data identifier implements three validators: one to check the surrounding characters,
another to ensure that the digits in the ITIN string are not all the same, and a third
that requires the presence of a ITIN-related keyword.
Duplicate digits Ensures that a string of digits are not all the same.
Library of system data identifiers 775
US Social Security Number (SSN) data identifier
Find keywords: ITIN-related At least one of the following keywords or key phrases must
be present for the data to be matched.
Pattern Description
\d{3}-\d{2}-\d{4} Matches the standard SSN format, which is any three digits followed by a hyphen,
two digits, a hyphen, and any four digits.
The wide breadth edition of the US Social Security Number (SSN) data identifier
implements three validators to ensure that the detected SSN is within validly
assigned number ranges, eliminate common test numbers, such as 123456789,
and all the same digit.
Validator Description
Advanced SSN Checks whether SSN contains zeros in any group, the area number (first group)
is less than 773 and not 666, the delimiter between the groups is the same, the
number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
SSN Area-Group number For a given area number (first group), not all group numbers (second group) might
have been assigned by the SSA. Validator eliminates SSNs with invalid group
numbers.
Pattern Description
\d{3}-\d{2}-\d{4} Matches the standard SSN format, which is any three digits followed by a hyphen,
two digits, a hyphen, and any four digits.
The medium breadth edition of the US Social Security Number (SSN) data identifier
implements three validators to ensure that the detected SSN is within validly
assigned number ranges, is not a common test number (such as 123456789), and
is not all the same digit
Validator Description
Advanced SSN Checks whether SSN contains zeros in any group, the area number (first group)
is less than 773 and not 666, the delimiter between the groups is the same, the
number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
SSN Area-Group number For a given area number (first group), not all group numbers (second group) might
have been assigned by the SSA. Validator eliminates SSNs with invalid group
numbers.
Pattern Description
\d{3}-\d{2}-\d{4} Matches the standard SSN format, which is any three digits followed by a hyphen,
two digits, a hyphen, and any four digits.
The narrow breadth edition of the US Social Security Number (SSN) data identifier
implements four validators to ensure that the detected SSN is within validly assigned
number ranges, is not a common test number (such as 123456789), is not all the
same digit, and the message containing the SSN includes a keyword
Advanced SSN Checks whether SSN contains zeros in any group, the area number (first group)
is less than 773 and not 666, the delimiter between the groups is the same, the
number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
SSN Area-Group number For a given area number (first group), not all group numbers (second group)
might have been assigned by the SSA. Validator eliminates SSNs with invalid
group numbers.
Find keywords: Social At least one of the following keywords or key phrases must be present for the
security-related data to be matched:
NASD Rule 2711 and NYSE Rules 351 and 472 policy template
The Drug, and Disease, and the Treatment keyword lists are updated with recent
keywords based on information from the U.S. Federal Drug Administration (FDA)
and other sources.
See Keep the keyword lists for your HIPAA and Caldicott policies up to date
on page 611.
Patient Data and Compound EDM and This compound rule looks for a match among the following EDM data
Drug Keywords Keyword Rule fields in combination with a keyword from the "Prescription Drug
Names" dictionary. Both conditions must be satisfied for the rule to
trigger an incident.
Account number
Email
ID card number
Last name
Phone
UK NHS (National Health Service) number
UK NIN (National Insurance Number)
Patient Data and Compound EDM and This compound rule looks for a match among the following EDM data
Disease Keywords Keyword Rule fields in combination with a keyword from the "Disease Names"
dictionary. Both conditions must be satisfied for the rule to trigger an
incident.
Account number
Email
ID card number
Last name
Phone
UK NHS (National Health Service) number
UK NIN (National Insurance Number)
Library of policy templates 783
Canadian Social Insurance Numbers policy template
Patient Data and Compound EDM and This compound rule looks for a match among the following EDM data
Treatment Keyword Rule fields in combination with a keyword from the "Medical Treatment
Keywords Keywords" dictionary. Both conditions must be satisfied for the rule
to trigger an incident:
Account number
Email
ID card number
Last name
Phone
UK NHS (National Health Service) number
UK NIN (National Insurance Number)
UK NHS Number Simple DCM Rule This rule looks for a keyword from "UK NIN Keywords" dictionary in
and Drug Keywords combination with a pattern matching the UK NIN data identifier and a
keyword from the "Prescription Drug Names" dictionary.
UK NHS Number Simple DCM Rule This rule looks for a keyword from "UK NIN Keywords" dictionary in
and Disease combination with a pattern matching the UK NIN data identifier and a
Keywords keyword from the "Disease Names" dictionary.
UK NHS Number Simple DCM Rule This rule looks for a keyword from "UK NIN Keywords" dictionary in
and Treatment combination with a pattern matching the UK NIN data identifier and a
Keywords keyword from the "Medical Treatment Keywords" dictionary.
This rule looks for a match to the Canadian Social Insurance Number
data identifier and a keyword from the "Canadian Social Ins. No. Words"
dictionary.
Table 36-2 Detection exception: Exclude emails that contain the mandated
keywords
Simple exception Content Matches Exclude emails that contain the mandated keywords (Keyword Match):
Keyword (DCM)
Match keyword from "[physical postal address]" or "advertisement".
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
Note: After you define the keywords, you can choose to count all
matches and require 2 keywords from the list to be matched.
Simple exception Content Matches Exception for CAN-SPAM compliant emails (IDM):
Document Profile
Exact content match (100%)
(IDM)
Look in the message body and attachments.
Check for existence.
If an exception is not met, the detection rule Monitor Email From Bulk Mailer
looks for a sender's email address that matches one from the "Bulk Mailer Email
Address" list, which is user-defined.
Library of policy templates 785
Common Spyware Upload Sites policy template
Simple rule Sender/User Matches Monitor Email From Bulk Mailer (Sender):
Pattern (DCM)
Match sender pattern(s): [[email protected]] (user defined)
Severity: High.
This rule looks for keywords (domains) from the "Competitor Domains"
dictionary, which is user-defined.
Confidential Documents, Simple IDM Rule with one This rule looks for content from specific documents
Indexed condition registered as confidential; returns a match if 80% or more
of the source document is found. If you do not have an
Indexed Document Profile configured this rule is dropped.
Confidential Documents Compound DCM Rule: This rule looks for a combination of keywords from the
Attachment/File Type and "Confidential Keywords" list and the following file types:
Keyword Match. Both
Microsoft Excel Macro
conditions must match for
Microsoft Excel
the rule to trigger an
incident. Microsoft Works Spreadsheet
SYLK Spreadsheet
Corel Quattro Pro
Multiplan Spreadsheet
Comma Separate Values
Applix Spreadsheets
Lotus 1-2-3
Microsoft Word
Adobe PDF
Microsoft PowerPoint
Proprietary Documents Compound DCM Rule: This compound rule looks for a combination of keywords
Attachment/File Type and from the "Proprietary Keywords" dictionary and the above
Keyword Match referenced file types.
Internal Use Only Compound DCM Rule: This compound rule looks for a combination of keywords
Documents Attachment/File Type and from the "Internal Use Only Keywords" dictionary and the
Keyword Match above referenced file types.
Documents Not For Compound DCM Rule: This compound rule looks for a combination of keywords
Distribution Attachment/File Type and from the "Not For Distribution Words" dictionary and the
Keyword Match above referenced file types.
This rule looks for a match to the credit card number system pattern
and a keyword from the "Credit Card Number Keywords" dictionary.
Table 36-6 EDM conditions for the Customer Data Protection policy template
Username/Password EDM Rule This rule looks for usernames and However, the following
Combinations passwords in combination with three or combinations are not a
more of the following fields: violation:
Table 36-6 EDM conditions for the Customer Data Protection policy template
(continued)
Date of Birth EDM Rule This rule looks for any three of the However, the following
following data fields in combination: combinations are not a
violation:
SSN
Phone Phone, email, and first
Email name
First Name Phone, email, and last
name
Last Name
Email, first name, and
Bank Card number
last name
Account Number
Phone, first name, and
ABA Routing Number
last name
Canadian Social Insurance Number
UK National Insurance Number
Date of Birth
Exact SSN or CCN EDM Rule This rule looks for an exact social
security number or bank card number.
Customer Directory EDM Rule This rule looks for Phone or Email.
Table 36-7 DCM conditions for the Customer Data Protection policy template
US Social Security Compound DCM This rule looks for a match to the See Randomized US Social
Number Patterns Rule Randomized US Social Security Security Number (SSN) data
number data identifier and a keyword identifier on page 754.
from the "US SSN Keywords"
dictionary.
Credit Card Numbers, All Compound DCM This rule looks for a match to the credit See Credit Card Number
Rule card number system pattern and a data identifier on page 726.
keyword from the "Credit Card Number
Keywords" dictionary.
ABA Routing Numbers Compound DCM This rule looks for a match to the ABA See ABA Routing Number
Rule Routing number data identifier and a data identifier on page 717.
keyword from the "ABA Routing
Number Keywords" dictionary.
See About the Exact Data Profile and index on page 375.
See Configuring policies on page 330.
Library of policy templates 789
Data Protection Act 1998 (UK) policy template
Description
This EDM rule looks for three of the following columns of data: However, the following combinations are not an
incident:
NIN (National Insurance Number)
Account number First name, last name, pin
Pin First name, last name, password
Bank card number First name, last name, email
First name First name, last name, phone
Last name First name, last name, mother's maiden name
Drivers license
Password
Tax payer ID
UK NHS number
Date of birth
Mother's maiden name
Email address
Phone number
Table 36-9 Additional detection rules in the Data Protection Act 1998 policy
template
Description
The UK Electoral Roll Numbers rule implements the UK Electoral Roll Number data identifier.
The UK National Insurance Numbers rule implements the narrow breadth edition of the UK National Insurance
Number data identifier.
Table 36-9 Additional detection rules in the Data Protection Act 1998 policy
template (continued)
Description
The UK Tax ID Numbers rule implements the narrow edition of the UK Tax ID Number data identifier.
The UK Drivers License Numbers rule implements the narrow breadth edition of the UK Driver's License number
data identifier.
The UK Passport Numbers rule implements the narrow breadth edition of the UK Passport Number data identifier.
The UK NHS Numbers rule implements the narrow breadth edition of the UK National Health Service (NHS) Number
data identifier.
See UK National Health Service (NHS) Number data identifier on page 764.
Table 36-10
Method Description
Last Name
Bank Card number
Drivers license number
Account Number
PIN
Medical account number
Medical ID card number
User name
Password
ABA Routing Number
Email
Phone
Mother's maiden name
However, the following combinations do not create a match:
This rule looks for any two of the following data columns: last name, phone, account number,
username, and email.
This rule is an exception if the recipient is within the EU. This covers recipients with any of the country
codes from the "EU Country Codes" dictionary.
The detection rule Secret Information (Keyword Match) looks for any keywords
in the "Secret Information" dictionary.
The detection rule Other Sensitive Information looks for any keywords in the
"Other Sensitive Information" dictionary.
This rule looks for content from specific design documents registered
as proprietary. It returns a match if the engine detects 80% or more of
the source document.
This rule looks for the specified file name extensions found in the
"Design Document Extensions" dictionary.
cad_draw
dwg
Note: Both file types and file name extensions are used because the policy does
not detect the true file type for all the required documents.
Username/Password Combinations EDM Rule This rule looks for usernames and passwords in
combination with any three of the following data fields.
SSN
Phone
Email
First Name
Last Name
Bank Card Number
Account Number
ABA Routing Number
Canadian Social Insurance Number
UK National Insurance Number
Date of Birth
Employee Directory EDM Rule This rule looks for Phone or Email.
US Social Security Number Patterns DCM Rule This rule looks for a match from the Randomized US Social
Security Number (SSN) data identifier and a keyword from
the "US SSN Keywords" dictionary.
Credit Card Numbers, All DCM Rule This rule looks for a match from the credit card number
system pattern and a keyword from the "Credit Card
Number Keywords" dictionary.
ABA Routing Numbers DCM Rule This rule looks for a match from the ABA Routing number
data identifier and a keyword from the "ABA Routing
Number Keywords" dictionary.
See ABA Routing Number data identifier on page 717.
This rule looks for the following file types: encrypted_zip, encrypted_doc,
encrypted_xls, or encrypted_ppt.
This rule looks for a keyword from the "GPG Encryption Keywords"
dictionary.
This rule looks for a keyword from the "S/MIME Encryption Keywords"
dictionary.
Table 36-17 Detection rule: Indexed EAR Commerce Control List Items and
Recipients
Compound rule Content Matches Exact See Choosing an Exact Data Profile on page 326.
Data (EDM)
The detection rule EAR Commerce Control List and Recipients looks for a country
code in the recipient from the "EAR Country Codes" list and a keyword from the
"EAR CCL Keywords" dictionary. Both conditions must match to trigger an incident.
Table 36-18 Detection rule: EAR Commerce Control List and Recipients
Compound rule Recipient Matches Pattern EAR Commerce Control List and Recipients (Recipient):
(DCM)
Match: Email address OR URL domain suffixes.
Severity: High.
Check for existence.
At least 1 recipient(s) must match.
Matches on entire message.
Content Matches Keyword EAR Commerce Control List and Recipients (Keyword Match):
(DCM)
Match: EAR CCL Keywords
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
to detect, prevent, and mitigate identity theft in connection with the opening of a
covered account or any existing covered account.
The Username/Password Combinations detection rule detects the presence of
both a user name and password from a profiled database index.
Simple rule Content Matches This condition detects exact data containing both of the following data
Exact Data (EDM) items:
User name
Password
The Exact SSN or CCN detection rule detects the presence of either a social
security number or a credit card number from a profiled database.
Simple rule Content Matches This condition detects exact data containing either of the following data
Exact Data (EDM) columns:
The Customer Directory detection rule detects the presence of either an email
address or a phone number from a profiled database.
Simple rule Content Matches This condition detects exact data containing either of the following data
Exact Data (EDM) columns:
Email address
Phone number
The Three or More Data Columns detection rule detects exact data containing
three or more of data items from a profiled database index.
Library of policy templates 799
FACTA 2003 (Red Flag Rules) policy template
Simple rule Content Matches Detects exact data containing three or more of the following data items:
Exact Data (EDM)
ABA Routing Number
Account Number
Bank Card Number
Birth Date
Email address
First Name
Last Name
National Insurance Number
Password
Phone Number
Social Insurance Number
Social security number (Taxpayer ID)
User name
The US Social Security Number Patterns detection rule implements the narrow
breadth edition of the Randomized US Social Security Number (SSN) system data
identifier.
See Randomized US Social Security Number (SSN) data identifier on page 754.
This data identifier detects nine-digit numbers with the pattern DDD-DD-DDDD
separated with dashes or spaces or without separators. The number must be in
valid assigned number ranges. This condition eliminates common test numbers,
such as 123456789 or all the same digit. It also requires the presence of a Social
Security keyword.
Library of policy templates 800
FACTA 2003 (Red Flag Rules) policy template
Simple rule Content Matches Data Identifier: Randomized US Social Security Number (SSN) narrow
Data Identifier (DCM) breadth
See Randomized US Social Security Number (SSN) data identifier
on page 754.
Severity: High.
Count all matches.
Look in envelope, subject, body, attachments.
The Credit Card Numbers, All detection rule implements the narrow breadth edition
of the Credit Card Number system Data Identifier.
See Credit Card Number data identifier on page 726.
This data identifier detects valid credit card numbers that are separated by spaces,
dashes, periods, or without separators. This condition performs Luhn check validation
and includes formats for American Express, Diner's Club, Discover, Japan Credit
Bureau (JCB), MasterCard, and Visa. It eliminates common test numbers, including
those reserved for testing by credit card issuers. It also requires the presence of a
credit card keyword.
Simple rule Content Matches Data Identifier: Credit Card Number narrow breadth
Data Identifier (DCM) See Credit Card Number narrow breadth on page 729.
Severity: High.
Count all matches.
Look in envelope, subject, body, attachments.
The ABA Routing Numbers detection rule implements the narrow breadth edition
of the ABA Routing Number system Data Identifier.
See ABA Routing Number data identifier on page 717.
This data identifier detects nine-digit numbers. It validates the number using the
final check digit. This condition eliminates common test numbers, such as
123456789, number ranges that are reserved for future use, and all the same digit.
This condition also requires the presence of an ABA keyword.
Library of policy templates 801
Financial Information policy template
Simple rule Content Matches Data Identifier: ABA Routing Number narrow breadth
Data Identifier (DCM) See ABA Routing Number data identifier on page 717.
Severity: High.
Count all matches.
Look in envelope, subject, body, attachments.
This rule looks for content from specific financial information files
registered as proprietary; returns a match if 80% or more of the source
document is found.
This rule looks for the combination of specified file types, keywords
from the "Financial Keywords" dictionary, and keywords from the
"Confidential/Proprietary Words" dictionary.
The specified file types are as follows:
excel_macro
xls
works_spread
sylk
quattro_pro
mod
csv
applix_spread
123
Note: To process HTTP GET requests appropriately, you may need to configure
the Network Prevent for Web server. See To enable a Forbidden Website policy
to process GET requests appropriately on page 802.
Forbidden Websites This rule looks for any keywords in the "Forbidden
Websites" dictionary, which is user-defined.
Note: Reducing the minimum size of GETs increases the number of URLs that
have to be processed, which increases server traffic load. One approach is to
calculate the number of characters in the shortest URL specified in the list of
forbidden URLs and set the minimum size to that number. Another approach
is to set the minimum URL size to 10 as that should cover all cases.
4 You may need to adjust the "Ignore Requests Smaller Than" setting in the
ICAP configuration of the Network Prevent server from the default 4096 bytes.
This value stops processing of incoming web pages that contain fewer bytes
than the number specified. If a page of a forbidden web site URL might be
smaller than that number, the setting should be reduced appropriately.
See Configuring policies on page 330.
See Exporting policy detection as a template on page 354.
Library of policy templates 803
Gambling policy template
Suspicious Gambling Keywords This rule looks for five instances of keywords from the "Gambling
Keywords, Confirmed" dictionary.
Less Suspicious Gambling Keywords This rule looks for ten instances of keywords from the "Gambling
Keywords, Suspect" dictionary.
Username/Password Simple rule: EDM This rule looks for user names and passwords in combination.
Combinations
See Choosing an Exact Data Profile on page 326.
Exact SSN or CCN Simple rule: EDM This rule looks for SSN or Credit Card Number.
Customer Directory Simple rule: EDM This rule looks for Phone or Email.
Library of policy templates 804
Gramm-Leach-Bliley policy template
3 or more critical customer Simple rule: EDM This rule looks for a match among any three of the following fields:
fields
Account number
Bank card number
Email address
First name
Last name
PIN number
Phone number
Social security number
ABA Routing Number
Canadian Social Insurance Number
UK National Insurance Number
Date of Birth
However, the following combinations are not a match:
ABA Routing Numbers Simple rule: DCM This condition detects nine-digit numbers. It validates the number
(DI) using the final check digit. This condition eliminates common test
numbers, such as 123456789, number ranges that are reserved for
future use, and all the same digit. This condition also requires the
presence of an ABA-related keyword.
US Social Security Numbers Simple rule: DCM This rule looks for social security numbers. For this rule to match,
(DI) there must be a number that fits the Randomized US SSN data
identifier. There must also be a keyword or phrase that indicates the
presence of a US SSN with a keyword from "US SSN Keywords"
dictionary. The keyword condition is included to reduce false positives
with any numbers that may match the SSN format.
See Randomized US Social Security Number (SSN) data identifier
on page 754.
Library of policy templates 805
HIPAA and HITECH (including PHI) policy template
Credit Card Numbers Simple rule: DCM This condition detects valid credit card numbers that are separated
(DI) by spaces, dashes, periods, or without separators. This condition
performs Luhn check validation and includes the following credit
card formats:
American Express
Diner's Club
Discover
Japan Credit Bureau (JCB)
MasterCard
Visa
Table 36-29 describes the TPO exception that is provided by the template. TPOs
(Treatment, Payment, or health care Operations) are service providers to health
care organizations and have an exception for HIPAA information restrictions. The
template requires that you enter the allowed email addresses. If implemented the
exception is evaluated before detection rules and the policy does not trigger an
incident if the protected information is sent to one of the allowed partners.
TPO Exception Content Matches Keyword Simple exception (single condition match).
(DCM)
Looks for a recipient email address matching one from
the "TPO Email Addresses" user-defined keyword
dictionary.
Table 36-30 is a rule that looks for an exact data match against any single column
from a profiled Patient Data database record.
Patient Data Content Matches Exact Data Match data from any single field:
(EDM)
Last name
Tax payer ID (SSN)
Email address
Account number
ID card number
Phone number
Table 36-31 is a compound detection rule that requires a Patient Data exact match
and a match from the "Drug Code" data identifier.
Library of policy templates 807
HIPAA and HITECH (including PHI) policy template
Patient Data and Drug Codes Content Matches Exact Data Looks for a match against any single column from a
(EDM) profiled Patient Data database record and a match from
the National Drug Code data identifier.
And
See Table 36-30 on page 806.
Content Matches Data
Identifier See National Drug Code (NDC) data identifier
on page 751.
Table 36-32 is a compound detection rule that requires a Patient Data exact match
and a keyword match from the "Prescription Drug Names" dictionary.
Table 36-32 Patient Data and Prescription Drug Names detection rule
Patient Data and Prescription Content Matches Exact Data Looks for a match against any single column from a
Drug Names (EDM) profiled Patient Data database record and a keyword
match from the Prescription Drug Names dictionary
AND
See Table 36-30 on page 806.
Content Matches Keyword
(DCM) See Updating policies after upgrading to the latest
version on page 359.
Table 36-33 is a compound detection rule that requires a Patient Data exact match
and keyword match from the "Medical Treatment Keywords" dictionary.
Patient Data and Treatment Content Matches Exact Data Looks for a match against any single column from a
Keywords (EDM) profiled Patient Data database record and a keyword
match from the Medical Treatment Keywords dictionary.
And
See Table 36-30 on page 806.
Content Matches Keyword
(DCM) See Updating policies after upgrading to the latest
version on page 359.
Table 36-34 is a compound detection rule that requires a Patient Data exact match
and a keyword match from the "Disease Names" dictionary.
Library of policy templates 808
HIPAA and HITECH (including PHI) policy template
Patient Data and Disease Content Matches Exact Data Looks for a match against any single column from a
Keywords (EDM) profiled Patient Data database record and a keyword
match from the Disease Names dictionary.
And
See Table 36-30 on page 806.
Content Matches Keyword
(DCM) See Updating policies after upgrading to the latest
version on page 359.
Table 36-35 is a compound detection rule that looks for SSNs using the Randomized
US Social Security Number (SSN) data identifier and for a keyword from the
"Prescription Drug Names" dictionary.
SSN and Drug Keywords Content Matches Data Randomized US Social Security Number (SSN) data
Identifier identifier (narrow breadth)
Table 36-36 is a compound detection rule that looks for SSNs using the Randomized
US Social Security Number (SSN) data identifier and for a keyword match from the
"Medical Treatment Keywords" dictionary.
SSN and Treatment Content Matches Data Randomized US Social Security Number (SSN) data
Keywords Identifier identifier (narrow breadth)
Table 36-37 is a compound detection rule that looks for SSNs using the Randomized
US Social Security Number (SSN) data identifier and for a keyword match from the
"Disease Names" dictionary.
SSN and Disease Keywords Content Matches Data Randomized US Social Security Number (SSN) data
Identifier identifier (narrow breadth)
Table 36-38 is a compound detection rule that looks for SSNs using the Randomized
US Social Security Number (SSN) data identifier and for a drug code using the
Drug Code data identifier.
SSN and Drug Code Content Matches Data Randomized US Social Security Number (SSN) data
Identifier identifier (narrow breadth)
This compound rule looks for two data types, last name and electoral
roll number, in combination with a keyword from the "UK Personal Data
Keywords" dictionary.
This rule looks for five instances of keywords from the "Street Drug
Names" dictionary.
This rule looks for five instances of keywords from the "Manufactured
Controlled Substances" dictionary.
ITIN This rule looks for a match to the US ITIN data identifier and a keyword from the
"US ITIN Keywords" dictionary.
Table 36-40 Indexed ITAR Munition Items and Recipients detection rule
Compound rule Recipient Matches Match recipient email or URL domain from ITAR
Pattern (DCM) Country Codes list:
Severity: High.
Check for existence.
At least 1 recipient(s) must match.
The ITAR Munitions List and Recipients detection rule looks for both a country code
in the recipient from the "ITAR Country Codes" dictionary and a keyword from the
"ITAR Munition Names" dictionary.
Library of policy templates 812
Media Files policy template
Compound rule Recipient Matches Match recipient email or URL domain from ITAR
Pattern (DCM) Country Codes list:
Severity: High.
Check for existence.
At least 1 recipient pattern must match.
Content Matches Match any keyword from the ITAR Munitions List:
Keyword (DCM)
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
Severity: High.
qt
riff
macromedia_dir
midi
mp3
mpeg_movie
quickdraw
realaudio
wav
video_win
vrml
Library of policy templates 813
Merger and Acquisition Agreements policy template
This rule looks for file name extensions from the "Media Files
Extensions" dictionary.
Condition Configuration
Contract Specific Keywords Match any keyword: merger, agreement, contract, letter of intent, term sheet,
(Keyword Match) plan of reorganization
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
Acquisition Corporate Structure Match any keyword: subsidiary, subsidiaries, affiliate, acquiror, merger sub,
Keywords (Keyword Match) covenantor, acquired company, acquiring company, surviving corporation,
surviving company
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
Library of policy templates 814
NASD Rule 2711 and NYSE Rules 351 and 472 policy template
Condition Configuration
Merger Consideration Match any keyword: merger stock, merger consideration, exchange shares,
Keywords (Keyword Match) capital stock, dissenting shares, capital structure, escrow fund, escrow
account, escrow agent, escrow shares, escrow cash, escrow amount, stock
consideration, break-up fee, goodwill
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
Legal Contract Keywords Match any keyword: recitals, in witness whereof, governing law, Indemnify,
(Keyword Match) Indemnified, indemnity, signature page, best efforts, gross negligence, willful
misconduct, authorized representative, severability, material breach
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
NASD Rule 2711 and NYSE Rules 351 and 472 policy
template
This policy protects the name(s) of any companies involved in an upcoming stock
offering, internal project names for the offering, and the stock ticker symbols for the
offering companies.
The NASD Rule 2711 Documents, Indexed detection rule looks for content from
specific documents registered as sensitive and known to be subject to NASD Rule
2711 or NYSE Rules 351 and 472. This rule returns a match if 80% or more of the
source document is found.
Library of policy templates 815
NASD Rule 2711 and NYSE Rules 351 and 472 policy template
Simple rule Content Matches NASD Rule 2711 Documents, Indexed (IDM):
Document
Detect documents in selected Indexed Document Profile
Signature (IDM)
Require at least 80% content match.
Severity: High.
Check for existence.
Look in body, attachments.
The NASD Rule 2711 and NYSE Rules 351 and 472 detection rule is a compound
rule that contains a sender condition and a keyword condition. The sender condition
is based on a user-defined list of email addresses of research analysts at the user's
company ("Analysts' Email Addresses" dictionary). The keyword condition looks
for any upcoming stock offering, internal project names for the offering, and the
stock ticker symbols for the offering companies ("NASD 2711 Keywords" dictionary).
Like the sender condition, it requires editing by the user.
Table 36-44 NASD Rule 2711 and NYSE Rules 351 and 472 detection rule
Compound rule Sender/User NASD Rule 2711 and NYSE Rules 351 and 472 (Sender):
Matches Pattern
Match sender pattern(s) [[email protected]] (user defined)
(DCM)
Severity: High.
Matches on entire message.
Content Matches NASD Rule 2711 and NYSE Rules 351 and 472 (Keyword Match):
Keyword (DCM)
Match "[company stock symbol]", "[name of offering company]", "[offering
name (internal name)]".
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
Content Matches Keyword Match keyword: "stock, stocks, security, securities, share, shares"
(DCM)
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
The NASD Rule 3010 and NYSE Rule 342 Keywords detection rule looks for
keywords in the "NASD 3010 General Keywords" dictionary, which look for any
general stock broker activity, and stock keywords.
Library of policy templates 817
NERC Security Guidelines for Electric Utilities policy template
Table 36-46 NASD Rule 3010 and NYSE Rule 342 Keywords detection rule
Compound rule Content Matches Keyword Match keyword: "authorize", "discretion", "guarantee", "options"
(DCM)
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
Content Matches Keyword Match keyword: "stock, stocks, security, securities, share, shares"
(DCM)
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
Simple rule Content Matches Exact Data Match any three of the following data items:
(EDM)
First name
Last name
Phone
Email
Simple rule Content Matches Indexed This rule requires an exact binary match.
Documents (IDM)
See Choosing an Indexed Document Profile on page 327.
The Sensitive Keywords and Vulnerability Keywords detection rule looks for any
keyword matches from the "Sensitive Keywords" dictionary and the "Vulnerability
Keywords" dictionary.
This rule looks for content from specific network diagrams that are
registered as confidential. This rule returns a match if 80% or more of
the source document is detected.
Library of policy templates 819
Network Security policy template
This rule looks for a Visio file type in combination with an IP address
data identifier.
This rule looks for a Visio file type in combination with phrase variations
of "IP address" with a data identifier.
This rule looks for a GoToMyPC command format with a data identifier.
This rule looks for a keyword from the "Hacker Keywords" dictionary.
This rule looks for a keyword from the "Keylogger Keywords" dictionary.
This rule looks for any single keyword in the "Offensive Language,
Explicit" dictionary.
This rule looks for any three instances of keywords in the "Offensive
Language, General" dictionary.
The OFAC Special Designated Nationals List and Recipients detection rule looks
for a recipient with a country code matching entries in the "OFAC SDN Country
Codes" specification in combination with a match on a keyword from the "Specially
Designated Nationals List" dictionary.
Table 36-50 OFAC Special Designated Nationals List and Recipients detection
rule
Compound rule Recipient Matches OFAC Special Designated Nationals List and Recipients (Recipient):
Pattern (DCM)
Match email or URL domain by OFAC SDN Country Code.
Severity: High.
Check for existence.
At least 1 recipient(s) must match.
Matches on the entire message.
The Communications to OFAC countries detection rule looks for a recipient with a
country code matching entries from the "OFAC Country Codes" list.
The Moderate Confidentiality Indicators detection rule looks for any keywords in
the "Moderate Confidentiality" dictionary.
The Low Confidentiality Indicators detection rule looks for any keywords in the "Low
Confidentiality" dictionary.
Library of policy templates 823
Password Files policy template
This rule looks for a regular expression pattern with the /etc/passwd
format.
This rule looks for a regular expression pattern with the /etc/shadow
format.
This rule looks for a regular expression pattern with the SAM format.
Simple rule Content Matches This rule detects credit card numbers.
Exact Data (EDM)
See Choosing an Exact Data Profile on page 326.
The Credit Card Numbers, All detection rule detects credit card numbers using the
Credit Card Number system Data Identifier.
Simple rule Content Matches Credit Card Numbers, All (Data Identifiers):
Data Identifier
Data Identifier: Credit Card Number (narrow)
(DCM)
See Credit Card Number data identifier on page 726.
Severity: High.
Count all matches.
Look in envelope, subject, body, attachments.
The Magnetic Stripe Data for Credit Cards detection rule detects raw data from the
credit card magnetic stripe using the Credit Card Magnetic Stripe system Data
Identifier.
Library of policy templates 825
PIPEDA policy template
Table 36-57 Magnetic Stripe Data for Credit Cards detection rule
Simple rule Content Magnetic Stripe Data for Credit Cards (Data Identifiers):
Matches Data
Data Identifier: Credit Card Magnetic Stripe (medium)
Identifier (DCM)
See Credit Card Number data identifier on page 726.
Data Severity: High.
Count all matches.
Look in envelope, subject, body, attachments.
EDM Rule The PIPEDA detection rule matches any two However, the following combinations do not create a
of the following data items: match:
The PIPEDA Contact Info detection rule looks for a match of two data items, with
certain data combinations excepted from matching.
Detection Description
method
EDM Rule This rule looks for any two of the following data columns:
Last name
Phone
Account number
User name
Email
Detection Description
method
DCM Rule This rule implements the narrow breadth edition of the Canadian Social Insurance Number data
identifier.
Detection Description
method
DCM Rule This rule implements the narrow breadth edition of the ABA Routing Number data identifier.
Detection Description
method
DCM Rule This rule implements the narrow breadth edition of the Credit Card Number data identifier.
This rule looks for the combination of user-specified Stock Keeping Unit
(SKU) numbers and the price for that SKU number.
Note: This template contains one EDM detection rule. If you do not have an EDM
profile configured, or you are using Symantec Data Loss Prevention Standard, this
policy template is empty and contains no rule to configure.
This rule looks for content from specific project data files registered as
proprietary. It returns a match if the engine detects 80% or more of the
source document.
This rule looks for any keywords in the "Sensitive Project Code Names"
dictionary, which is user-defined.
This rule looks for content from specific media files registered as
proprietary.
Library of policy templates 829
Publishing Documents policy template
qt
riff
macromedia_dir
midi
mp3
mpeg_movie
quickdraw
realaudio
wav
video_win
vrml
This rule looks for file name extensions from the "Media Files
Extensions" dictionary.
This rule looks for content from specific publishing documents registered
as proprietary. It returns a match if the engine detects 80% or more of
the source document.
qxpress
frame
aldus_pagemaker
publ
Library of policy templates 830
Racist Language policy template
This rule looks for specified file name extensions found in the "Publishing
Document Extensions" dictionary.
Note: Both file types and file name extensions are required for this policy because
the detection engine does not detect the true file type for all the required documents.
As such, the file name extension must be used with the file type.
This rule looks for any single keyword in the "Racist Language"
dictionary.
This rule looks for files of the specified types: access, exe, and exe_unix.
This rule looks for messages to recipients with email addresses in the
"Restricted Recipients" dictionary.
This rule is a compound rule with two conditions; both must match to
trigger an incident. This rule contains an EDM condition for first and
last names of employees provided by the user. This rule also looks for
a specific file type attachment (.doc) that is less than 50 KB and contains
at least one keyword from each of the following dictionaries:
This rule looks for files of a specified type (.doc) that are less than 50
KB and match at least one keyword from each of the following
dictionaries:
This rule looks for URLs of Web sites that are used in job searches.
Simple rule Content Matches See Choosing an Indexed Document Profile on page 327.
Indexed Document
Profile
The SEC Fair Disclosure Regulation compound detection rule looks for the following
conditions; all must be satisfied for the rule to trigger an incident:
The SEC Fair Disclosure keywords indicate possible disclosure of advance
financial information ("SEC Fair Disclosure Keywords" dictionary).
An attachment or file type that is a commonly used document or spreadsheet
format. The detected file types are Microsoft Word, Excel Macro, Excel, Works
Spreadsheet, SYLK Spreadsheet, Corel Quattro Pro, WordPerfect, Lotus 123,
Applix Spreadsheets, CSV, Multiplan Spreadsheet, and Adobe PDF.
The company name keyword list requires editing by the user, which can include
any name, alternate name, or abbreviation that might indicate a reference to
the company.
Library of policy templates 833
Sarbanes-Oxley policy template
Compound rule Content Matches SEC Fair Disclosure Regulation (Keyword Match):
Keyword
Match keyword: earnings per share, forward guidance
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
Match on same component.
The keyword must be in the attachment or file type detected by that
condition.
The Financial Information detection rule looks for a specific file type containing a
word from the "Financial Keywords" dictionary and a word from the
"Confidential/Proprietary Words" dictionary. The spreadsheet file types detected
are Microsoft Excel Macro, Microsoft Excel, Microsoft Works Spreadsheet, SYLK
Spreadsheet, Corel Quattro Pro, and more.
Library of policy templates 834
SEC Fair Disclosure Regulation policy template
The SEC Fair Disclosure Regulation Documents, Indexed (IDM) detection rule looks
for content from specific documents subject to SEC Fair Disclosure regulation. This
rule returns a match if 80% or more of the source document content is found.
Table 36-66 SEC Fair Disclosure Regulation Documents, Indexed (IDM) detection
rule
Simple rule Content Matches SEC Fair Disclosure Regulation Documents, Indexed (IDM):
Document
Detect documents from the selected Indexed Document Profile.
Signature (IDM)
See Choosing an Indexed Document Profile on page 327.
Match documents with at least 80% content match.
Severity: High.
Check for existence.
Look in body, attachments.
The SEC Fair Disclosure Regulation detection rule looks for the a keyword match
from the "SEC Fair Disclosure Keywords" dictionary, an attachment or file type that
is a commonly used document or spreadsheet, and a keyword match from the
"Company Name Keywords" dictionary.
All three conditions must be satisfied for the rule to trigger an incident:
The SEC Fair Disclosure keywords indicate possible disclosure of advance
financial information.
The file types detected are Microsoft Word, Excel Macro, Excel, Works
Spreadsheet, SYLK Spreadsheet, Corel Quattro Pro, WordPerfect, Lotus 123,
Applix Spreadsheets, CSV, Multiplan Spreadsheet, and Adobe PDF.
The company name keyword list requires editing by the user, which can include
any name, alternate name, or abbreviation that might indicate a reference to
the company.
Library of policy templates 836
Sexually Explicit Language policy template
Compound rule Content Matches SEC Fair Disclosure Regulation (Keyword Match):
Keyword (DCM)
Match "earnings per share", "forward guidance".
Severity: High.
Check for existence.
Look in envelope, subject, body, attachments.
Case insensitive.
Match on whole words only.
This rule looks for any single keyword in the "Sex. Explicit Keywords,
Confirmed" dictionary.
Library of policy templates 837
Source Code policy template
This rule looks for any three instances of keywords in the "Sex. Explicit
Words, Suspect" dictionary.
This rule looks for any three instances of keywords in the "Sex. Explicit
Words, Possible" dictionary.
Source Code Documents IDM This rule looks for specific user-provided source code from a
Document Profile.
Source Code Extensions File Name Match This rule looks for a match among file name extensions from
the "Source Code Extensions" dictionary.
Java Source Code Regular Expressions This compound rule looks for matches on two different regular
expression patterns: Java Import Statements and Java Class
Files.
C Source Code Regular Expression This rule looks for matches on the C Source Code regular
expression pattern.
VB Source Code Regular Expression This rule looks for matches on the VB Source Code regular
expression pattern.
Perl Source Code Regular Expressions This compound rule looks for matches on three different
Perl-related regular expressions patterns.
Library of policy templates 838
State Data Privacy policy template
Email to Described Email to Affiliates is a policy exception that allows Simple exception (single
Affiliates identity (DCM) email messages to be sent to affiliates who are condition)
(Recipient) legitimately allowed to receive information Match email recipient:
Recipient
covered under the State Data Privacy regulations. [affiliate1], [affiliate2].
Matches Pattern
Policy exceptions are evaluated before detection Edit the "Affiliate Domains"
match conditions. If there is an exception, in this list and enter the email
case an affiliate email address that you have address for each recipient
entered, the entire message is discarded and not who may make acceptable
available for evaluation by detection. use of the confidential data.
At least 1 recipient(s) must
match for the exception to
trigger.
Matches on the entire
message.
The State Data Privacy policy template implements Exact Data Matching
(Table 36-70). If you do not select an Exact Data profile when you first create a
policy based on this template, the EDM condition is not available for use.
See Choosing an Exact Data Profile on page 326.
Library of policy templates 839
State Data Privacy policy template
State Data Content matches This rule looks for an exact data match on three When you are creating the EDM
Privacy, Exact Data of the following: profile, you should validate it
Consumer (EDM) against the State Data Privacy
ABA Routing Number
Data template to ensure that the
Account Number
resulting index includes
Bank Card Number (credit card number) expected fields.
Birth Date
Simple rule (single match
Driver License Number
condition)
First Name
Severity: High
Last Name
Report incident if 1 match
Password
Look in envelope, body,
PIN Number
attachments
Social Security Number
State ID Card Number
Exception conditions: the following combinations
do not match:
Table 36-71 lists and describes the DCM detection rules implemented by the State
Data Privacy policy. If any one of these rules is violated the policy produces an
incident, unless you have configured the exception condition and the message
recipient is an acceptable use affiliate.
US Social Content Matches The US Social Security Number Patterns rule is Simple rule (single match
Security Data Identifier designed to detect US social security numbers condition)
Number (DCM) (SSNs). The Randomized US SSN data identifier Severity: High.
Patterns detects SSN patterns, both traditional and those Count all matches.
issued under the new randomization scheme. Look in envelope, subject,
See Randomized US Social Security Number body, attachments.
(SSN) data identifier on page 754.
Library of policy templates 840
State Data Privacy policy template
ABA Routing Content Matches The ABA Routing Numbers rule is designed to Simple rule (single match
Numbers Data Identifier detect ABA Routing Numbers. condition)
(DCM) Severity: High.
The ABA Routing Numbers data identifier detects
ABA routing numbers. Count all matches.
Look in envelope, subject,
See ABA Routing Number data identifier
body, attachments.
on page 717.
Credit Card Content Matches The Credit Card Numbers rule is designed to Simple rule (single condition)
Numbers, All Data Identifier match on credit card numbers. Severity: High.
(DCM) Count all matches.
To detect credit card numbers, this rule
implements the Credit Card Number narrow Look in envelope, subject,
breadth system data identifier. body, attachments
CA Drivers Content Matches The CA Drivers License Numbers rule looks for Simple rule (single condition)
License Data Identifier a match for the CA drivers license number Severity: High.
Numbers (DCM) pattern, a match for a data identifier for terms Count all matches.
relating to "drivers license," and a keyword from
Look in envelope, subject,
the "California Keywords" dictionary.
body, attachments
See Drivers License Number CA State data
identifier on page 734.
NY Drivers Content Matches The NY Drivers License Numbers rule looks for Simple rule (single condition)
License Data Identifier a match for the NY drivers license number Severity: High.
Numbers (DCM) pattern, a match for a regular expression for terms Count all matches.
relating to "drivers license," and a keyword from
Look in envelope, subject,
the "New York Keywords" dictionary.
body, attachments
See Drivers License Number - NY State data
identifier on page 739.
FL, MI, and Content Matches The FL, MI, and MN Drivers License Numbers Simple rule (single condition)
MN Drivers Data Identifier rule looks for a match for the stated drivers Severity: High.
License (DCM) license number pattern, a match for a regular Count all matches.
Numbers expression for terms relating to "drivers license,"
Look in envelope, subject,
and a keyword from the "Letter/12 Num. DLN
body, attachments
State Words" dictionary (namely, Florida,
Minnesota, and Michigan).
IL Drivers Content Matches The IL Drivers License Numbers detection rule Simple rule (single condition)
License Data Identifier looks for a match for the IL drivers license number Severity: High.
Numbers (DCM) pattern, a match for a regular expression for terms Count all matches.
relating to "drivers license," and a keyword from
Look in envelope, subject,
the "Illinois Keywords" dictionary.
body, attachments
See Drivers License Number - IL State data
identifier on page 737.
NJ Drivers Content Matches The NJ Drivers License Numbers detection rule Simple rule (single condition)
License Data Identifier looks for a match for the NJ drivers license Severity: High.
Numbers (DCM) number pattern, a match for a regular expression Count all matches.
for terms relating to "drivers license," and a
Look in envelope, subject,
keyword from the "New Jersey Keywords"
body, attachments
dictionary.
This rule looks for a match to the SWIFT code regular expression and
a keyword from the "SWIFT Code Keywords" dictionary.
This rule is a compound rule with two conditions; both must be matched
to trigger an incident. This rule looks for a keyword match from the
"Symantec DLP Awareness" dictionary and a keyword from the
"Symantec DLP Avoidance" dictionary.
This rule looks for a single compound condition with two parts: either
new or old style National Health Service numbers and a single keyword
from the "UK NHS Keywords" dictionary.
This rule looks for a match to the UK National Insurance number data
identifier and a keyword from the dictionary "UK NIN Keywords."
This rule looks for a keyword from the "UK Passport Keywords"
dictionary and a pattern matching the regular expression for UK Passport
Numbers (Old Type).
This rule looks for a keyword from the "UK Passport Keywords"
dictionary and a pattern matching the regular expression for UK Passport
Numbers (New Type).
This rule looks for a match to the UK Tax ID number data identifier and
a keyword from the dictionary "UK Tax ID Number Keywords."
US Social Security DCM Rule This rule looks for a match to the social See Randomized US Social
Number Patterns security number regular expression and Security Number (SSN) data
a keyword from the dictionary "US SSN identifier on page 754.
Keywords."
Violence and DCM Rule This rule is a compound rule with two conditions; both must match to trigger an
Weapons incident. This rule looks for a keyword from the "Violence Keywords" dictionary
and a keyword from the "Weapons Keywords" dictionary.
Library of policy templates 847
Webmail policy template
Yahoo Compound Recipient Matches This condition checks for the URL domain
detection rule Pattern (DCM) mail.yahoo.com.
Hotmail Compound Recipient Matches This condition checks for the URL domain
detection rule Pattern (DCM) hotmail.msn.com.
Go Compound Recipient Matches This condition checks for the URL gomailus.go.com.
detection rule Pattern (DCM)
AOL Compound Recipient Matches This condition checks for the URL domain aol.com.
detection rule Pattern (DCM)
Gmail Compound Recipient Matches This condition checks for the URL domain
detection rule Pattern (DCM) gmail.google.com.
AND
The Finance Message Board URL detection rule detects messages posted to the
Yahoo Finance message board.
Table 36-79 describes its configuration.
Library of policy templates 849
Yahoo and MSN Messengers on Port 80 policy template
Simple rule Content Matches Keyword Finance Message Board URL (Keyword Match):
(DCM)
Case insensitive.
Match Keyword: messages.finance.yahoo.com.
Match on whole words only.
Check for existence (do not count multiple matches).
Look in envelope, subject, body, attachments.
The Board URLs detection rule detects messages posted to the Yahoo or Yahoo
Finance message boards by the URL of either.
Table 36-80 describes its configuration details.
Case insensitive.
Match keyword: shttp.msg.yahoo.com.
Content Matches Keyword Match on whole words only.
(DCM) Count all matches and report an incident for each match.
Look for matches in the envelope, subject, body, and attachments.
Match must occur in the same component for both conditions in the
rule.
The MSN IM detection rule looks for matches on three keywords in the same
message component.
Library of policy templates 851
Yahoo and MSN Messengers on Port 80 policy template
AND
Case insensitive.
Match keyword: x-msn.
Compound Content Matches Keyword
Match on whole words only.
rule (DCM)
Count all matches and report an incident for each match.
Look for matches in the envelope, subject, body, and attachments.
Match must occur in the same component for all conditions in the rule.
AND
Case insensitive.
Match keyword: charset=utf-8.
Content Matches Keyword
Match on whole words only.
(DCM)
Count all matches and report an incident for each match.
Look for matches in the envelope, subject, body, and attachments.
Match must occur in the same component for all conditions in the rule.
Response rules for Network and Mobile Prevent for Web detection
For example, anytime a policy is violated, send an email to the user who violated
the policy and the manager. Or, if a policy violation severity level is medium, present
the user with an on-screen warning. Or, if the severity is high, block a file from being
copied to an external device.
All detection servers See Response rules for all detection servers on page 855.
Endpoint detection servers See Response rules for endpoint detection on page 856.
Network and Mobile Prevent for Web See Response rules for Network and Mobile Prevent for Web detection
detection servers on page 857.
Network Protect detection servers See Response rules for Network Protect detection on page 858.
Classification detection server See Response rule for the Classification Server on page 859.
Add Note Add a field to the incident record that the remediator can annotate at the
Incident Snapshot screen.
Limit Incident Data Retention Discard or retain matched data with the incident record.
See Configuring the Limit Incident Data Retention action on page 885.
Send Email Notification Send an email you compose to recipients you specify.
Table 37-2 Available response rules for all detection servers (continued)
See Configuring the Endpoint Discover: Quarantine File action on page 899.
Endpoint Prevent: Block Block the transfer of data that violates the policy.
For example, block the copy of confidential data from an endpoint to a USB
flash drive.
Endpoint Prevent: Notify Display an on-screen notification to the endpoint user when confidential
data is transferred.
Endpoint Prevent: User Cancel Allow the user to cancel the transfer of a confidential file. The override is
time sensitive.
See Configuring the Endpoint Prevent: User Cancel action on page 908.
See Configuring the Network and Mobile Prevent for Web: Block FTP
Request action on page 911.
Note: Only available with Network Prevent for Web.
See Configuring the Network and Mobile Prevent for Web: Block HTTP/S
action on page 911.
Note: Only available with Network Prevent for Web.
Network Prevent: Block SMTP Message Block email that causes an incident.
(Network Prevent only)
See Configuring the Network Prevent: Block SMTP Message action
on page 913.
Note: Only available with Network Prevent for Email.
Responding to policy violations 858
Response rules for Network Protect detection
Network Prevent: Remove HTTP/S Remove confidential content from Web posts.
Content
See Configuring the Network and Mobile Prevent for Web: Remove
HTTP/S Content action on page 915.
Note: Only available with Network Prevent for Web.
Network Protect: Copy File Copy sensitive files to a location you specify.
See Configuring the Network Protect: Copy File action on page 917.
Note: Only available with Network Protect.
See Configuring the Network Protect: Quarantine File action on page 917.
Note: Only available with Network Protect.
Note: This response rule is used only with the Symantec Data Classification for
Enterprise Vault solution, which is licensed separately from Symantec Data Loss
Prevention. You must configure the Enterprise Vault Data Classification Services
filter and Classification Server to communicate with one another. See the Enterprise
Vault Data Classification Services Implementation Guide for more information.
Classification: Classify Enterprise Vault Defines the classification result tags and retention categories that
Content Symantec Enterprise Vault for Microsoft Exchange uses to archive,
delete, or flag Exchange messages for compliance reviews and
E-Discovery searches.
Automated Response rules When a policy violation occurs, the detection server automatically executes
response rule actions.
Smart Response rules When a policy violation occurs, an authorized user manually triggers the
response rule.
Add Note Add a field to the incident record that the remediator can annotate at the
Incident Snapshot screen.
Log to a Syslog Server Log the incident to a syslog server for workflow remediation.
Send Email Notification Send an email you compose to recipients you specify.
is declared, it must be met for the action to trigger. If more than one condition is
declared, all must be met for the system to take action.
See Configuring response rules on page 870.
Endpoint Location Triggers a response action when the endpoint is on or off the corporate network.
Endpoint Device Triggers a response action when an event occurs on a configured endpoint
device.
Incident Type Triggers a response action when the specified type of detection server reports
a match.
Incident Match Count Triggers a response action when the volume of policy violations exceeds a
threshold or range.
See Configuring the Incident Match Count response condition on page 879.
Protocol or Endpoint Monitoring Triggers a response action when an incident is detected on a specified network
communications protocol (such as HTTP) or endpoint destination (such as
CD/DVD).
Severity Triggers a response action when the policy violation is a certain severity level.
Endpoint Prevent: Block See Configuring the Endpoint Prevent: Block action
on page 901.
Endpoint Prevent: User Cancel See Configuring the Endpoint Prevent: User Cancel
action on page 908.
Endpoint Prevent: Notify See Configuring the Endpoint Prevent: Notify action
on page 905.
Endpoint Discover: Quarantine File See Configuring the Endpoint Discover: Quarantine
File action on page 899.
Limit Incident Data Retention See Configuring the Limit Incident Data Retention
action on page 885.
Network Prevent: Block SMTP See Configuring the Network Prevent: Block SMTP
Message Message action on page 913.
Network Prevent: Modify SMTP See Configuring the Network Prevent: Modify SMTP
Message Message action on page 914.
Network and Mobile Prevent for See Configuring the Network and Mobile Prevent for
Web: Remove HTTP/HTTPS Web: Remove HTTP/S Content action on page 915.
Content
Responding to policy violations 864
About response rule authoring privileges
Network and Mobile Prevent for See Configuring the Network and Mobile Prevent for
Web: Block HTTP/HTTPS Web: Block HTTP/S action on page 911.
Network and Mobile Prevent for See Configuring the Network and Mobile Prevent for
Web: Block FTP Request Web: Block FTP Request action on page 911.
Network Protect: Quarantine File See Configuring the Network Protect: Quarantine File
action on page 917.
Network Protect: Copy File See Configuring the Network Protect: Copy File action
on page 917.
Set Status See Configuring the Set Status action on page 893.
Set Attribute See Configuring the Set Attribute action on page 892.
Add Note See Configuring the Add Note action on page 885.
Log to a Syslog Server See Configuring the Log to a Syslog Server action
on page 888.
Send Email Notification See Configuring the Send Email Notification action
on page 889.
Step 1 Review the available response rules. The Manage > Policies > Response Rules screen displays
all configured response rules.
Step 2 Decide the type of response rule to Decide the type of response rules based on your business
implement: Smart, Automated, both. requirements.
Step 3 Determine the type of actions you want to See About response rule conditions on page 861.
implement and any triggering conditions.
See About response rule actions on page 854.
Step 4 Understand the order of precedence among See About response rule action execution priority
response rule actions of different and the on page 862.
same types.
See Modifying response rule ordering on page 874.
Responding to policy violations 866
Response rule best practices
Step 5 Integrate the Enforce Server with an external Some response rules may require integration with external
system (if required for the response rule). systems.
These may include:
Step 6 Add a new response rule. See Adding a new response rule on page 869.
Step 7 Configure response rules. See Configuring response rules on page 870.
Step 8 Configure one or more response rule See Configuring response rule conditions on page 871.
conditions (optional).
Step 9 Configure one or more response rule actions You must define at least one action for a valid response rule.
(required).
See Configuring response rule actions on page 872.
Step 10 Add response rules to policies. You must have policy authoring privileges to add response
rules to policies.
Response rules require at lease one rule action; a condition is optional. If you
do not implement a condition, the action always executes when an incident is
Responding to policy violations 867
Response rule best practices
reported. If you configure more than one response rule condition, all conditions
must match for the response rule action to trigger.
See About response rule actions on page 854.
Response rule conditions are derived from policy rules. Understand the type of
rule and exception conditions that the policy implements when you configure
response rule conditions. The system evaluates the response rule condition
based on how the policy rule counts matches.
See Policy matching conditions on page 304.
The system displays only the response rule name for policy authors to select
when they add response rules to policies. Be sure to provide a descriptive name
that helps policy authors identify the purpose of the response rule.
See Configuring policies on page 330.
You cannot combine an Endpoint Prevent: Notify or Endpoint Prevent: Block
response rule action with EDM, IDM, or DGM detection methods. If you do, the
system displays a warning for the policy that it is misconfigured.
See Manage and add policies on page 349.
If you combine multiple response rules in a single policy, make sure that you
understand the order of precedence among response rules.
See About response rule action execution priority on page 862.
Use Smart Response rules only where it is appropriate for human intervention.
See About configuring Smart Response rules on page 871.
Chapter 38
Configuring and managing
response rules
This chapter includes the following topics:
Action Description
Add Response Rule Click Add Response Rule to define a new response rule.
See Adding a new response rule on page 869.
Modify Response Rule Click Modify Response Rule Order to modify the response rule order of precedence.
Order
See Modifying response rule ordering on page 874.
Delete an existing response Click the red X icon next to the far right of the response rule to delete it.
rule
You must confirm the operation before deletion occurs.
Refresh the list Click the refresh arrow icon at the upper right of the Response Rules screen to fetch
the latest status of the rule.
Order The Order of precedence when more than one response rule is configured.
Actions The type of Action the response rule can take to respond to an incident (required).
Conditions The Condition that triggers the response rule (if any).
4 Select and configure one or more Actions. You must define at least one action.
See Configuring response rule actions on page 872.
5 Click Save to save the response rule definition.
See Manage response rules on page 868.
See Implementing response rules on page 865.
All Add Note See Configuring the Add Note action on page 885.
All Limit Incident Data See Configuring the Limit Incident Data Retention action on page 885.
Retention
All Log to a Syslog Server See Configuring the Log to a Syslog Server action on page 888.
All Send Email Notification See Configuring the Send Email Notification action on page 889.
All Server FlexResponse See Configuring the Server FlexResponse action on page 891.
All Set Attribute See Configuring the Set Attribute action on page 892.
All Set Status See Configuring the Set Status action on page 893.
Classification Classify Enterprise Vault See Configuring the Classify Enterprise Vault Content response
Content action on page 894.
Cloud Storage Add Visual Tag See Configuring the Cloud Storage: Add Visual Tag action
on page 898.
Endpoint FlexResponse See Configuring the Endpoint: FlexResponse action on page 898.
Endpoint Quarantine File See Configuring the Endpoint Discover: Quarantine File action
Discover on page 899.
Endpoint Prevent Block See Configuring the Endpoint Prevent: Block action on page 901.
Endpoint Prevent Notify See Configuring the Endpoint Prevent: Notify action on page 905.
Endpoint Prevent User Cancel See Configuring the Endpoint Prevent: User Cancel action
on page 908.
Network and Block FTP Request See Configuring the Network and Mobile Prevent for Web: Block
Mobile Prevent FTP Request action on page 911.
for Web
Network and Block HTTP/S See Configuring the Network and Mobile Prevent for Web: Block
Mobile Prevent HTTP/S action on page 911.
for Web
Network Prevent Block SMTP Message See Configuring the Network Prevent: Block SMTP Message action
for Email on page 913.
Network Prevent Modify SMTP Message See Configuring the Network Prevent: Modify SMTP Message action
for Email on page 914.
Configuring and managing response rules 874
Modifying response rule ordering
Network and Remove HTTP/S Content See Configuring the Network and Mobile Prevent for Web: Remove
Mobile Prevent HTTP/S Content action on page 915.
for Web
Network Protect Copy File See Configuring the Network Protect: Copy File action on page 917.
Network Protect Quarantine File See Configuring the Network Protect: Quarantine File action
on page 917.
4 To modify the ordering, for each response rule you want to reorder, select the
desired order priority from the drop-down menu.
For example, for a response rule with order priority of 2, you can modify it to
be 1 (highest priority).
Modifying an order number moves that response rule to its modified position
in the list and updates all other response rules.
5 Click Save to save the modifications to the response rule ordering.
6 Repeat these steps as necessary to achieve the desired results.
See Implementing response rules on page 865.
Note: This condition is specific to endpoint incidents. You should not implement
this condition for Network or Discover incidents. If you do the response rule action
does not to execute.
Response rule conditions 877
Configuring the Endpoint Device response condition
Is Any Of Off the corporate This combination triggers a response rule action if an incident occurs when the
network endpoint is off the corporate network.
Is None Of Off the corporate This combination does not trigger a response rule action if an incident occurs
network when the endpoint is off the corporate network.
Is Any Of On the corporate This combination triggers a response rule action if an incident occurs when the
network endpoint is on the corporate network.
Is None Of On the corporate This combination does not trigger a response rule action if an incident occurs
network when the endpoint is on the corporate network.
Note: This condition is specific to endpoint incidents. You should not implement
this condition for Network or Discover incidents. If you do the response rule action
does not to execute.
Response rule conditions 878
Configuring the Incident Type response condition
Is Any Of Configured Triggers a response rule action when an incident is detected on a configured
device endpoint device.
Is None Of Configured Does not trigger (excludes from executing) a response rule action when an incident
device is detected on a configured endpoint device.
Is Any Of Classification Triggers a response rule action for any incident that the Classification Server
detects.
Is None Of Does not trigger a response rule action for any incident that the Classification
Server detects.
Is Any Of Discover Triggers a response rule action for any incident that Network Discover/Cloud
Storage Discover detects.
Is None Of Does not trigger a response rule action for any incident that Network
Discover/Cloud Storage Discover detects.
Is Any Of Endpoint Triggers a response rule action for any incident that Endpoint Prevent detects.
Is None Of Does not trigger a response rule action for any incident that Endpoint Prevent
detects.
Is Any Of Network or Triggers a response rule action for any incident that Network Prevent detects.
Mobile
Is None Of Does not trigger a response rule action for any incident that Network Prevent
detects.
Is Greater Than User-specified Triggers a response rule action if the threshold number of incidents is
number eclipsed.
Is Greater Than or User-specified Triggers a response rule action if the threshold number of incidents is met
Equals number or eclipsed.
Is Between User-specified pair of Triggers a response rule action when the number of incidents is between
numbers the range of numbers specified.
Is Less Than User-specified Triggers a response rule action if the number of incidents is less than the
number specified number.
Is Less Than or User-specified Triggers a response rule action when the number of incidents is equal to
Equals number or less than the specified number.
Is Any Of Triggers an action if the endpoint clipboard has been copied or pasted
to.
Endpoint Clipboard
Is None Of Does not trigger action if the endpoint clipboard has been copied or
pasted to.
Is Any Of Triggers an action if sensitive files are discovered on the local drive.
Endpoint Local Drive
Is None Of Does not trigger action if sensitive files are discovered on the local
drive.
Is Any Of Triggers an action if an endpoint printer or fax has been sent to.
Endpoint Printer/Fax
Is None Of Does not trigger action if an endpoint printer or fax has been sent to.
Response rule conditions 882
Configuring the Severity response condition
Configuring the Network and Mobile Prevent for Web: Block FTP Request action
Configuring the Network and Mobile Prevent for Web: Block HTTP/S action
Configuring the Network and Mobile Prevent for Web: Remove HTTP/S Content
action
Note: Limit Incident Data Retention does not apply to Endpoint Print or Clipboard
incidents.
See Configuring the Limit Incident Data Retention action on page 885.
Parameter Description
All Endpoint Incidents Check this option to retain the original message and file attachments for Endpoint
Prevent incidents and incidents Endpoint Discover captures using an endpoint
(including Endpoint Discover
target.
incidents)
Response rule actions 887
Configuring the Limit Incident Data Retention action
Note: The default data retention behavior for network incidents applies to Network
Prevent for Web and Network Prevent for Email incidents. The default behavior
does not apply to Network Discover/Cloud Storage Discover incidents. For Network
Discover incidents, the system provides a link in the Incident Snapshot that points
to the offending file at its original location. Incident data retention for Network
Discover is not configurable.
Parameter Description
Parameter Description
Note: You use this response rule in conjunction with a syslog server. See Enabling
a syslog server on page 145.
Parameter Description
To: Sender Select this option to send the email notification to the email sender. This recipient only applies
to email message violations.
To: Data Owner Select this option to send email notification to the data owner that the system identifies by email
address in the incident.
To: Other Email This option can include any custom attributes designated as email addresses (such as
Address "manager@email"). For example, if you define a custom attribute that is an email address, or
retrieve one via a Lookup Plugin, that address will appear in the "To" field for selection, to the
right of "To: Sender" and "To: Data Owner."
CC Enter one or more specific email addresses separated by commas for people you want to copy
on the notification.
If this field is blank, the message appears to come from the system email address.
Include Original Select this option to include the message that generated the incident with the notification email.
Message
Max Per Day Enter a number to restrict the maximum number of notifications that the system sends in a day.
Parameter Description
Language Select the language for the message from the drop-down menu.
Response rule actions 891
Configuring the Server FlexResponse action
Parameter Description
Add Language Click the icon to add multiple language(s) for the message.
See About Endpoint Prevent response rules in different locales
on page 1366.
Subject Enter a subject for the message that indicates what the message is about.
Insert Variables You can add one or more variables to the subject or body of the email
message by selecting the desired value(s) from the Insert Variables list.
Variables can be used to include the file name, policy name, recipients,
and sender in both the subject and the body of the email message. For
example, to include the policy and rules violated, you would insert the
following variables.
5 Enter a name for the rule in the Rule Name field. (For Smart Response rules,
this name appears as the label on the button that incident responders select
during remediation.)
6 Enter an optional description for the rule in the Description field.
7 In the Actions (executed in the order shown) menu, select the action All:
Server FlexResponse.
8 Click Add Action.
9 In the FlexResponse Plugin menu, select a deployed Server FlexResponse
plug-in to execute with this Response Rule action.
The name that appears in this drop-down menu is the value specified in the
display-name property from either the configuration properties file or the plug-in
metadata class.
See Deploying a Server FlexResponse plug-in on page 1213.
10 Click Save.
11 Repeat this procedure, adding a Response Rule for any additional Server
FlexResponse plug-ins that you have deployed.
Parameter Description
Archive and Select this option to indicate that Symantec Enterprise Vault should archive
classify the message that matched the detection rule. If you select this option, also
message use the Assign retention category menu to specify the retention category
that Enterprise Vault assigns.
Response rule actions 895
Configuring the Classify Enterprise Vault Content response action
Parameter Description
Assign The Assign retention category menu lists all of the retention categories
retention that you have configured for use with the Data Classification for Enterprise
category Vault solution. If you configure the response rule to archive a message, also
select the appropriate retention category from this menu.
You should configure the retention category names in this menu to match
those categories that are available on Enterprise Vault servers.
See Configuring the retention categories that are available for classification
on page 896.
When you configure a response rule, if you do not select the classification
type of response rule, then Enterprise Vault cannot receive any response
from the Symantec Enterprise Vault Data Classification Services. Enterprise
Vault applies the retention category that is already available on the message.
If the associated policy was running in test mode, the incident is created,
but Enterprise Vault does not receive any response from the Classification
Server. Not even test mode logs on Enterprise Vault are updated.
Compliance If you configure the response rule to archive the message, you can also
review select Prioritize messages for compliance review to prioritize the message
for review. The Discovery Accelerator and Compliance Accelerator products
can use this classification tag to filter messages during searches or audits.
When you select this option, two additional choices are presented:
Parameter Description
Do not Choose this option to indicate that Symantec Enterprise Vault should not
archive archive the message that matched the detection rule.
message When you select this option, the following choices are presented to specify
the way in which Enterprise Vault should discard the message:
Note: When you monitor a Journal mailbox, you may see messages marked
as "Do not archive" in the journal Inbox and in the Deleted items folder.
Messages that are marked as "Do not archive" are not automatically
re-located. You can manually move the messages into the deleted items
folder.
When you first install the Data Classification Services solution, you must create a
RetentionCategories.config file to include the retention categories that are
available in Enterprise Vault servers. If you change the retention categories that
are available in an Enterprise Vault deployment, you should also manually change
the available categories that are defined in RetentionCategories.config.
Note: This feature is not available for agents running on Mac endpoints.
Response rule actions 899
Configuring the Endpoint Discover: Quarantine File action
Parameter Description
FlexResponse Enter the script module name with packages separated by a period (.).
Python Plugin
Plugin parameters Click Add Parameter to add one or more parameters to the script.
You can add and store credentials at the System > Settings > Credentials screen.
If you use multiple endpoint response rules in a single policy, make sure that you
understand the order of precedence for such rules.
See About response rule action execution priority on page 862.
Note: This feature is not available for agents running on Mac endpoints.
Table 40-7 Endpoint Discover: Quarantine File response rule action parameters
Parameter Description
Quarantine Enter the path to the secured location where you want files to be placed. The secure location can
Path either be on the local drive of the endpoint, or can be on a remote file share. EFS folders can also
be used as the quarantine location.
Response rule actions 901
Configuring the Endpoint Prevent: Block action
Table 40-7 Endpoint Discover: Quarantine File response rule action parameters
(continued)
Parameter Description
Access Mode If your secure location is on a remote file share, you must select how the Symantec DLP Agent
accesses that file share.
Select one of the following credential access types:
Anonymous Access
Use Saved Credentials
In anonymous mode, the Symantec DLP Agent runs as LocalSystem user to move the confidential
file. You can use anonymous mode to move files to a secure location on a local drive or to remote
share if it allows anonymous access.
Note: EFS folders cannot accept anonymous users.
A specified credential lets the Symantec DLP Agent impersonate the specified user to access the
secure location. The credentials must be in the following format:
domain\user
You must enter the specified credentials you want to use through the System Credentials page.
Marker File Select the Leave marker in place of the remediated file check box to create a placeholder file
that replaces the confidential file.
Marker Text Specify the text to appear in the marker file. If you selected the option to leave the marker file in
place of the remediated file, you can use variables in the marker text.
To specify the marker text, select the variable from the Insert Variable list.
Note: The block action is not triggered for a copy of sensitive data to a local drive.
Parameter Configuration
Language Select the language you want the response rule to execute on. Click Add Language to add more
than one language.
See About Endpoint Prevent response rules in different locales on page 1366.
See Setting Endpoint Prevent response rules for different locales on page 1367.
Response rule actions 903
Configuring the Endpoint Prevent: Block action
Table 40-8 Endpoint Prevent: Block response rule action parameters (continued)
Parameter Configuration
Display Alert This field is optional for Endpoint Block actions. Select an Endpoint Block action to display an
Box with this on-screen notification to the endpoint user when the system blocks an attempt to copy confidential
message data.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Optionally, you can configure the on-screen notification to include user justifications as well as an
option for users to enter their own justification.
You can also add hyperlinks to refer users to URLs that contain company security information. To
add hyperlinks you use standard HTML syntax, tags, and URLs. Tags are case-sensitive. You can
include insert hyperlinked text between regular text. For example, you would enter:
Insert Variable Select the variables to include in the on-screen notification to the endpoint when the system blocks
an attempt to copy confidential data.
You can select variables based on the following types:
Application
Content Name
Content Type
Device Type
Policy Names
Protocol
Response rule actions 904
Configuring the Endpoint Prevent: Block action
Table 40-8 Endpoint Prevent: Block response rule action parameters (continued)
Parameter Configuration
Allow user to Select this option to display up to four user justifications in the on-screen notification. When the
choose notification appears on the endpoint, the user is required to choose one of the justifications. (If you
explanation select Allow user to enter text explanation, the user can enter a justification.) Symantec Data Loss
Prevention provides four default justifications, which you can modify or remove as needed.
Justification:
User Education
Broken Business Process
Manager Approved
False positive
Each justification entry consists of the following options:
Check box
This option indicates whether to include the associated justification in the notification. To remove
a justification, clear the check box next to it. To include a justification, select the check box next
to it.
Justification
The system label for the justification. This value appears in reports (for ordering and filtering
purposes), but the user does not see it. You can select the desired option from the drop-down
list.
Option Presented to End User
The justification text the system displays in the notification. This value appears in reports with the
justification label. You can modify the default text as desired.
To add a new justification, select New Justification from the drop-down list. In the Enter new
justification text box that appears, enter the justification name. When you save the rule, Symantec
Data Loss Prevention includes it as an option (in alphabetical order) in all Justification drop-down
lists.
Note: You should be selective when adding new justifications. Deleting new justifications is not
currently supported.
Allow user to Select this option to include a text box into which users can enter their own justification.
enter text
explanation
Note: The notify action is not triggered for a copy of sensitive data to a local drive.
Parameter Description
Language Select the language you want the response rule to execute on.
See About Endpoint Prevent response rules in different locales on page 1366.
See Setting Endpoint Prevent response rules for different locales on page 1367.
Response rule actions 906
Configuring the Endpoint Prevent: Notify action
Parameter Description
Display Alert Box This field is required for Endpoint Notify actions. Select this option to display an on-screen
with this message notification to the endpoint user.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Optionally, you can configure the on-screen notification to include user justifications as well as
the option for users to enter their own justifications.
You can also add hyperlinks to refer users to URLs that contain company security information.
To add hyperlinks you use standard HTML syntax, tags, and URLs. Tags are case-sensitive.
You can include insert hyperlinked text between regular text. For example, you would enter:
Insert Variable Select the variables that you want to include in the on-screen notification to the endpoint user.
You can select variables based on the following types:
Application
Content Name
Content Type
Device Type
Policy Names
Protocol
Response rule actions 907
Configuring the Endpoint Prevent: Notify action
Parameter Description
Allow user to choose Select this option to display up to four user justifications in the on-screen notification. When
explanation the notification appears on the endpoint, the user is required to choose one of the justifications.
(If you select Allow user to enter text explanation, the user can enter a justification.) Symantec
Data Loss Prevention provides four default justifications, which you can modify or remove as
needed.
Available Justifications:
Check box
This option indicates whether to include the associated justification in the notification. To
remove a justification, clear the check box next to it. To include a justification, select the
check box next to it.
Justification
The system label for the justification. This value appears in reports (for ordering and filtering
purposes), but the user does not see it. You can select the desired option from the drop-down
list.
Option Presented to End User
The justification text Symantec Data Loss Prevention displays in the notification. This value
appears in reports with the justification label. You can modify the default text as desired.
To add a new justification, select New Justification from the appropriate drop-down list. In the
Enter new justification text box that appears, type the justification name. When you save the
rule, the system includes the new justification as an option (in alphabetical order) in all
Justification drop-down lists.
Note: You should be selective in adding new justifications. Deleting new justifications is not
currently supported.
Allow user to enter Select this option to include a text box into which users can enter their own justification.
text explanation
Parameter Description
Language Select the language you want the response rule to execute on.
See About Endpoint Prevent response rules in different locales on page 1366.
See Setting Endpoint Prevent response rules for different locales on page 1367.
Response rule actions 909
Configuring the Endpoint Prevent: User Cancel action
Parameter Description
Pre-timeout warning This field is required to notify users that they have a limited amount of time to respond to the
incident.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Post-timeout This field notifies users that the amount of time to override the policy has expired. The data
message transfer was blocked.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Display Alert Box This field is required for Endpoint User Cancel actions. Select this option to display an on-screen
with this message notification to the endpoint user.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Optionally, you can configure the on-screen notification to include user justifications as well as
the option for users to enter their own justifications.
You can also add hyperlinks to refer users to URLs that contain company security information.
To add hyperlinks you use standard HTML syntax, tags, and URLs. Tags are case-sensitive.
You can include insert hyperlinked text between regular text. For example, you would enter:
Insert Variable Select the variables that you want to include in the on-screen notification to the endpoint user.
You can select variables based on the following types:
Application
Content Name
Content Type
Device Type
Policy Name
Protocol
Timeout Counter
Note: You must use the Timeout Counter variable to display how much time remains before
blocking the data transfer.
Response rule actions 910
Configuring the Endpoint Prevent: User Cancel action
Parameter Description
Allow user to choose Select this option to display up to four user justifications in the on-screen notification. When
explanation. the notification appears on the endpoint, the user is required to choose one of the justifications.
(If you select Allow user to enter text explanation, the user can enter a justification.) Symantec
Data Loss Prevention provides four default justifications, which you can modify or remove as
needed.
Available Justifications:
Check box
This option indicates whether to include the associated justification in the notification. To
remove a justification, clear the check box next to it. To include a justification, select the
check box next to it.
Justification
The system label for the justification. This value appears in reports (for ordering and filtering
purposes), but the user does not see it. You can select the desired option from the drop-down
list.
Option Presented to End User
The justification text Symantec Data Loss Prevention displays in the notification. This value
appears in reports with the justification label. You can modify the default text as desired.
To add a new justification, select New Justification from the appropriate drop-down list. In the
Enter new justification text box that appears, type the justification name. When you save the
rule, the system includes the new justification as an option (in alphabetical order) in all
Justification drop-down lists.
Note: You should be selective in adding new justifications. Deleting new justifications is not
currently supported.
Allow user to enter Select this option to include a text box into which users can enter their own justification.
text explanation.
must integrate the detection server with a Web proxy server. For Mobile Prevent
for Web, you must also integrate with a VPN server.
See Configuring Network Prevent for Web Server on page 1151.
See Implementing Mobile Prevent for Web on page 1544.
To configure the Network Prevent: Block HTTP/S response rule action
1 Integrate Network Prevent for Web or Mobile Prevent for Web with a proxy
server and, if necessary, a VPN server.
See Network Prevent for Web Serverbasic configuration on page 193.
Note: If the requesting client does not expect an HTML response, the Rejection
Message may not be displayed in the client browser. For example, a client
expecting an XML response to a Web post may only indicate a Javascript error.
Parameter Description
Bounce Message to Sender Enter the text that you want to appear in the SMTP error that Network Prevent
(Email) returns to the MTA. Some MTAs display this text in the message that
is bounced to the sender.
If you leave this field blank, the message does not bounce to the sender but
the MTA sends its own message.
Response rule actions 914
Configuring the Network Prevent: Modify SMTP Message action
Parameter Description
Redirect Message to this Address If you want to redirect blocked messages to a particular address (such as the
Symantec Data Loss Prevention administrator), enter that address in this field.
If you leave this field blank, the bounced message goes to the sender only.
Parameter Description
Subject Select the type of modification to make to the subject of the message from the following options:
Do not Modify No text is changed in the subject.
Prepend New text is added to the beginning of the subject.
Append New text is added to the end of the subject.
Replace With New text completely replaces the old subject text.
For example, if you want to prepend "VIOLATION" to the subject of the message, select Prepend
and enter VIOLATION in the text field.
Headers Enter a unique name and a value for each header you want to add to the message (up to three).
Enable Email Select this option to enable integration with Symantec Messaging Gateway. When this option is
Quarantine enabled, Symantec Data Loss Prevention adds preconfigured x-headers to the message that
Connect inform Symantec Messaging Gateway that the message should be quarantined.
(Requires
For more information, see the Symantec Data Loss Prevention Email Quarantine Connect
Symantec
FlexResponse Implementation Guide.
Messaging
Gateway)
Web cannot remove confidential data for a Web site it recognizes, it creates a
system event and performs a configured fallback option.
Note: Symantec Data Loss Prevention removes content for file uploads and, for
Network Prevent, Web mail attachments even for those sites that it does not
recognize for HTTP content removal.
To configure the Network and Mobile Prevent for Web: Remove HTTP/S Content
action
1 Configure a response rule at the Configure Response Rule screen.
See Configuring response rules on page 870.
2 Add the Network and Mobile Prevent for Web: Remove HTTP/S Content
action type from the Actions list.
See Configuring response rule actions on page 872.
3 Configure the action parameters.
See Table 40-13 on page 916.
4 Click Save to save the configuration.
See Manage response rules on page 868.
Table 40-13 Network and Mobile Prevent for Web: Remove HTTP/S Content
parameters
Field Description
Removal The message that appears in content (Web postings, Web mail, or files) from which the system has
Message removed confidential information. Only the recipient sees this message.
Fallback option The action to take if Network Prevent for Web or Mobile Prevent for Web cannot remove confidential
information that was detected in an HTTP or HTTPS post.
Rejection The message that Network Prevent or Mobile Prevent returns to a client when it blocks an HTTP or
Message HTTPS post. The client Web application may or may not display the rejection message, depending
on how the application handles error messages.
Parameter Description
Marker File Select this option to create a marker text file to replace the original file. This action notifies the user
what happened to the file instead of quarantining or deleting the file without any explanation.
Note: The marker file is the same type and has the same name as the original file, as long as it is a
text file. An example of such a file type is Microsoft Word. If the original file is a PDF or image file, the
system creates a plain text marker file. The system then gives the file the same name as the original
file with .txt appended to the end. For example, if the original file name is accounts.pdf, the marker file
name is accounts.pdf.txt.
Marker Text Specify the text to appear in the marker file. If you selected the option to leave the marker file in place
of the remediated file, you can use variables in the marker text.
To specify marker text, select the variable from the Insert Variable list.
Remediating incidents
Table 41-1 describes the options that are involved in incident remediation:
Remediation Description
options
Role-based access Access to incident information in the Symantec Data Loss Prevention
control system can be tightly controlled with role-based access control.
Roles control which incidents a particular remediator can take action
on, as well as what information within that incident is available to
the remediator. For example, access control can be used to ensure
that a given remediator can act only on incidents originating within
a particular business unit. In addition, it might prevent that business
unit's staff from ever seeing high-severity incidents, instead routing
those incidents to the security department.
Severity level Incident severity is a measure of the risk that is associated with a
assignment particular incident. For example, an email message containing 50
customer records can be considered more severe than a message
containing 50 violations of an acceptable use policy. Symantec Data
Loss Prevention lets you specify what constitutes a severe incident
by configuring it at the policy rule level. Symantec Data Loss
Prevention then uses the severity of the incident to drive subsequent
responses to the incident. This process lets you prioritize incidents
and devote your manual remediation resources to the areas where
they are needed most.
Remediation Description
options
Automated incident A powerful feature of the Enforce Server is the ability to automatically
responses respond to incidents as they arise. For example, you can configure
the system to respond to a serious incident by blocking the offending
communication. You can send an email message to the sender's
manager. You can send an alert to a security event management
system. You can escalate the incident to the security department.
On the other hand, an acceptable use incident might be dispensed
with by sending an email message to the sender. Then you can
mark the incident as closed, requiring no further work. Between
these extremes, you can establish a policy that automatically
encrypts transmissions of confidential data to a business partner.
All of these scenarios can be handled automatically without user
intervention.
Add Note
Log to a Syslog Server
Send Email Notification
Set Status
The Enforce Server handles all of these steps, except for Smart Response. You
can handle incidents in an entirely automated way. You can reserve manual
intervention (Smart Response) for only the most serious incidents.
Remediating incidents 923
Remediating incidents
Remediating incidents
When you remediate an incident, you can perform the following actions:
Set the incidents status or severity.
Apply a Smart Response rule to the incident.
Set the incidents custom attributes.
Add comments to the incident record.
Remediate incidents by going to an incident list or incident snapshot and selecting
actions to perform on one or more incidents.
Perform some combination of these actions.
You can import a solution pack during installation. Solution packs prepopulate
incident lists and incident snapshots with several remediation options and custom
attributes. For complete descriptions of all solution packs (including information
about all remediation options and custom attributes they contain), refer to the
documentation for each of the solution packs in the solutions packs directory in the
documentation.
To remediate incidents
1 Access an incident list or incident snapshot.
In incident lists, Symantec Data Loss Prevention displays available remediation
options in the Incident Actions drop-down menu. The menu becomes active
when you select one or more incidents in the list (with the check box). In incident
snapshots, Symantec Data Loss Prevention also displays the available
remediation options. You can set a Status or Severity from the drop-down
menus.
See Viewing incidents on page 999.
You can also edit the Attributes and provide related information.
2 Take either of the following actions:
When you view an incident list, select the incident(s) to be remediated
(check the box). You can select incidents individually or select all incidents
on the current screen. Then select the wanted action from the Incidents
Actions drop-down menu. For example, select Incident Actions > Set
Status > Escalated.
Remediating incidents 924
Executing Smart response rules
Note: Sending an email notification to the sender applies to SMTP incidents only.
Also, the notification addressees that are based on custom attributes (such as
"manager email") work correctly only if populated by the attribute lookup plug-in.
Delete Incidents Delete the selected incident(s) from the Symantec Data
Loss Prevention system.
Set Attributes Display the Set Attributes page so you can enter or
edit the attribute values for the selected incident(s).
Name
Email Address
Set Severity Change the severity that is set for the selected
incident(s) to one of the options under Set Severity.
Remediating incidents 926
Response action variables
Run Smart Response Perform one of the listed responses on the selected
incident(s). When you click a response rule, the Execute
Response Rule page appears.
$BLOCKED$ Indication of whether or not Symantec Data Loss Prevention blocked the
message (yes or no).
$DATAOWNER_NAME$ The person responsible for remediating the incident. This field must be set
manually, or with one of the lookup plug-ins.
$DATAOWNER_EMAIL$ The email address of the person responsible for remediating the incident. This
field must be set manually, or with one of the lookup plug-ins.
$DEVICE_INSTANCE_ID$ The specific ID of the mobile device that generated the violation.
$ENDPOINT_MACHINE$ The name of the endpoint machine that generated the violation.
$FILE_FULL_PATH$ The full path to the file in which the incident was found.
$FILE_NAME$ The name of the file in which the incident was found.
$FILE_PARENT_DIRECTORY_PATH$ The path to the parent directory of the file in which the incident was found.
Remediating incidents 928
Discover incident variables
$INCIDENT_SNAPSHOT$ The fully qualified URL to the incident snapshot page for the incident.
$POLICY_RULES$ A comma-separated list of one or more policy rules that were violated.
$PROTOCOL$ The protocol, device type, or target type that generated the violation.
$QUARANTINE_PARENT_DIRECTORY_PATH$ The path to the parent directory in which the file was quarantined.
$TARGET$ The name of the target in which the incident was found.
$DATAOWNER_NAME$ The person responsible for remediating the incident. This field must be set
manually, or with one of the lookup plug-ins.
$DATAOWNER_EMAIL$ The email address of the person responsible for remediating the incident.
This field must be set manually, or with one of the lookup plug-ins.
$FILE_NAME$ The name of the file in which the incident was found.
$FILE_PARENT_DIRECTORY_PATH$ The path to the parent directory of the file in which the incident was found.
$FILE_FULL_PATH$ The full path to the file in which the incident was found.
$POLICY_RULES$ A comma-separated list of one or more policy rules that were violated.
$QUARANTINE_PARENT_DIRECTORY_PATH$ The path to the parent directory in which the file was quarantined.
$TARGET$ The name of the target in which the incident was found.
Chapter 42
Remediating Network
incidents
This chapter includes the following topics:
In the Recipient (URL) fields, addresses are represented as they have been
provided, which is usually a hostname and varies by protocol.
In the Sender fields, representation of addresses varies by protocol.
Normalized fields are used for IP-based filtering.
When IPv6 addresses appear in incident list filters, they follow these rules:
Addresses are normalized in the Source IP and Destination IP fields.
In the Recipient (URL) field, addresses are represented as they have been
provided in the Recipient (URL), Domain, and Sender fields.
Normalized fields are used for IP-based filtering.
When IPv6 addresses appear in incident details, they follow these rules:
Addresses are normalized in the Source IP and Destination IP fields.
In the Recipient (URL) field, addresses are represented as they have been
provided.
In the Sender field, addresses are represented as they have been provided.
Links to filtered lists behave like user input.
You can view normalized IPv6 addresses in an incident summary:
Addresses are summarized by the Source IP, Destination IP, Sender, and
Domain fields.
Normalization occurs for fields as it does in the incident details.
You can view non-normalized IPv6 addresses in an incident summary:
Addresses are summarized by the Source IP, Destination IP, Sender, and
Domain fields.
Normalization occurs for fields as it does in the incident details.
Note: Use caution when you click Select All. This action selects all incidents in the
report (not only those on the current page). Any incident command you subsequently
apply affects all incidents. To select only the incidents on the current page, select
the checkbox at top left of the incident list.
Incident information is divided into several columns. Click any column header to
sort alpha-numerically by that column's data. To sort in reverse order, click the
column header a second time. By default, Symantec Data Loss Prevention sorts
incidents by date.
Remediating Network incidents 932
Network incident list
The Type column shows the icons that indicate the type of network incident.
Table 42-1 describes the icons.
Icon Description
SMTP
HTTP
HTTPS
FTP
NNTP
IM:MSN
IM:AIM
IM:Yahoo
TCP:custom_protocol
This column also indicates whether the communication was blocked or altered.
Table 42-2 shows the possible values.
Icon Description
Icon Description
Use the following links to learn more about the Network incident list page:
Viewing a summary of all network incidents See Network summary report on page 941.
Common features of all Symantec Data Loss See About incident reports on page 990.
Prevention reports
See Common incident report features
on page 1020.
Action Description
Run Smart Response Select to run a Smart Response rule that you
or your administrator configured. (To
configure a Smart Response rule, navigate
to Policy > Response Rules, click Add
Response Rule, and select Smart
Response.
Set Data Owner Set the data owner name or email address.
The data owner is the person responsible for
remediating the incident.
Action Description
Icon Description
High
Medium
Low
Status
Current incident status.
The possible values are as follows:
New
In Process
Escalated
False Positive
Configuration Errors
Resolved
You or your administrator can add new status designations on the Attribute
Setup page.
See Network incident list on page 930.
If you configured any Smart Response rules, Symantec Data Loss Prevention
displays the response options for executing the rules at the top of the page.
Depending on the number of Smart Response rules, a drop-down menu may also
appear.
See Network incident snapshot on page 936.
Key Info
History
Notes
Correlations
Information in this section is divided into the following categories (not all of which
appear for every incident type):
Remediating Network incidents 939
Network incident snapshotGeneral information
Key Info The Key Info tab shows the policy that was violated in the
incident. It also shows the total number of matches for the
policy, as well as matches per policy rule. Click the policy
name to view a list of all incidents that violated the policy.
Click view policy to view a read-only version of the policy.
This section also lists other policies that the same file violated.
To view the snapshot of an incident that is associated with
a particular policy, click go to incident next to the policy
name. To view a list of all incidents that the file created, click
show all.
History View the actions that were performed on the incident. For
each action, Symantec Data Loss Prevention displays the
action date and time, the actor (a user or server), and the
action or the comment.
Notes View any notes that you or others have added to the incident.
Click Add Note to add a note.
Correlations You can view a list of those incidents that share attributes of
the current incident. For example, you can view a list of all
incidents that a single account generated. The Correlations
tab shows a list of correlations that match single attributes.
Click on attribute values to view lists of those incidents that
are related to those values.
You can view a list of custom attributes and their values, if any have been specified.
Click on attribute values to view an incident list that is filtered on that value. To add
new values or edit existing ones, click Edit. In the Edit Attributes dialog box that
appears, type the new values and click Save.
See Setting the values of custom attributes manually on page 1062.
See Network incident snapshot on page 936.
If any of the severity columns contain totals, you can click on them to view a list of
incidents of the chosen severity.
See Common incident report features on page 1020.
See About dashboard reports and executive summaries on page 992.
See About incident reports on page 990.
See Saving custom incident reports on page 1003.
Chapter 43
Remediating Endpoint
incidents
This chapter includes the following topics:
Note: Endpoint reports show only the incidents that were captured by Endpoint
Prevent. Incidents that were captured by Endpoint Discover appear in Network
Discover/Cloud Storage Discover reports.
Incident information is divided into several columns. Click any column header to
sort alpha-numerically by the data in that column. To sort in reverse order, click the
column header a second time. By default, Symantec Data Loss Prevention lists
incidents by date.
The report includes the following columns:
Remediating Endpoint incidents 945
About endpoint incident lists
Email/SMTP
HTTP
HTTPS
FTP
IM: MSN
IM: Yahoo
Print/Fax
Clipboard
A response column that indicates whether Symantec Data Loss Prevention blocked
an attempted violation or notified the end user about the violation of confidential
data.
The possible values are as follows:
Blank if Symantec Data Loss Prevention did not block the violation or notify the
end user
A red icon indicates the violation was blocked by Symantec Data Loss
Prevention, by the user, or if the user cancel option time limit expired.
A notification icon indicates Symantec Data Loss Prevention notified the end
user about the violated confidential data policies. The notification icon also
appears if the user allowed the violating data transfer. The icon also appears if
the user cancel time limit option has expired and the default action is set to allow
data transfers.
The other columns of this section appear as follows:
Column Definition
Column Definition
High
Medium
Low
For information only
New
In Process
Escalated
False positive
Configuration Errors
Resolved
You or your administrator can add new status designations on the Attribute Setup
page.
See Endpoint incident snapshot on page 947.
See About incident remediation on page 920.
See About incident reports on page 990.
See Saving custom incident reports on page 1003.
Current status and severity appear under the snapshot heading. To change one of
the current values, click on it and choose another value from the drop-down list. If
any action icon is associated, it also appears here.
If you have configured any Smart Response rules, Symantec Data Loss Prevention
displays a Remediation bar (under the Status bar). The Remediation bar includes
options for executing the rules. Depending on the number of Smart Response rules,
a drop-down menu may also appear.
The top left section of the snapshot displays general incident information. You can
click most information values to view an incident list that is filtered on that value.
Information in this section is divided into the following categories (not all of which
appear for every incident type):
Local drive
Network Share
Email/SMTP
HTTP
HTTPS/SSL
FTP
IM: MSN
IM: Yahoo
Print/Fax
Remediating Endpoint incidents 949
Endpoint incident snapshot
Clipboard
Section Description
Section Description
File name Name of the file that violated the policy. The
file name field appears only for fixed-drive
incidents.
File Quarantined
Quarantine Failed
Quarantine Result Timeout
Section Description
FTP User Name The originating user name for violating FTP
transfers.
Data Owner Email Address The email address for the owner of the
confidential data.
Other sections of the incident snapshot are common across all Symantec Data
Loss Prevention products. These common sections include:
Incident snapshot matches
See Incident snapshot matches section on page 1025.
Incident snapshot policy section
See Incident snapshot policy section on page 1024.
Incident snapshot correlations section
See Incident snapshot correlations tab on page 1024.
Incident snapshot attributes section. (This section appears only if a system
administrator has configured custom attributes.)
See Incident snapshot policy section on page 1024.
Incident snapshot history section
See Incident snapshot history tab on page 1023.
The Endpoint incident snapshot also contains two sections that are not common
across other product lines. Those sections are:
Destination or protocol-specific information
See Endpoint incident destination or protocol-specific information on page 954.
Reporting on Endpoint Prevent response rules
See Reporting on Endpoint Prevent response rules on page 952.
Note: For Endpoint Discover, Quarantine incidents always take precedence over
Endpoint FlexResponse incidents.
FTP user name at the FTP Destination For FTP incidents, the user name at the FTP
destination is displayed.
Print Job Name For print/fax incidents, the print job name is
the file name of the printing job that generated
the incident.
Remediating Endpoint incidents 955
Endpoint incident summary reports
Note: Endpoint reports show only the incidents that are captured by Endpoint
Prevent. Incidents from Endpoint Discover appear in Network Discover/Cloud
Storage Discover reports.
To view the primary and the secondary summary criteria available for the report,
go to the Summarize By link. Click Edit. In the Primary and Secondary drop-down
menus, Symantec Data Loss Prevention displays all of the criteria in alphabetical
order, followed by custom criteria your system administrator defined. You can select
criteria from the Primary and Secondary drop-down menus and then click Run
Remediating Endpoint incidents 956
Endpoint incident summary reports
Now to create a new summary report. Summary reports take their name from the
primary summary criterion. If you rerun a report with new criteria, the report name
changes accordingly.
See About filters and summary options for reports on page 1027.
Summary entries are divided into several columns. Click any column header to sort
alpha-numerically by that column's data. To sort in reverse order, click the column
header a second time.
Field Description
Field Description
Navigation and Smart Response options See Mobile incident snapshotHeading and
navigation on page 964.
Note: Use caution when you click Select All. This action selects all incidents in the
report (not only those on the current page). Any incident command you subsequently
apply affects all incidents. To select only the incidents on the current page, select
the checkbox at top left of the incident list.
Incident information is divided into several columns. Click any column header to
sort alpha-numerically by that column's data. To sort in reverse order, click the
column header a second time. By default, Symantec Data Loss Prevention sorts
incidents by date.
The Type column shows the icons that indicate the type of mobile incident.
Table 44-1 describes the icons.
Icon Description
HTTP
Symantec Data Loss Prevention also detects the Yahoo and MSN IM traffic
that is tunneled through HTTP.
HTTPS
FTP
This column also indicates whether the communication was blocked or altered.
Table 44-2 shows the possible values.
Icon Description
Indicates that Symantec Data Loss Prevention has added or modified the
headers on the message that generated the incident.
Remediating Mobile incidents 961
Mobile Prevent incident listActions
Use the following links to learn more about the Mobile incident list page:
Columns of the incident list table See Mobile incident listColumns on page 962.
Actions to perform on selected See Mobile Prevent incident listActions on page 961.
incidents
Viewing a summary of all mobile See Mobile summary report on page 967.
incidents
Features that are common to all See About incident reports on page 990.
Symantec Data Loss Prevention
See Common incident report features on page 1020.
reports
See Saving custom incident reports on page 1003.
Action Description
Action Description
You can select one or more incidents to which to apply commands from the
Incident drop-down menu at the top of the list. Click the checkbox at the top of
the column to select all incidents on the current page. You can also click Select
All at far right to select all incidents in the report.
Type
The protocol over which the match was detected.
Subject/Sender/Recipient(s)
Message subject, sender email address or IP address, recipient email
address(es), or URL(s).
Sent
Date and time the message was sent.
ID/Policy
Symantec Data Loss Prevention incident ID number and the policy against which
the incident was logged.
Matches
Number of matches in the incident.
Severity
Incident severity as determined by the severity setting of the rule the incident
matched.
The possible values are as follows:
Icon Description
High
Medium
Low
Status
Current incident status.
The possible values are as follows:
New
Remediating Mobile incidents 964
Mobile incident snapshotHeading and navigation
In Process
Escalated
False Positive
Configuration Errors
Resolved
You or your administrator can add new status designations on the Attribute
Setup page.
History
Notes
Correlations
Information in this section is divided into the following categories (not all of which
appear for every incident type):
Key Info The Key Info tab shows the policy that was violated in the
incident. It also shows the total number of matches for the
policy, as well as matches per policy rule. Click the policy name
to view a list of all incidents that violated the policy. Click view
policy to view a read-only version of the policy.
This section also lists other policies that the same file violated.
To view the snapshot of an incident that is associated with a
particular policy, click go to incident next to the policy name.
To view a list of all incidents that the file created, click show
all.
History View the actions that were performed on the incident. For each
action, Symantec Data Loss Prevention displays the action
date and time, the actor (a user or server), and the action or
the comment.
Notes View any notes that you or others have added to the incident.
Click Add Note to add a note.
Correlations You can view a list of those incidents that share attributes of
the current incident. For example, you can view a list of all
incidents that a single account generated. Symantec Data Loss
Prevention shows a list of correlations that match single
attributes. Click on attribute values to view lists of those
incidents that are related to those values.
See About the Similarity Threshold and Similarity Score on page 527.
See Mobile incident snapshot on page 959.
You can view a list of custom attributes and their values, if any have been specified.
Click on attribute values to view an incident list that is filtered on that value. To add
new values or edit existing ones, click Edit. In the Edit Attributes dialog box that
appears, type the new values and click Save.
See Setting the values of custom attributes manually on page 1062.
See Mobile incident snapshot on page 959.
If any of the severity columns contain totals, you can click on them to view a list of
incidents of the chosen severity.
See Common incident report features on page 1020.
See About dashboard reports and executive summaries on page 992.
See About incident reports on page 990.
See Saving custom incident reports on page 1003.
Chapter 45
Remediating Discover
incidents
This chapter includes the following topics:
of the Discover targets from the list. For information about Network Discover/Cloud
Storage Discover scan details, go to Manage > Discover Scanning > Scan History,
then select one of the Discover scans from the list.
See Managing Network Discover/Cloud Storage Discover target scans on page 1191.
Table 45-1 lists the Network Discover/Cloud Storage Discover reports.
Report Navigation
Scan History (single This report is from the Enforce Server administration console,
target) Manage menu, Discover Scanning > Discover Targets. Click
the link in the Scan Status column to see the history of a particular
scan target.
Scan History (all This report is from the Enforce Server administration console,
targets) Manage menu, Discover Scanning > Scan History.
Scan Details This report is from the Enforce Server administration console,
Manage menu, Discover Scanning > Scan History. Click the link
in the Scan Status column to see the scan details.
In the Enforce Server administration console, on the Incidents menu, click Discover
This incident report displays all incidents for all Discover targets. You can select
the standard reports for all incidents, new incidents, target summary, policy by
target, status by target, or top shares at risk.
Summaries and filter options can select which incidents to display.
See Incident report filter and summary options on page 1021.
You can create custom reports with combinations of filters and summaries to identify
the incidents to remediate.
See About custom reports and dashboards on page 1000.
Network Discover/Cloud Storage Discover has the following types of reports:
Incident list
See Discover incident lists on page 975.
Incident summary
See Discover summary reports on page 979.
Incident snapshot
See Discover incident snapshots on page 972.
Incident Details
The following details are included:
Remediation The latest remediation status of the file that generated the
Detection Status incident.
Scan The date and time of the scan that registered the incident.
Detection Date The date and time that the incident was detected.
Seen Before No, if this incident was not previously detected. Yes, if this
incident was previously detected.
Is Archived Displays the archived state of the incident, whether or not the
incident is archivable, and lets you toggle the Do Not Archive
flag for the incident. See About incident hiding on page 1047.
URL For SharePoint, this URL is the item on the SharePoint server.
Click this URL to go to the item on the SharePoint server.
Extraction Date Date custom target adapter was run (Applies to custom targets
only.)
Remediating Discover incidents 974
Discover incident snapshots
Notes Database Name of the Lotus Notes database (Applies to Lotus Notes
only.)
File Created The date and time that the file or item was created.
Last Modified Date and time of last change to the file or item.
Last Accessed Date and time of last user access to the file or item.
Data Owner Name The person responsible for remediating the incident. This field
must be set manually, or with a lookup plug-in.
Data Owner Email The email address of the person responsible for remediating
Address the incident. This field must be set manually, or with a lookup
plug-in.
Access Information
See Incident snapshot access information section on page 1025.
For SharePoint incident snapshots, the permission levels show the
permissions from SharePoint, for example Contribute or Design. The list
in the incident snapshot shows only the first 50 entries. All the ACL entries
can be exported to a CSV file. The permissions are comma-separated. Users
or groups having Limited Access permission levels are not recorded or
shown.
Box incident snapshots display collaborative folder information, including
the collaborators and their roles.
Shared Link Information
Box incident snapshots display shared link information, including whether a
link is shared, if it is password protected, if it can be downloaded, and the
expiration date of the link.
Message Body
Remediating Discover incidents 975
Discover incident lists
For a SharePoint list item, the message body shows the name and value
pairs in the list.
Select one of the following archive actions to set the archive state for the selected
incidents:
Archive IncidentsFlags the selected incidents as archived.
Restore IncidentsRestores the selected incidents to the non-archived
state.
Do Not ArchivePrevents the selected incidents from being archived.
Allow ArchiveAllows the selected incidents to be archived.
See About incident hiding on page 1047.
Delete Incidents
Select to delete specified incidents.
Set Attributes
Select to set attributes for the selected incidents.
Export Selected: CSV
Select to save specified incidents in a comma-separated text (.csv) file, which
can be displayed in several common applications, such as Microsoft Excel.
Export Selected: XML
Select to save specified incidents in an XML file, which can be displayed in
several common applications.
Lookup Attributes
Use the lookup plug-ins to look up incident custom attributes.
Set Data Owner
Set the data owner name or email address. The data owner is the person
responsible for remediating the incident.
Reports can automatically be sent to the data owner for remediation.
Set Severity
Select to set severity.
Set Status
Select to set status.
Run Smart Response
Select to run a Smart Response rule you or your administrator configured.
See Discover incident lists on page 975.
Click any column header to sort alpha-numerically by that column's data. To sort
in reverse order, click the column header a second time.
The report includes the following columns:
Check boxes that let you select incidents to remediate.
You can select one or more incidents to which to apply commands from the
Incident Actions drop-down menu.
Click the checkbox at the top of the column to select all incidents on the current
page.
You can click Select All at far right to select all incidents in the report.
Note: Use caution when you use Select All. This option selects all incidents in
the report (not only those on the current page), and any incident command you
subsequently apply affects all incidents. You may want to configure the
maximum-incident-batch-size property to limit the number of incidents that
a Server FlexResponse plug-in processes at one time.
See Adding a Server FlexResponse plug-in to the plug-ins properties file
on page 1214.
Type
Type of target in which the match was detected.
An icon represents each target type.
This column also displays a remediation icon, if any response rule applied.
The possible values are as follows:
Copied
Quarantined
Remediation Error
These same icons may appear for other incident types as well, and you can
execute Server FlexResponse actions on those incidents.
See Configuring the Server FlexResponse action on page 891.
Location/Target/Scan
Repository or file location, target name, and date and time of most recent scan
File Owner
Username of file owner (for example, MYDOMAIN\Administrator)
ID/Policy
Symantec Data Loss Prevention incident number and the policy against which
the incident was logged
Matches
Number of matches in the incident
Severity
Incident severity as determined by the severity setting of the rule the incident
matched
The possible values are as follows:
High
Medium
Low
Status
Current incident status
The possible values are as follows:
New
In Process
Escalated
False Positive
Configuration Errors
Resolved
The following icon may be displayed near the status if this incident was seen
before:
Remediating Discover incidents 979
Discover summary reports
You or your administrator can add new status designations on the attribute setup
page.
See Configuring custom attributes on page 1061.
See Discover incident lists on page 975.
See About implementing detection for Enterprise Vault Classification on page 635.
Table 46-1 describes the columns that display in the Classification incident list.
Working with Classification incidents 981
Classification incident list
Column Definition
High
Medium
Low
For information only
New
In Process
Escalated
False positive
Configuration Errors
Resolved
Key Info The Key Info tab shows the policy that was violated in the
incident. It also shows the total number of matches for the
policy, as well as matches per policy rule. Click the policy
name to view a list of all incidents that violated the policy.
Click view policy to view a read-only version of the policy.
This section also lists other policies that the same file violated.
To view the snapshot of an incident that is associated with
a particular policy, click go to incident next to the policy
name. To view a list of all incidents that the file created, click
show all.
History View the actions that were performed on the incident. For
each action, Symantec Data Loss Prevention displays the
action date and time, the actor (a user or server), and the
action or the comment.
Notes View any notes that you or others have added to the incident.
Click Add Note to add a note.
Working with Classification incidents 984
Classification incident snapshot
Correlations You can view a list of those incidents that share attributes of
the current incident. For example, you can view a list of all
incidents that a single account generated. The Correlations
tab shows a list of correlations that match single attributes.
Click on attribute values to view lists of those incidents that
are related to those values.
Beneath the general information, Symantec Data Loss Prevention displays the
message content (if applicable) and the matches that caused the incident.
Matches are highlighted in yellow and organized according to the message
component (such as header, body, or attachment) in which they were detected.
Symantec Data Loss Prevention displays the total relevant matches for each
message component. It shows matches by the order in which they appear in the
original text. To view the rule that triggered a match, click on the highlighted match.
Chapter 47
Managing and reporting
incidents
This chapter includes the following topics:
Viewing dashboards
Viewing incidents
Filtering reports
Managing and reporting incidents 986
Deleting incidents
Dashboards combine information from several reports. They include graphs and
incident totals representing the contents of various incident lists and summaries.
Graphs can sometimes contain lists of high-severity incidents or lists of summary
groups. You can click on report portlets (the individual tiles that contain report
data) to drill down to the detailed versions of the reports.
Symantec Data Loss Prevention ships with executive summaries for Network,
Endpoint, Mobile, and Discover incidents.
Executive summaries are very similar to dashboards. The difference between
them is that you can customize a dashboard, but you cannot customize an
executive summary.
You can create and save customized versions of all reports (except executive
summaries) for continued use.
See About custom reports and dashboards on page 1000.
Symantec Data Loss Prevention displays reports in separate sections on the
Incident Reports screen as follows:
The Saved Reports section contains any shared reports that are associated
with your current role. This section appears only if you or other users in your
current role have created saved reports.
See About custom reports and dashboards on page 1000.
The Network section contains Symantec-provided incident lists, summaries,
and dashboards for network incidents.
The Mobile section contains Symantec-provided incident lists, summaries, and
dashboards for mobile incidents.
The Endpoint section contains Symantec-provided incident lists, summaries,
and dashboards for endpoint incidents. Endpoint reports include the incidents
that Endpoint captures, such as Endpoint Block and Endpoint Notify incidents.
Incidents that Endpoint Discover captures appear in Discover reports.
The Discover section contains Symantec-provided incident lists, summaries,
and dashboards for Network Discover/Cloud Storage Discover and Endpoint
Discover incidents.
The Users section contains the user list and user risk summary, which displays
users and their associated Email and Endpoint incidents.
An executive responsible for overall risk reduction who monitors risk trends and
develops high-level initiatives to respond to those trends.
The executive monitors dashboards and summary reports (to get a general
picture of data loss trends in the organization). The executive also develops
programs and initiatives to reduce risk, and communicates this information to
policy authors and incident responders. The executive often monitors reports
through email or some other exported report format.
Symantec Data Loss Prevention dashboards and summary reports let you
monitor risk trends in your organization. These reports provide a high-level
overview of incidents. Executives and managers can quickly evaluate risk trends
and advise policy authors and incident responders how to address these trends.
You can view existing summary reports and dashboards and create customized
versions of these reports.
See About dashboard reports and executive summaries on page 992.
See About summary reports on page 997.
An incident responder, such as an InfoSec Analyst or InfoSec Manager, who
monitors and responds to particular incidents.
The responder monitors incident reports and snapshots to respond to the
incidents that are associated with a particular policy group, organizational
department, or geographic location. The responder may also author policies to
reduce risk. These policies can originate either at the direction of a risk reduction
manager or based on their own experience tracking incidents.
See About incident remediation on page 920.
3 To display a report in the list, check the Show Report box for that report. To
remove a report from the list, clear Show Report for that report.
The selected list of reports displays in a left navigation panel for each of the
types of reports.
For example, to see the list of Network reports, on the Incidents menu, click
Network.
4 After changing your preferences, click Save.
See About custom reports and dashboards on page 1000.
Note: You can configure which reports appear in navigation panel. To do so, go to
All Reports and then click on Edit Preferences
Symantec Data Loss Prevention provides the following types of incident reports:
Incident lists These show individual incident records containing information such as
severity, associated policy, number of matches, and status. You can click
on any incident to view a snapshot containing more details. You can
select specific incidents or groups of incidents to modify or remediate.
Summaries These show incident totals organized by a specific incident attribute such
as status or associated policy. For example, a Policy Summary includes
rows for all policies that have associated incidents. Each row includes a
policy name, the total number of associated incidents, and incident totals
by severity. You can click on any severity total to view the list of relevant
incidents.
Double These show incident totals organized by two incident attributes. For
summaries example, a policy trend summary shows the total incidents by policy and
by week. Similar to the policy summary, each entry includes a policy
name, the total number of associated incidents, and incident totals by
severity. In addition, each entry includes a separate line for each week,
showing the week's incident totals and incidents by severity.
Managing and reporting incidents 991
About incident reports
Dashboards and These are quick-reference dashboards that combine information from
executive several reports. They include graphs and incident totals representing the
summaries contents of various incident lists, summaries, and double summaries.
Graphs are sometimes beside lists of high-severity incidents or lists of
summary groups. You can click on constituent report names to drill down
to the reports that are represented on the dashboard.
Custom Lists the shared reports that are associated with your current role. (Such
reports appear only if you or other users in your current role have created
them.)
Endpoint Lists the Endpoint incident reports. Endpoint reports include incidents
such as Endpoint Block and Endpoint Notify incidents.
The folder risk report displays file share folders ranked by prioritized risk.
The risk score is based on the relevant information from the Symantec
Data Loss Prevention incidents plus the information from the VML
Management Server.
Users The User List lists the data users in your organization. The User Risk
Summary lists all users with their associated Email and Endpoint incidents.
Viewing dashboards
This procedure shows you how to view a dashboard.
To view a dashboard
1 In the Enforce Server administration console, on the Incidents menu, click
Incident Reports. Under Reports, click the name of a dashboard.
Dashboards consist of up to six portlets that each provide a summary of a
particular report.
For example, the Executive Summary-Network dashboard consists of portlets
for the Network Policy Summary, High Risk Senders, Protocol Summary,
Top Recipient Domains, Status by Week, and Incidents - All.
2 To see the entire report for a portlet, click the portlet.
Symantec Data Loss Prevention displays the appropriate incident list or
summary report.
3 Browse through the incident list or summary report.
See Viewing incidents on page 999.
See About summary reports on page 997.
To create a dashboard
1 In the Enforce Server administration console, on the Incidents menu, click
Incident Reports.
2 On the Incident Reports screen that appears, click Create Dashboard.
The Configure Dashboard screen appears.
3 Choose whether to share your dashboard or keep it private.
If you choose to share a dashboard, the dashboard is accessible to all users
assigned the role under which you create it.
If you are logged on as Administrator, you do not see this choice.
Click Next.
4 In the General section, for Name, type a name for the dashboard.
5 For Description, type an optional description for the dashboard.
6 In the Delivery Schedule section, you can regenerate and send the dashboard
report to specified email accounts.
If SMTP is not set up on your Enforce Server, you do not see the Delivery
Schedule section.
If you have configured your system to send alerts and reports, you can set a
time to regenerate and send the dashboard report to specified email accounts.
See Configuring the Enforce Server to send email alerts on page 147.
If you have not configured Symantec Data Loss Prevention to send reports,
skip to the next step.
To set a schedule, locate the Delivery Schedule section and select an option
from the Schedule drop-down list. (You can alternatively select No Schedule.)
For example, select Send Weekly On.
Enter the data that is required for your Schedule choice. Required information
includes one or more email addresses (separated by commas). It may also
include calendar date, time of day, day of the week, day of the month, or last
date to send.
See Delivery schedule options for dashboard reports on page 1008.
Managing and reporting incidents 995
Configuring dashboard reports
7 For the Left Column, you can choose what to display in a pie chart or graph.
For the Right Column, you can also display a table of the information.
See Choosing reports to include in a dashboard on page 996.
Select a report from as many as three of the Left Column (Chart Only)
drop-down lists. Then select a report from as many as three of the Right Column
(Chart and Table) drop-down lists.
8 Click Save.
9 You can edit the dashboard later from the Edit Report Preferences screen.
To display a custom dashboard at logon, specify it as the default logon report
on the Edit Report Preferences screen.
See Editing custom dashboards and reports on page 1010.
3 In the Delivery Schedule section, you can regenerate and send the dashboard
report to specified email accounts.
If SMTP is not set up on your Enforce Server, you do not see the Delivery
Schedule section.
If you have configured your system to send alerts and reports, you can set a
time to regenerate and send the dashboard report to specified email accounts.
See Configuring the Enforce Server to send email alerts on page 147.
If you have not configured Symantec Data Loss Prevention to send reports,
skip to the next step.
To set a schedule, locate the Delivery Schedule section and select an option
from the Schedule drop-down list. (You can alternatively select No Schedule.)
For example, select Send Weekly On.
Enter the data that is required for your Schedule choice. Required information
includes one or more email addresses (separated by commas). It may also
include calendar date, time of day, day of the week, day of the month, or last
date to send.
See Delivery schedule options for dashboard reports on page 1008.
4 For the Left Column, you can choose what to display in a pie chart or graph.
For the Right Column, you can also display a table of the information.
See Choosing reports to include in a dashboard on page 996.
Select a report from as many as three of the Left Column (Chart Only)
drop-down lists. Then select a report from as many as three of the Right Column
(Chart and Table) drop-down lists.
5 Click Save.
6 You can edit the dashboard later from the Edit Report Preferences screen.
To display a custom dashboard at logon, specify it as the default logon report
on the Edit Report Preferences screen.
See Editing custom dashboards and reports on page 1010.
are ranked with severity and match count. You can display a list of summary criteria
and associated incidents that highlight any high-severity incident totals.
You can choose up to three reports to include in the left column, and up to three
reports to include in the right column.
To choose reports to include
1 Choose a report from as many as three of the Left Column (Chart Only)
drop-down lists.
2 Choose a report from as many as three of the Right Column (Chart and
Table) drop-down lists.
3 After you configure the dashboard, click Save.
See Configuring dashboard reports on page 995.
3 Select a criterion from the primary listbox, and an optional criterion from the
secondary listbox. For example, select Policy Group and then Policy. (Note
that options in the secondary listbox appear only after you choose an option
from the primary listbox.)
4 To create the summary report, click Apply.
Summary reports take their name from the primary summary criterion. If you
rerun a report with new criteria, the report name changes accordingly.
5 Save the report.
See Saving custom incident reports on page 1003.
Viewing incidents
Symantec Data Loss Prevention incident lists display the individual incident records
with information about the incidents. You can click on any incident to see a snapshot
containing more details. You can select specific incidents or groups of incidents to
modify or remediate.
Symantec Data Loss Prevention provides incident lists for Network, Endpoint, and
Discover incidents.
To view incidents
1 In the Enforce Server administration console, on the Incidents menu, select
one of the types of reports.
For example, select Discover. In the left navigation panel, click Incidents-All
Scans.
The incident list displays the individual incident records that contain information
such as severity, associated policy, number of matches, and status.
2 Optionally, use report filters to narrow down the incident list.
See Filtering reports on page 1002.
3 To view more details of a particular incident, click the incident.
The incident snapshot appears, displaying general incident information, matches
detected in the intercepted text, and details about policy, attributes, and incident
history.
You can also search for similar incidents from the Correlations tab.
4 Optionally, click through the incident snapshot to view more information about
the incident.
The following list describes the ways you can access more information through
the snapshot:
Managing and reporting incidents 1000
About custom reports and dashboards
You can find information about the policy that detected the incident. On the
Key Info tab, the Policy Matches section displays the policy name. Click
on the policy name to see a list of incidents that are associated with that
policy. Click view policy to see a read-only version of the policy.
This section also lists other violated policies with the same file or message.
When multiple policies are listed, you can see the snapshot of an incident
that is associated with a particular policy. Click go to incident next to the
policy name. To see a list of all incidents that the file or message created,
click show all.
You can view lists of the incidents that share various attributes with the
current incident. The Correlations tab shows a list of correlations that
match single attributes. Click on attribute values to see the lists of incidents
that are related to those values.
For example, the current network incident is triggered from a message from
a particular email account. You can bring up a list of all incidents that this
account created.
For most network incidents, you can access any attachments that are
associated with the network message. To do so, locate the Attachments
field in the Incident Details section of the snapshot and click the attachment
file name.
For a detailed description of incident snapshots and the actions you can perform
through them, see the online Help.
5 When you finish viewing incidents, you can exit the incident snapshot or incident
list, or you can choose one or more incidents to remediate.
See Remediating incidents on page 923.
whether the report is shared or private and displays the report generation and
delivery schedule.
You can modify existing reports and save them as custom reports, and you can
also create custom dashboards. Custom reports and dashboards are listed in the
Saved Reports section of the navigation panel.
You can click any report on the list to re-run it with current data.
You can view and run custom reports for reports created by users who have any
of the roles that are assigned to you. You can only edit or delete the custom reports
that are associated with the current role. The only custom reports visible to the
Administrator are the reports that the Administrator user created.
A set of tables lists all the options available for filtering and summarizing reports.
See About summary reports on page 997.
See Summary options for incident reports on page 1032.
See General filters for reports on page 1028.
See Advanced filter options for reports on page 1037.
Create Dashboard Lets you create a custom dashboard that displays summary data from
several reports you specify. For users other than the Administrator, this
option leads to the Configure Dashboard screen, where you specify
whether the dashboard is private or shared. All Administrator
dashboards are private.
Saved (custom) reports associated with your role appear near the top of the screen.
The following options are available for your current role's custom reports:
Click this icon next to a report to display the save report or configure
dashboard screen. You can change the name, description, or schedule,
or (for dashboards only) change the reports to include.
Click this icon next to a report to display the screento change the
scheduling of this report. If this icon does not display, then this report
is not currently scheduled.
Click this icon next to a report to delete that report. A dialog prompts
you to confirm the deletion. When you delete a report, you cannot
retrieve it. Make sure that no other role members need the report before
you delete it.
Filtering reports
You can filter an incident list or summary report.
To filter an incident list
1 In the Enforce Server administration console, on the Incidents menu, select
one of the types of reports.
For example, select Network, and then click Policy Summary.
2 In the Filter area, current filters are displayed, as well as options for adding
and running other filters.
3 Modify the default filters as wanted. For example, from the Status filter
drop-down lists, select Equals and New.
For Network, Mobile, and Endpoint reports, the default filters are Date and
Status. For Discover reports, default filters are Status, Scan, and Target ID.
Managing and reporting incidents 1003
Saving custom incident reports
4 To add a new filter, select filter options from the drop-down lists. Click
Advanced Filters & Summarization for additional options. Click Add Filter
on the right, for additional filter options.
Select the filter type and parameters from left to right as if writing a sentence.
For example, from the advanced filters, Add Filter options, select Policy and
Is Any Of, and then select one or more policies to view in the report. Hold
down Ctrl or Shift to select more than one item in the listbox.
5 Click Apply to update the report.
6 Save the report.
See Saving custom incident reports on page 1003.
3 In the Sharing section, users other than the administrator can share a custom
report.
The Sharing section lets you specify whether to keep the report private or
share it with other role members. Role members are other users who are
assigned to the same role. To share the report, select Share Report. All role
members now have access to this report, and all can edit or delete the report.
If your account is deleted from the system, shared reports remain in the system.
Shared reports are associated with the role, not with any specific user account.
If you do not share a report, you are the only user who can access it. If your
account is deleted from the system, your private reports are deleted as well.
If you log on with a different role, the report is visible on the Incident Reports
screen, but not accessible to you.
4 Click Save.
Auto - Send to incident data owners To send the report to the data owners, the
Send report data with emails setting must
be enabled for this option to appear.
Note: If your Enforce Server is not configured to send email, or you are not allowed
to send reports, the Schedule Delivery section does not appear.
When you make a selection from the list, additional fields appear.
To remove scheduling of a report that was previously scheduled, click the Remove
option.
The following table describes the additional fields available for each option on the
list.
Managing and reporting incidents 1007
Delivery schedule options for incident and system reports
Send To
Specify Manual to specify the email addresses.
Specify Auto for automatic sending to data owners.
To
Enter one or more email addresses. Separate them with commas.
CC
Enter one or more email addresses. Separate them with commas.
Subject
Provide a subject for the email.
Body
Enter the body of the email. Use variables for items such as the
policy name.
See Response action variables on page 926.
One time Select One time to schedule the report to be run once at a future time,
and then specify the following details for that report:
Time
Select the time you want to generate the report.
Send Date
Enter the date you want to generate the report, or click the date
widget and select a date.
Daily Select Daily to schedule the report to be run every day, and then specify
the following details for that report:
Time
Select the time you want to generate the report.
Until
Enter the date you want to stop generating daily reports, click the date
widget and select a date, or select Indefinitely.
Weekly Select Weekly on to schedule the report to be run every week, and
then specify the following details for that report:
Time
Select the time you want to generate the report.
Days of Week
Click to check one or more check boxes to indicate the day(s) of
the week you want to generate the report.
Until
Enter the date you want to stop generating weekly reports, click the
date widget and select a date, or select Indefinitely.
Managing and reporting incidents 1008
Delivery schedule options for dashboard reports
Monthly Select Monthly on to schedule the report to be run every month, and
then specify the following details for that report:
Time
Select the time you want to generate the report.
Day of Month
Enter the date on which you want to generate the report each month.
Until
Enter the date you want to stop generating monthly reports, click
the date widget and select a date, or select Indefinitely.
Note: If your Enforce Server is not configured to send email, or you are not allowed
to send reports, the Delivery Schedule section does not appear.
When you make a selection from the Schedule drop-down list, additional fields
appear.
The following table describes the additional fields available for each option on the
list.
Once Select Once to schedule the report to be run once at a future time, and
then specify the following details for that report:
On
Enter the date you want to generate the report, or click the date widget
and select a date.
At
Send To
Send Every Day Select Send Every Day to schedule the report to be run every day,
and then specify the following details for that report:
At
Enter the date you want to stop generating daily reports, click the date
widget and select a date, or select Indefinitely.
Send To
Send Weekly On Select Send Weekly on to schedule the report to be run every week,
and then specify the following details for that report:
Day
Click to check one or more check boxes to indicate the day(s) of the
week you want to generate the report.
At
Until
Enter the date you want to stop generating weekly reports, click the
date widget and select a date, or select Indefinitely.
Send To
Send Monthly On Select Send Monthly on to schedule the report to be run every month,
and then specify the following details for that report:
Enter the date on which you want to generate the report each month.
At
Until
Enter the date you want to stop generating monthly reports, click the
date widget and select a date, or select Indefinitely.
Send To
To export a report
1 Click Incidents, and select a type of report.
2 Navigate to the report that you want to export. Filter or summarize the incidents
in the report, as desired.
See Common incident report features on page 1020.
3 Check the boxes on the left side of the incidents to select the incidents to
export.
4 In the Export drop-down, select Export All: CSV or Export All: XML
Note: See the current version of the Incident Reporting and Update API
Developers Guide for the location of the XML schema files for exported reports
and for a description of individual XML elements.
5 Click Open or Save. If you selected Save, a Save As dialog box opens, and
you can specify the location and the file name.
See Exported fields for Network Monitor on page 1011.
See Exported fields for Endpoint Discover on page 1014.
See Exported fields for Network Discover/Cloud Storage Discover on page 1012.
See Exported fields for Mobile Prevent for Web on page 1013.
See Printing incident reports on page 1023.
See Sending incident reports by email on page 1022.
Matches The number of times that this item matches the detection parameters of a
policy rule.
Data Owner The person responsible for remediating the incident. This field must be set
Name manually, or with one of the lookup plug-ins.
Data Owner The email address of the person responsible for remediating the incident.
Email This field must be set manually, or with one of the lookup plug-ins.
Type Target type (for example file system, Lotus Notes, or SQL Database).
Seen Before Was this incident previously seen? The value is Yes or No.
Matches The number of times that this item matches the detection parameters of a
policy rule.
Last Date and time when the item was last modified.
Modified
Date
File Create Date and time when the item was created.
Date
Last Access Date and time when the item was last accessed (not shown for NFS targets).
Date
Data Owner The person responsible for remediating the incident. This field must be set
Name manually, or with one of the lookup plug-ins.
Data Owner The email address of the person responsible for remediating the incident.
Email This field must be set manually, or with one of the lookup plug-ins.
Matches The number of times that this item matches the detection parameters of a
policy rule.
Data Owner The person responsible for remediating the incident. This field must be set
Name manually, or with one of the lookup plug-ins.
Data Owner The email address of the person responsible for remediating the incident.
Email This field must be set manually, or with one of the lookup plug-ins.
Matches The number of times that this item matches the detection parameters of a
policy rule.
Data Owner The person responsible for remediating the incident. This field must be set
Name manually, or with one of the lookup plug-ins.
Data Owner The email address of the person responsible for remediating the incident.
Email This field must be set manually, or with one of the lookup plug-ins.
Deleting incidents
Incident reporting performance often deteriorates when the number of incidents in
your system exceeds one million (1,000,000). Symantec recommends keeping your
incident count below this threshold by deleting incidents to maintain good system
performance.
Incident deletion is permanent: you can delete incidents, but you cannot recover
the incidents that you have deleted. Symantec Data Loss Prevention offers options
for deleting only certain parts of the data that triggered the incident.
After you have marked incidents for deletion, you can view, configure, run, and
troubleshoot the incident deletion process from the Enforce Server administration
console.
For information about deleting archived incidents, See Deleting hidden incidents
on page 1050.
To delete an incident
1 On the Incident Report screen, select the incident or incidents you want to
delete, then click Incident Actions > Delete Incidents.
2 On the Delete Incidents screen, select from the following deletion options:
Delete incident Permanently deletes the incident(s) and all associated data (for
completely example, any emails and attachments). Note that you cannot
recover the incidents that have been deleted.
Managing and reporting incidents 1016
Deleting incidents
Retain incident, Retains the actual incident(s) but discards the Symantec Data
but delete Loss Prevention copy of the data that triggered the incident(s).
message data You have the option of deleting only certain parts of the associated
data. The rest of the data is preserved.
Delete Original Deletes the message content (for example, the email message
Message or HTML post). This option applies only to Network incidents.
Delete This option refers to files (for Endpoint and Discover incidents) or
Attachments/Files email or posting attachments (for Network incidents). The options
are:
manually, and the job status (Completed, Failed, or In Progress). In the case of
failed deletion jobs, you can click the Failed link to see the error message and
problem statement. This information may be useful to your Oracle database
administrator in troubleshooting the job failure. If this information is insufficient to
resolve your deletion job issues, you can export information from any job to a CSV
file and send it to Symantec Data Loss Prevention Support for additional help.
By default, the incident deletion job runs nightly at 11:59 P.M. in the Enforce Server's
local time zone. When the job runs, it also creates an event on the System > Server
> Events screen. This event is created whether or not any incidents are actually
deleted.
3 Click Submit.
Note: The incident deletion job schedule is reset to the default value during the
upgrade process. If you are using a custom incident deletion job schedule,
reconfigure the schedule after the upgrade process is complete.
Managing and reporting incidents 1018
Deleting incidents
On Linux systems:
/opt/SymantecDLP/Protect/config/manager.properties
com.vontu.incident.deletion.progress.refreshRate=120000
3 Save and close the manager.properties file, then restart the Vontu Manager
service.
See About Data Lost Prevention services on page 77.
Use the Show All link on an Incident List with caution when the system
contains more than 500 incidents. Browser performance degrades
drastically if more than 500 incidents are displayed on the Incident List
page.
Select All Selects all incidents on all pages, so you can update them all at once.
(Available only on Incident Lists.) Click Unselect All to cancel.
Note: Use caution when you choose Select All. This option selects all
the incidents in the report (not only those on the current page). Any
incident command that you subsequently apply affects all the incidents.
To select only the incidents on the current page, select the checkbox
at top left of the incident list.
Status Select Equals, Is Any Of, or Is None Of. Then select status
values. Hold down Ctrl and click to select more than one
separate status value. Hold down Shift and click to select a
range.
Scan For Discover reports, select the scan to report. You can select
the most recent scan, the initial scan, or a scan in progress.
Discover reports
All Scans is the default.
Managing and reporting incidents 1022
Sending incident reports by email
Target ID For Discover reports, select the name of the target to report.
All Targets is the default.
Click the Advanced Filters & Summarization bar to expand the section with filter
and summary options.
Click Add Filter to add an advanced filter.
Select a primary and optional secondary option for summarization. A single-summary
report is organized with a single summary criterion, such as the policy that is
associated with each incident. A double-summary report is organized with two
criteria, such as policy and incident status.
Note: If you select a condition in which you enter the content to be matched in the
text field, your entire entry must match exactly. For example, if you enter "apples
and oranges", that exact text must appear in the specified component for it to be
considered a match. The sentence "Bring me the apples and the oranges" is not
considered a match.
For a complete list of the report filter and summary options, see the Symantec Data
Loss Prevention Administration Guide.
See Common incident report features on page 1020.
Note: This section appears only if a system administrator has configured custom
attributes.
view a list of all incidents that violated the policy. Click view policy to view a read-only
version of the policy.
You see the icons that describe the following information:
Symantec Data Loss Prevention blocked a copy of the sensitive information.
Symantec Data Loss Prevention notified the user about the copy of confidential
data.
This section also lists other policies that are violated from the same file. To view
the snapshot of an incident that is associated with a particular policy, click the Go
to Incident link next to the policy name. To view a list of all incidents that are related
to the file, click show all.
See Discover incident snapshots on page 972.
See Endpoint incident snapshot on page 947.
See Network incident snapshot on page 936.
See Mobile incident snapshot on page 959.
or group are not set through Symantec Data Loss Prevention. Administrators set
the permissions for each file using other types of programs on the endpoint.
Permissions are generally set at the time that the file is created.
For example, User 1 has permission to access the file Example1.doc. User 1 can
view and edit the file. User 2 also has access to the file Example1.doc. However,
User 2 can only view the file. User 2 does not have permission to make changes
to the file. In the ACL, both User 1 and User 2 are listed with the permissions that
have been granted to them.
Table 47-1 shows the combinations.
Name Permission
The ACL contains a new line for each permission granted. The ACL only contains
one line for User 2 because User 2 only has one permission, to read the file. User
2 cannot make any changes to the file. User 1 has two entries because User 1 has
two permissions: reading the file and editing it.
You can view ACL information only on Discover and Endpoint local drive incident
snapshots. You cannot view ACL information on any other type of incidents.
The Access Information section appears on the Key Info tab of the incident
snapshot.
See Discover incident snapshots on page 972.
See Endpoint incident snapshot on page 947.
See Network incident snapshot on page 936.
See Mobile incident snapshot on page 959.
General filters
Advanced filters
Summary options
General filters The general filter options are See General filters for
the most commonly used. reports on page 1028.
They are always visible in the
incident list report.
Advanced filters The advanced filters provide See Advanced filter options
many additional filter options. for reports on page 1037.
You must click the Advanced
Filters & Summarization
bar, and then click Add Filter
to view these filter options.
Summary options The summary options provide See Summary options for
ways to summarize the incident reports on page 1032.
incidents in the list. You must
click the Advanced Filters &
Summarization bar to view
these summary options.
Symantec Data Loss Prevention contains many standard reports. You can also
create custom reports or save report summary and filter options for reuse.
See About Symantec Data Loss Prevention reports on page 987.
Name Description
Equals The status is equal to the field that is selected in the next
drop-down.
Is Any Of The status can be any of the fields that are selected in the next
drop-down. Shift-click to select multiple fields.
Is None Of The status is none of the fields that are selected in the next
drop-down. Shift-click to select multiple fields.
Name Description
Current Month to Date All of the incidents that were reported for the current month up to
today's date.
Current Quarter to Date All of the incidents that were reported for the current quarter up
to today's date.
Current Week to Date All of the incidents that were reported for the current week.
Current Year to Date All of the incidents that have been reported for the current year
up to today's date.
Custom A custom time frame. Select the dates that you want to view from
the calendar menu.
Last 7 Days All of the incidents that were reported in the previous seven days.
Last 30 Days All of the incidents that were reported in the previous 30 days.
Last Month All of the incidents that were reported during the previous calendar
month.
Last Week All of the incidents that were reported during the previous calendar
week.
Last Quarter All of the incidents that were reported during the previous quarter.
Last Year All of the incidents that were reported during the last calendar
year.
Managing and reporting incidents 1030
General filters for reports
Name Description
Table 47-4 lists the general filter options by severity. Check the box to select the
severities to include in the filter.
These severity filters are available for Network, Endpoint, Mobile, and Discover
incidents.
Name Description
Info Lists only the incidents that are informational only. Informational
incidents are not assigned any other severity. Displays how many
informational incidents are in the incident list.
Table 47-5 lists the general filter options for Network Discover/Cloud Storage
Discover scans. This filter is only available for Discover incidents.
Name Description
All Scans All of the incidents that have been reported in all of the scans that
have been run.
Initial Scan All of the incidents that were reported in the initial scan.
In Process All of the incidents that have been reported in the scans that are
currently in progress.
Last Completed Scan All of the incidents that were reported in the last complete scan.
Managing and reporting incidents 1031
General filters for reports
You can filter Discover incidents by Target ID. This filter is only available for Discover
incidents.
Select the target, or select All Targets. Shift-click to select multiple fields.
Table 47-6 lists the general filter options by detection date for Discover incidents.
Name Description
Current Month to Date All of the incidents that were reported for the current month up to
today's date.
Current Quarter to Date All of the incidents that were reported for the current quarter up
to today's date.
Current Week to Date All of the incidents that were reported for the current week.
Current Year to Date All of the incidents that have been reported for the current year
up to today's date.
Custom A custom time frame. Select the dates that you want to view from
the calendar menu.
Custom Since The Symantec DLP Agents that have connected to the Endpoint
Server from a specific date to the present date. Select the date
where you want the filter to begin.
Custom Before The Symantec DLP Agents that have connected to an Endpoint
Server before a specific date. Select the final date for the filter.
Last 7 Days All of the incidents that were reported in the previous seven days.
Last 30 Days All of the incidents that were reported in the previous 30 days.
Last Month All of the incidents that were reported during the previous calendar
month.
Last Week All of the incidents that were reported during the previous calendar
week.
Last Quarter All of the incidents that were reported during the previous quarter.
Last Year All of the incidents that were reported during the last calendar
year.
Note: Hidden incidents are not included in report summaries unless the Advanced
filter option for the Is Hidden filter is set to Show All.
See About incident hiding on page 1047.
Mobile
Discover
Mobile
Mobile
Managing and reporting incidents 1035
Summary options for incident reports
Mobile
Discover
Managing and reporting incidents 1036
Summary options for incident reports
Mobile
Discover
Mobile
Mobile
Managing and reporting incidents 1037
Advanced filter options for reports
Mobile
Agent Configuration Status Summarize the agent by the status of the Endpoint
configuration entity.
Current Configuration
The configuration on the agent is the same
as the configuration on the Endpoint Server.
Outdated Configuration
The configuration on the agent is different
than the configuration on the Endpoint
Server.
Unknown/deleted Configuration
The agents either cannot report which
configuration is installed, or the configuration
on the agent has been deleted from the
Endpoint Server.
Agent Response Filter incidents by how the agent has responded Endpoint
to the incident.
Application Window Title Filter the incidents by a string in the title of the Endpoint
window where the incident was generated.
Attachment File Name Filter incidents by the file name of the Network
attachment that is associated with the incident.
Mobile
Attachment File Size Filter incidents by the size of the attachment that Network
is associated with the incident.
Mobile
Box: Collaborator Role Filter incidents by the role of the Box Discover
collaborator. Roles include:
Co-owner
Editor
Previewer
Previewer Uploader
Uploader
Viewer
Viewer Uploader
Managing and reporting incidents 1039
Advanced filter options for reports
Box: Shared Link Download Allowed Filter incidents by the presence or absence of Discover
a shared link that allows downloads.
Box: Shared Link Expiration Date Filter incidents by the expiration date setting of Discover
a shared link.
Box: Shared Link Password Protected Filter incidents by the presence or absence of Discover
a password-protected shared link.
Content Root Filter the incidents by the content root path. Discover
Data Owner Email Address The email address of the person responsible for Network
remediating the incident. This field must be set
Endpoint
manually, or with a lookup plug-in.
Discover
Mobile
Data Owner Name The person responsible for remediating the Network
incident. This field must be set manually, or with
Endpoint
a lookup plug-in.
Discover
Reports can automatically be sent to the data
owner for remediation. Mobile
Mobile
Detection Date Filter the incidents by the date that the incident Discover
was detected.
Document Name Filter the incidents by the name of the violating Discover
document.
File Last Modified Date Filter the incidents by the last date when the file Endpoint
was modified.
Discover
File Location Filter the incidents by the location of the violating Endpoint
file.
File Name Filter the incidents by the name of the violating Endpoint
file. No wildcards, but you can specify a partial
Discover
match, for example .pdf.
File Owner Filter the incidents by the owner of the violating Discover
files.
File Size Filter the incidents by the size of the violating Endpoint
file.
Discover
Incident History Issuer Filter the incidents by the user responsible for Network
issuing the history of the incident.
Endpoint
Discover
Mobile
Endpoint
Discover
Mobile
Incident Match Count Filter the incidents by the number of incident Network
matches.
Endpoint
Discover
Mobile
Managing and reporting incidents 1041
Advanced filter options for reports
Discover
Mobile
Incident Reported On Filter the incidents by the date that the incident Endpoint
was reported.
Investigating State Filter the agents by the investigation state. You Discover
can select one of the following:
Endpoint
Investigating
Not Investigating
Is Hiding Allowed Filters the incidents based on the state of the Is Network
Hiding Allowed flag. Select the Is Any Of
Endpoint
operator from the second field, then select either
the Allow Hiding or Do Not Hide option from Discover
the third field. Mobile
See About incident hiding on page 1047. Classification
Last Connection Time Filter agents according to the last time each Endpoint
agent connected to the Endpoint Server.
Minimum Similarity Score Filter the incidents by how similar the violations Mobile
are to each other.
Network Prevent Action Filter the incidents by the action from Network Network
Prevent.
Policy Filter the incidents by the policy from which they Network
were created.
Endpoint
Discover
Mobile
Policy Group Filter the incidents by the policy group to which Network
they belong.
Endpoint
Discover
Mobile
Policy Rule Filter the incidents by the policy rule that Network
generated the incidents.
Endpoint
Discover
Mobile
Protect Status Filter the incidents by the Network Protect status Discover
of the incidents.
Protocol or Endpoint Destination Filter the incidents by the protocol or the Endpoint
endpoint destination that generated the incident.
Read ACL: File Filter the incidents by the File access control Endpoint
list.
Discover
Read ACL: Share Filter the incidents by the Share access control Discover
list.
Discover
Managing and reporting incidents 1043
Advanced filter options for reports
Remediation Detection Status Filter the incidents by their remediation detection Discover
status.
Scanned Machine Filter the incidents by the computers that have Discover
been scanned.
Seen Before Filter the incidents on whether an earlier Discover, but not
connected incident exists. for SQL Database
incidents (where
Seen Before is
always false)
Endpoint
Discover
Discover
Mobile
SharePoint ACL: Permission Level Filter the incidents on the permission level of Discover
the SharePoint access control list.
SharePoint ACL: User/Group Filter the incidents on the user or group in the Discover
SharePoint access control list.
Mobile Prevent Action Filter the incidents by the response rule action Mobile
that was taken.
Target Type Filter the incidents by the type of target that is Discover
associated with the incidents.
Managing and reporting incidents 1044
Advanced filter options for reports
Time Since First Detected Filter the incidents by how much time has Discover, but not
passed since the incident was first detected. for SQL Database
incidents
User Justification Filter the incidents by the justification that was Endpoint
input by the user.
User Name Filter the incidents by the user who generated Endpoint
the incident.
The second field in the advanced filters lets you select the match type in the filter.
Name Description
Contains Any Of Lets you modify the filter to include any words in the text string,
or lets you choose from a list in the third field.
Contains Ignore Case Lets you modify the filter to ignore a specific text string.
Does Not Contain Lets you modify the filter to filter out the ignored text string.
Ignore Case
Does Not Match Exactly Lets you modify the filter to match on any combination of the text
string.
Ends with Ignore Case Lets you modify the filter so that only the incidents that end with
the ignored text string appear.
Is Any Of Lets you modify the filter so that the results include any of the
text string, or lets you choose from a list in the third field.
Is Between Lets you modify the filter so that the numerical results are
between a range of specified numbers.
Is Greater Than Lets you modify the filter so that the numerical results are greater
than a specified number.
Is Less Than Lets you modify the filter so that the numerical results are less
than a specified number.
Managing and reporting incidents 1045
Advanced filter options for reports
Name Description
Is None Of Lets you modify the filter so that the results do not include any
of the text string, or lets you choose from a list in the third field.
Is Unassigned Lets you modify the filter to match incidents for which the value
specified in the first field are unassigned.
Matches Exactly Lets you modify the filter to match exactly the text string.
Matches Exactly Ignore Lets you modify the filter so that the filter must match the ignored
Case text string exactly.
Starts with Ignore Case Lets you modify the filter so that only the incidents that start with
the ignored text string appear.
The third field in the advanced filters lets you select from a list of items, or provides
an empty box to enter a string.
This third field varies depending on the selections in the first and second fields.
For a list of items, use Shift-click to select multiple items.
For strings, wildcards are not allowed, but you can enter a partial string.
For example, you can enter .pdf to select any PDF file.
If you do not know what text to enter, use the summary options to view the list of
possible text values. You can also see a summary of how many incidents are in
each category.
See Summary options for incident reports on page 1032.
Table 47-10 lists some of the options in the third field.
Name Description
Blocked The user was blocked from performing the action that cause the
incident.
None No action was taken regarding the violation that caused the
incident.
Protect File Copied The file in violation was copied to another location.
Managing and reporting incidents 1046
Advanced filter options for reports
Name Description
User Notified The user was notified that a violation had occurred.
Chapter 48
Hiding incidents
This chapter includes the following topics:
Hiding incidents
includes an entry for each time the Do Not Hide or Allow Hiding flags are set for
the incident.
See Filtering reports on page 1002.
Access to hiding functionality is controlled by roles. You can set the following user
privileges on a role to control access:
Hide IncidentsGrants permission for a user to hide incidents.
Unhide IncidentsGrants permission for a user to show hidden incidents.
Remediate IncidentsGrants permission for a user to set the Do Not Hide or
Allow Hiding flags.
See About role-based access control on page 85.
See Hiding incidents on page 1048.
See Unhiding hidden incidents on page 1048.
See Preventing incidents from being hidden on page 1049.
Hiding incidents
To hide incidents
1 Open the Enforce Server administration console and navigate to an incident
report.
2 Select the incidents you want to hide, either by selecting the incidents manually
or by setting filters or advanced filters to return the set of incidents that you
want to hide.
3 Click the Incident Actions button and select Hide/Unhide > Hide Incidents.
The selected incidents are hidden.
Note: You can allow incidents to be hidden that you have prevented from being
hidden by selecting the incidents and then selecting Hide/Unhide > Allow
Hiding from the Incident Actions button.
Note: You can allow an incident to be hidden that you have prevented from
being hidden by opening the incident snapshot and then clicking Allow Hiding
in the Incident Details section.
Hiding incidents 1050
Deleting hidden incidents
Delete incident Permanently deletes the incident(s) and all associated data (for
completely example, any emails and attachments). Note that you cannot
recover the incidents that have been deleted.
Retain incident, Retains the actual incident(s) but discards the Symantec Data
but delete Loss Prevention copy of the data that triggered the incident(s).
message data You have the option of deleting only certain parts of the associated
data. The rest of the data is preserved.
Delete Original Deletes the message content (for example, the email message
Message or HTML post). This option applies only to Network incidents.
Delete This option refers to files (for Endpoint and Discover incidents) or
Attachments/Files email or posting attachments (for Network incidents). The options
are All, which deletes all attachments, and Attachments with no
violations. For example, choose this option to delete files (for
Endpoint and Discover incidents) or email attachments (for
Network incidents).
The Status Values section lists the current incident status attributes that can
be assigned to a given incident. Use this section to create new status attributes,
modify them, and change the order that each attribute appears in drop-down
menus.
See Configuring status attributes and values on page 1053.
Status Groups
The Status Groups section lists the current incident status groups and their
composition. Use this section to create new status groups, modify them, and
change the group order they appear in drop-down menus.
See Configuring status groups on page 1054.
Custom Attributes on the Custom Attributes tab
The Custom Attributes tab provides a list of all of the currently defined custom
incident attributes. Custom attributes provide information about the incident or
associated with the incident. For example, the email address of the person who
caused the incident, that person's manager, why the incident was dismissed,
and so on. Use this tab to add, configure, delete, and order custom incident
attributes.
See About custom attributes on page 1058.
The process for handling incidents goes through several stages from discovery to
resolution. Each stage is identified by a different status attribute such as "New,"
"Investigation," "Escalated," and "Resolved." This lets you track the progress of the
incident through the workflow, and filter lists and reports by incident status.
The solution pack you installed when you installed Symantec Data Loss Prevention
provides an initial default set of status attributes and status attribute groups. You
can create new status attributes, or modify existing ones. The status attribute values
and status groups you use should be based on the workflow your organization uses
to process incidents. For example, you might assign all new incidents a status of
"New." Later, you might change the status to "Assigned," "Investigation," or
"Escalated." Eventually, most incidents will be marked as "Resolved" or as
"Dismissed."
For list and report filtering, you can also create status groups.
Based on the preferences of your organization and the commonly used terminology
in your industry, you can:
Customize the names of the status attributes and add new status attributes.
Customize the names of the status groups and add new status groups.
Set the order in which status attributes appear on the Status drop-down list of
an incident.
Specify the default status attribute that is automatically assigned to new incidents.
Working with incident data 1053
Configuring status attributes and values
Action Procedure
Delete an incident status attribute. Click the attribute's red X and then confirm your
decision.
Change an incident status attribute. Click on the attribute you want to change, enter a
new name, and click Save.
Make an incident status attribute the Click [set as default] for an attribute to make it
default. the default status for all new incidents.
Change an incident status attribute's Click [up] to move an attribute up in the order.
order in drop-down menus. Click [down] to move an attribute down in the
order.
Action Procedure
Create a new incident status group. Click the Add Status Group button.
Delete an incident status group. Click the group's red X and then confirm your
decision.
Change the name or incident status Click on the group you want to change.Click the
attributes of a group. pencil icon. Change the name, check or uncheck
attributes, and click Save.
Change a status group's order in Click [up] to move a group up in the order.
drop-down menus. Click [down] to move a group down in the
order.
4 Click the check boxes for the status attributes that you want to include in this
group.
Status attributes are defined with the Add button in the Status Values section.
See Configuring status attributes and values on page 1053.
5 Click Save.
See Configuring status attributes and values on page 1053.
See About incident status attributes on page 1051.
Field Description
Field Description
Report to Export From the drop-down list, select the report that
you want to archive. Any reports you created
are available along with default report options.
The Network options are as follows:
Events - All
After you complete the fields, click Create to compile the archive.
See Export web archive on page 1055.
Working with incident data 1058
Export web archiveAll Recent Events
The solution pack you loaded when you installed Symantec Data Loss Prevention
provides an initial default set of custom attributes. The Custom Attributes tab
provides a list of all of the currently defined custom attributes that may be applied
to any incident. This tab is for creating, modifying, and deleting custom attributes
for your installation as a whole. Applying any of these custom attributes, or attribute
values, to an individual incident is done from the incident snapshot, or by using a
lookup plug-in.
On the Custom Attributes tab, you can perform the following functions:
Action Procedure
Delete a custom attribute. Click the attribute's red "X" and then confirm your
decision.
Change the name, email status, or Click on the attribute you want to change, change
attribute group of an attribute. its parameters, and Click Save.
Change the attributes order in 1 Click [up] to move an attribute up in the order.
drop-down menus.
2 Click [down] to move an attribute down in
the order.
Note: If the new lookup returns null or empty values for any custom attribute fields,
those empty values overwrite the existing values.
Working with incident data 1061
Configuring custom attributes
command and Attributes section on the Incident Snapshot page are available
only if at least one custom attribute is defined.
See Configuring custom attributes on page 1061.
See About incident status attributes on page 1051.
See Configuring status groups on page 1054.
See Configuring status attributes and values on page 1053.
Note: To auto-populate custom attribute values, use one or more lookup plugins.
See About lookup plug-ins on page 1076.
1 Create custom user attributes You can create custom attributes for filtering and working with user
risk summary reports. For example, you can create an attribute named
Employment Status to track the employment status of each of your
users. You can then import that information in a file that is exported
from your enterprise resource planning system, such as PeopleSoft.
2 Import user data You can import user data from an Active Directory connection or from
a CSV file. Incidents are associated with specific users by email
address and logon credentials. You can also upload files with your
custom attributes, such as information from your enterprise resource
planning system. Symantec Data Loss Prevention provides a CSV
template file that you can use to format any data you want to upload.
3 Configure IP address to user name Symantec Data Loss Prevention can resolve user names from IPv4
resolution addresses in HTTP/S and FTP incidents. The domain controller agent
queries Windows Events in the Microsoft Active Directory Security
Event Log of the domain controller. Symantec Data Loss Prevention
associates these Windows Events with user data in your database.
3 View the User List The User List is a list of all users in your system, including their email
address, domain, and logon name.
You can view details for specific users in the user snapshot.
4 View the User Risk Summary The User Risk Summary displays your users and their associated
Endpoint and Network incidents. Use the User Risk Summary to
drill into your user-centric incident data to help you find the
highest-risk users. You can sort and filter this list by policies, custom
attributes, incident status, incident severity, user name identified by
IP address, number of incidents, date, incident type, and user name.
5 Export user risk summary or user You can export data from the user risk summary and user snapshots
snapshot data. to a CSV file.
Using the information that is provided in the user risk summary, you can see who
the high-risk users are and determine the appropriate course of action to take. Such
actions might include:
Determining whether or not a user poses an active threat to your data security.
Working with user risk 1065
About user data sources
To filter the User Custom Attributes list, click Filters, then use the text
fields for ID or Attribute Name to enter a filter value.
To edit a custom attribute, click the attribute name or click the edit icon in
the Actions column, then edit the attribute in the User Attribute dialog
box.
To delete a custom attribute, click the delete icon in the Actions column.
4 The template file includes column headers for any custom attributes you have
defined.
To add custom attributes manually, create a new column for each attribute,
then populate the rows as appropriate.
You must enter the column headers in this format: ID[Attribute Name]. For
example, 1[Employment Status].
See Defining custom attributes for user data on page 1066.
5 Save the file (in .csv format) to a location on your Enforce Server.
To add a file-based user data source
1 In the Enforce Server administration console, go to System > Users > Data
Sources.
2 On the Data Source Management page, click Add > CSV User Source. The
Add CSV User Source dialog box appears.
3 In the Add CSV User Source dialog box, enter the following information:
Name: Specify a name for the data source.
File Path: Specify the path to the user data file. This file must be on the
Enforce Server.
Delimited by: Specify the delimiter for the file. Valid delimiters are comma,
pipe, semicolon, and tab.
Encoded by: Specify the character encoding format.
Error Threshold Percentage: Specify the percentage of user records that
can be invalid before the file is rejected and the import process fails. Records
with duplicate email addresses or logons count against the error threshold.
4 Click Submit.
(&
(objectClass=user)
(objectCategory=person)
(sAMAccountType=805306368)
(!
(|
(&
(sAMAccountType=805306368)
(sAMAccountName=-*)
)
(&
(sAMAccountType=805306368)
(sAMAccountName=_*)
)
)
)
)
Your Active Directory credentials must have permission to access the following
user attributes:
FIRST_NAME givenName
LAST_NAME sn
EMAIL mail
LOGIN_NAME sAMAccountName
TELEPHONE telephoneNumber
TITLE title
COUNTRY co
DEPARTMENT department
EMPLOYEE_ID employeeId
STREET_ADDRESS streetAddress
LOCALITY_NAME l
POSTAL_CODE postalCode
STATE_OR_PROVINCE st
OBJECT_DISINGUISHED_NAME distinguishedName
Your Active Directory credentials must also have permission to access the RootDSE
record. Symantec Data Loss Prevention reads these attributes from RootDSE:
namingContexts
defaultNamingContext
rootDomainNamingContext
configurationNamingContext
Working with user risk 1070
About user data sources
schemaNamingContext
isGlobalCatalogReady
highestCommittedUSN
(&(region=North America)(!systemAccount=true))
4 Click Submit.
Note: A best practice is that you should refer to directory connection objects with
baseDNs in the user section of your directory tree. For example:
ou=Users,dc=corp,dc=company,dc=com.
4 Click Submit.
To import a data source manually
1 In the Enforce Server administration console, go to System > Users > Data
Sources.
2 On the Data Source Management page, select the data source you want to
import.
3 Click Import.
To view data source import details
1 In the Enforce Server administration console, go to System > Users > Data
Sources.
2 On the Data Source Management page, click the Status link for your desired
data source.
The Import Details dialog box appears.
3 The Import Details dialog box displays the following information for all imports:
Name: The name of the imported data source.
Status: Done, Completed with Errors, Failed.
Queued at: The time that the data source import was entered in the import
queue.
Started at: The start time of the data source import.
Completed at: The completion time of the data source import.
For successful imports and imports completed with errors, the Import Details
dialog box displays the following additional information:
Added records: The number of added user records.
Working with user risk 1072
Resolving user names from IP addresses in web incidents
com.symantec.dlp.ipResolution.lookup.jobSchedule=000***
com.symantec.dlp.ipResolution.userRecord.retentionPeriod=5
3 To filter the list, select your filter values using the options above the user risk
summary list:
Attributes None (0) Enter up to two custom attributes to filter the list.
Select the attribute from the drop-down list, then
specify an include or exclude condition and enter
your desired values. To add a second attribute filter,
click Add Attribute Filter.
Include All You can filter the list by incident severity. You must
select at least one severity level.
"Manager Email" from an LDAP server. The plug-in populates the custom attributes
and displays them in the Incident Snapshot.
See About custom attributes on page 1058.
See About using custom attributes on page 1060.
See How custom attributes are populated on page 1060.
Type Description
CSV The CSV Lookup Plug-in lets you retrieve incident data from a comma-separated values (CSV)
file uploaded to the Enforce Server. You can configure one CSV Lookup Plug-in per Enforce Server
instance.
LDAP The LDAP Lookup Plug-in lets you retrieve incident data from a directory server, such as Microsoft
Active Directory, Novell LDAP, Oracle Directory Server (formerly Sun ONE), or IBM LDAP. You
can configure multiple instances of the LDAP Lookup Plug-in.
Script The Script Lookup Plug-in lets you write a script to retrieve incident data from any external resource.
For example, you can use a Script Lookup Plug-in to retrieve incident data from external resources
such as proxy log files or DNS systems. You can configure multiple instances of the Script Lookup
Plug-in.
Data Insight The Data Insight Lookup Plug-in lets you retrieve incident data from Symantec Data Insight so
that you can locate and manage data at risk. You can configure one Data Insight Lookup Plug-in
per Enforce Server instance.
Custom (Legacy) The Custom (Legacy) Lookup Plug-in lets you use Java code to retrieve incident data from any
external resource.
can use the output from such scripts to populate custom attributes in incident
records.
Unlike the CSV or LDAP Lookup Plug-ins, the Script Lookup Plug-In does not use
in-line attribute maps to specify how to look up parameter keys. Instead, you write
this functionality into each script as needed.
To implement a Script Lookup Plug-In , you can use any scripting language that
reads standard input (stdin) and writes standard output (stdout). The examples
in the user interface and in this documentation use Python version 2.6.
See Configuring advanced plug-in properties on page 1095.
Note: Custom (Legacy) Lookup Plug-Ins should only be used for migrating legacy
lookup plug-ins implemented using the Java Lookup API. Support for new Custom
Java Lookup Plug-Ins are not supported.
Implementing lookup plug-ins 1080
About lookup plug-ins
unnecessary database queries, you should only enable attribute groups that your
lookup plug-ins require.
Because the plug-in stops searching after it finds the first matching lookup parameter
key-value pair, the order in which you list the keys in your attribute map is significant.
Refer to the attribute mapping examples for the specific type of plug-in you are
implementing.
See Selecting lookup parameters on page 1086.
3. An LDAP Lookup Plug-in uses the result of the CSV lookup to obtain data from
a corporate LDAP directory.
See Chaining lookup plug-ins on page 1092.
See Chaining multiple Script Lookup Plug-Ins on page 1118.
In this case, check the plug-in at the System > Lookup Plugins screen and
manually configure it following the instructions provided with this documentation.
Refer to the Symantec Data Loss Prevention Release Notes for known issues
related to the upgrade of lookup plug-ins.
Step Description
1 Decide what external data you want to extract and load into incidents as custom attributes.
2 Identify the sources from which custom attribute data is to be obtained and the appropriate
lookup plug-in for retrieving this information.
Step Description
3 Create a custom attribute for each individual piece of external data that you want to include in
incident snapshots and reports.
4 Determine which lookup parameter groups include the specific lookup parameters you need
to extract the relevant data from the external sources.
5 Configure the plug-in to extract data from the external data source and populate the custom
attributes.
8 Verify privileges. The end user must have Lookup Attribute privileges to use a lookup plug-in
to look up attribute values.
9 Generate an incident. The incident must be of the type that exposes one or more incident
attributes that you have designated as parameter keys.
10 View the incident details. For the incident you generated, go to the Incident Snapshot screen.
In the Attributes section, you should see the custom attributes you created. Note that they are
unpopulated (have no value). If you do not see the custom attributes, verify the privileges and
that the custom attributes were created.
Implementing lookup plug-ins 1084
Implementing and testing lookup plug-ins
Step Description
11 If the lookup plug-in is properly implemented, you see the Lookup button available in the
Attributes section of the Incident Snapshot. Once you click Lookup you see that the value
for each custom attribute is populated. After the initial lookup, the connection is maintained and
subsequent incidents will have their custom attributes automatically populated by that lookup
plug-in; the remediator does not need to click Lookup for subsequent incidents. If necessary
you can reload the plug-ins.
Action Description
Modify Plugin Chain Select this option to enable (deploy) plug-ins and to set the order of lookup for multiple
plug-ins.
Lookup Parameters Select this option to choose which lookup parameter groups to use as keys to
populate attribute fields from external data sources.
Reload Plugins Select this option to refresh the system after making changes to enabled plug-ins
or if the external data is updated. This action automatically performs the enabled
lookups in order and populates the incidents as they are created.
For each configured lookup plug-in, the system displays the following information
at the Lookup Plugins List Page. You use this information to manage lookup
plug-ins.
Execution Sequence This field displays the order in which the system executes lookup plug-ins.
Name This field displays the user-defined name of each lookup plug-in.
Type The field displays the type of lookup plug-in. You can configure one CSV and one
Data Insight Lookup Plug-in per Enforce Server instance. You can configure multiple
instances of the LDAP, Script, and Custom (Legacy) lookup plug-ins.
Description This field displays the user-defined description of each lookup plug-in.
Status The field displays the state of each lookup plug-in, either On (green) or Off (red).
To edit the state of a plug-in, click Modify Plugin Chain.
For each configured lookup plug-in, you can perform the following management
functions at the Lookup Plugins List Page.
Action Description
Edit Click the pencil icon in the Actions column to edit the plug-in.
Delete Click the X icon in the Actions column to delete the plug-in. You must confirm or
cancel the action to execute it.
Group Group the plug-ins according to the selected display column. For example, where
you have multiple plug-ins, it may be useful to group them by Type or by Status.
Implementing lookup plug-ins 1086
Implementing and testing lookup plug-ins
CSV
LDAP
Script
Data Insight
Custom (Legacy)
Lookup parameter keys are organized into attribute groups. Selections made at
this screen apply to all lookup plug-ins deployed on the Enforce Server.
To perform a lookup, you must map at least one lookup parameter key to a field in
your external data source. Each lookup parameter group that you enable is a
separate database query for the Enforce Server to perform. All database queries
are executed for each incident before lookup. To avoid the performance impact of
unnecessary database queries, you should only enable attribute groups that your
lookup plug-ins require.
Because the plug-in stops searching after it finds the first matching lookup parameter
key-value pair, the order in which you list the keys in your attribute map is significant.
Refer to the attribute mapping examples for the specific type of plug-in you are
implementing for details.
See About lookup parameters on page 1080.
To enable one or more lookup parameter keys
1 Navigate to System > Lookup Plugins in the Enforce Server administration
console.
2 Click Lookup Parameters at the Lookup Plugins List Page.
3 Select (check) one or more attribute groups at the Edit Lookup Plugin
Parameters page.
Click View Properties to view all of the keys for that attribute group.
Attachment Table 51-6
Incident Table 51-7
Message Table 51-8
Policy Table 51-9
Recipient Table 51-10
Sender Table 51-11
Server Table 51-12
Monitor Table 51-13
Status Table 51-14
ACL Table 51-15
attachment-nameX Name of the attached file, where X is the unique index to distinguish between
multiple attachments, for example: attachment-name1, attachment-size1;
attachment-name2, attachment-size2; etc.
attachment-sizeX Original size of the attached file, where X is the unique index to distinguish
between multiple attachments. See above example.
date-detected Date and time when the incident was detected, for example:
date-detected=Tue May 15 15:08:23 PDT 2012.
incident-id The incident ID assigned by Enforce Server. The same ID can be seen in the
incident report. For example: incident-id=35.
protocol The name of the network protocol that was used to transfer the violating message,
such as SMTP and HTTP. For example: protocol=Email/SMTP.
data-owner-name The person responsible for remediating the incident. This attribute is not populated
by the system. Instead, it is set manually in the Incident Details section of the
Incident Snapshot screen, or automatically using a lookup plug-in.
Reports based on this attribute can automatically be sent to the data owner for
remediation.
data-owner-email The email address of the person responsible for remediating the incident. This
attribute is not populated by the system. Instead, it is set manually in the Incident
Details section of the Incident Snapshot screen, or automatically using a lookup
plug-in.
date-sent Date and time when the message was sent if it is an email. For example:
date-sent=Mon Aug 15 11:46:55 PDT 2011.
file-create-date Date that the file was created in its current location, whether it was originally
created there, or copied from another location. Retrieved from the operating
system.
Implementing lookup plug-ins 1089
Implementing and testing lookup plug-ins
file-modified-by Fully-qualified user credential for the computer where the violating copy action
took place.
file-owner The name of the user or the computer where the violating file is located.
discover-extraction-date Date a subfile was extracted from an encapsulated file during Discover scanning.
endpoint-volume-name The name of the local drive where an endpoint incident occurred.
endpoint-dos-volume-name The Windows name of the local drive where an endpoint incident occurred.
endpoint-application-name Name of application most recently used to open (or create) the violating file.
endpoint-application-path Path of the application that was used to create or open the violating file.
policy-name The name of the policy that was violated, for example: policy-name=Keyword
Policy.
Implementing lookup plug-ins 1090
Implementing and testing lookup plug-ins
recipient-emailX The email address of the recipient, where X is the unique index to distinguish
between multiple recipients; for example: recipient-email1,
recipient-ip1, recipient-url1; recipient-email2, recipient-ip2,
recipient-url2; etc.
recipient-ipX The IP address of the recipient, where X is the unique index to distinguish
between multiple recipients. See above example.
recipient-urlX The URL of the recipient, where X is the unique index to distinguish between
multiple recipients. See above example.
sender-email The email address of the sender for Network Prevent for Email (SMTP) incidents.
sender-ip The IP address of the sender for Endpoint and Network incidents on protocols
other than SMTP.
sender-port The port of the sender for Network incidents on protocols other than SMTP.
endpoint-user-name The user who was logged on to the endpoint when the violation occurred.
server-name The name of the detection server that reported the incident. This name is
user-defined and entered when the detection server is deployed. For example:
server-name=My Network Monitor.
monitor-name The name of the detection server that reported the incident. This name is
user-defined and entered when the detection server is deployed. For example:
server-name=My Network Monitor.
monitor-host The IP address of the detection server that reported the incident. For example:
monitor-host=127.0.0.1
Implementing lookup plug-ins 1091
Implementing and testing lookup plug-ins
monitor-id The system-defined numeric identifier of the detection server. For example:
monitor-id=1.
acl-principalX A string that indicates the user or group to whom the ACL applies.
acl-typeX A string that indicates whether the ACL applies to the file or to the share.
acl-grant-or-denyX A string that indicates whether the ACL grants or denies the permission.
acl-permissionX A string that indicates whether the ACL denotes read or write access.
Note: Administrators can also reload lookup plug-ins from the Custom
Attributes tab of the System > Incident Data > Attributes screen.
Problem Solution
Lookup plug-in fails to load If the plug-in failed to load, search for a message in the log file similar to the following:
SEVERE
[com.vontu.enforce.workflow.attributes.AttributeLookupLoader]
Error loading plugin [<Plugin_Name>]
Note the "Cause" section that follows this type of error message. Any such entries
will explain why the plug-in failed to load.
Attributes are not populated by If the plug-in loads but attributes are not populated, look in the log for the attribute
the lookup map. Verify that values are being populated, including for the lookup parameters that
you enabled. To do this, search for a lookup parameter key that you have enabled,
such as sender-email.
11 Search for the name of the lookup plug-in. You should see several messages.
12 If necessary, verify the lookup plug-in logging properties in file
\Protect\config\ManagerLogging.properties.
com.vontu.logging.ServletLogHandler.level=FINEST
com.vontu.enforce.workflow.attributes.CustomAttributeLookup.level=FINEST
com.vontu.lookup.level=FINEST
However, this property lets you modify the output of the Data
Owner Name and Data Owner Email attributes based on
retrieved values. These parameters are specified in lookup plug-in
configurations and scripts using the same syntax as custom
attributes. Both attributes are enabled by selecting the Incident
attribute group.
AttributeLookup.auto true The automatic lookup property specifies whether the lookup
should be triggered automatically when a new incident is detected.
This property automatically populates incident attributes using
the deployed lookup plug-ins after the initial lookup is executed.
AttributeLookup.reload false The automatic plug-in reload property specifies whether all
plug-ins should be automatically reloaded each day at 3:00 A.M.
Change to true to enable.
1 Create custom attributes. Define the custom attributes for the information you want to look up.
See Setting the values of custom attributes manually on page 1062.
2 Create the CSV data source file. The CSV file that contains the data to be used to populate custom
attributes for incident remediation.
3 Create a new CSV plug-in. See Creating new lookup plug-ins on page 1086.
4 Name and describe the plug-in. The name string limited to 100 characters. It is recommended that you
enter a description for the lookup plug-in.
5 Specify the file path. Provide the path to the CSV file. The CSV file must be local to the Enforce
Server.
6 Choose the File Delimiter. Specify the delimiter that is used in the CSV file. The pipe delimiter [|] is
recommended.
8 Map the attributes. Map the system and the custom attributes to the CSV file column heads
and define the keys to use to extract custom attribute data. Keys map to
column heads, not custom attributes.
attr.attribute_name=column_head
keys=column_head_first:column_head_next:column_head_3rd
See Mapping attributes and parameter keys to CSV fields on page 1100.
9 Save the plug-in. Verify that the correct save message for the plug-in is displayed.
9 Select the Lookup Parameter Define the keys which are used to extract custom attribute data.
Keys.
See Selecting lookup parameters on page 1086.
10 Enable the lookup plug-in. The CSV Lookup Plug-In must be enabled on the Enforce Server.
11 Troubleshoot the plug-in. See Testing and troubleshooting the CSV Lookup Plug-In on page 1102.
Implementing lookup plug-ins 1098
Configuring the CSV Lookup Plug-In
email|first_name|last_name|domain_user_name|user_name|department|manager|manager_email
[email protected]|John|Smith|CORP\jsmith1|jsmith1|Accounting|Mei Wong|[email protected]
If more than 10% of the rows in the CSV file violate any of these requirements,
the Plugin does not load.
For accuracy in the lookup, the CSV file needs to be kept up to date.
See About the CSV Lookup Plug-In on page 1078.
C:/SymantecDLP_csv_lookup_file/senders2.csv
On Windows you can use either forward or backward slashes. For example:
C:/SymantecDLP/Protect/plugins/employees.csv or
C:\SymantecDLP\Protect\plugins\employees.csv. On Linux you can only use
forward slashes.
The system validates the file path when you save the configuration. If the system
cannot locate the file it reports and error and does not let you save the configuration.
Make sure that the CSV file is not open and is stored locally to the Enforce Server.
attr.Store-ID=store-id
attr.Store\ Address=store_address
attr.incident-id=incident-id-key
attr.sender-email=sender-email-key
keys=sender-email-key:incident-id-key
With this example in mind, adhere to the following syntactical rules when mapping
the attributes to CSV file data.
attr.attribute\ name=column\ head Blank spaces in attribute and column names must
be preceded by a backslash.
attr.attribute_name=column_head
attr.attribute_name=column_head
attr.sender-email = Email
attr.endpoint-user-name = Username
attr.file-owner = File-owner
attr.sender-ip = IP
keys = Email:Username:File-owner:IP
4 If the plug-in fails to load, or the plug-in fails to return looked up values, check
the file \SymantecDLP\Protect\logs\tomcat\localhost.<latest-date>.log.
Check that the database and table are created and that the CSV file is
loaded into the table. To verify, look for lines similar to the following:
INFO [com.vontu.lookup.csv.CsvLookup]
creating database
create table using SQL
importing data from file into table LOOKUP having columns
Note: To process large files, the CSV Lookup Plug-In uses an in-memory
database (Apache Derby). Only one instance of Derby can be running per
Enforce Server. If a previous instance is running, the CSV Lookup Plug-In
does not load. If the database and table are not created, restart the Vontu
Manager service and reload the plug-in.
Look for a warning message indicating that "SQL query did not return any
results." In this case, make sure that the attribute mapping matches the CSV
column heads and reload the plug-in if changes were made.
See Troubleshooting lookup plug-ins on page 1093.
SENDER|MGR|DEPT|EMAIL
[email protected]|Merle Manager|Engineering|[email protected]
3 Save the CSV file to the same volume drive where the Enforce Server is
installed.
For example:
C:\SymantecDLP\Protect\plugins\lookup\csv_lookup_file.csv.
attr.sender-email=SENDER
attr.Manager=MGR
attr.Department=DEPT
attr.Email\ Address=EMAIL
keys=SENDER
attr.sender-email = SENDER This is a lookup parameter key from the Sender group. It is mapped to
the corresponding column header in the CSV file.
attr.Email\ Address = EMAIL This is a space delimited custom attribute defines in Step 1. It is mapped
to the corresponding column head in the CSV file.
keys = SENDER This line declares one key to perform the lookup. The lookup ceases
once the first key is located, and the attribute values are populated.
10 Select System > Lookup Plugins > Modify Plugin Chain and enable the
plug-in.
11 Open the Incident Snapshot for the incident generated in the Step 4.
12 Verify that the unpopulated custom attributes you created in Step 1 appear in
the Attributes pane to the right of the screen.
If they do not, complete Step 1.
13 Verify that the "Lookup" button appears in the Attributes pane above the
custom attributes.
If it does not, verify that the Lookup Attributes privilege is granted to the user.
Click Reload Plugin after making any changes.
Implementing lookup plug-ins 1106
Configuring LDAP Lookup Plug-Ins
The connection to the LDAP server can be configured from the link in the LDAP
Lookup Plug-In .
3 Create a new LDAP See Creating new lookup plug-ins on page 1086.
Lookup Plug-In .
4 Map the attributes. Map the attributes to the corresponding LDAP directory fields. The syntax is
as follows:
attr.CustomAttributeName = search_base:
(search_filter=$variable$):
ldapAttribute
5 Save and enable the The LDAP Lookup Plug-In must be enabled on the Enforce Server.
plug-in.
See Enabling lookup plug-ins on page 1091.
6 Test and troubleshoot the See Troubleshooting lookup plug-ins on page 1093.
LDAP Lookup Plug-In .
Implementing lookup plug-ins 1107
Configuring LDAP Lookup Plug-Ins
attr.CustomAttributeName = search_base:
(search_filter=$variable$):
ldapAttribute
Element Description
CustomAttributeName The name of the custom attribute as it is defined in the Enforce Server.
Note: If the name of the attribute contains white-space characters, you must
precede each instance of the white space with a backslash. A white-space
character is a space or a tab. For example, you need to enter the Business
Unit custom attribute as: attr.Business\ Unit
Element Description
search_filter The name of the LDAP attribute (field) that corresponds to the lookup parameter
(or other variable) passed to the plug-in from the Enforce Server.
variable The name of the lookup parameter that contains the value to be used as a key to
locate the correct data in the LDAP directory.
In cases where multiple plug-ins are chained together, the parameter might be a
variable that is passed to the LDAP Lookup Plug-In by a previous plug-in.
ldapAttribute The LDAP attribute whose data value is returned to the Enforce Server. This value
is used to populate the custom attribute that is specified in the first element of the
entry.
In the following attribute mapping example, a separate line is entered for each
custom attribute that is to be populated. In addition, note the use of the
TempDeptCode temporary variable. The department code is needed to obtain the
department name from the LDAP hierarchy. But only the department name needs
to be stored as a custom attribute. The TempDeptCode variable is created for this
purpose.
7 Save the plug-in. Verify that the correct save message for the plug-in is
displayed.
8 Enable the following keys at the System > Lookup Plugins > Lookup
Parameters page.
Incident
Implementing lookup plug-ins 1111
Configuring Script Lookup Plug-Ins
Message
Sender
9 Create an incident that generates one of the lookup parameters. For example,
an email incident exposes the sender-email attribute. There must be some
corresponding information in the Active Directory server.
10 Open the Incident Snapshot for the incident.
11 Click the Lookup button and verify the custom attributes created in the Step
1 are populated in the right panel.
2 Create the script. See Writing scripts for Script Lookup Plug-Ins on page 1112.
3 Define the Lookup Select the keys to use to extract custom attribute data.
Parameter Keys.
See Selecting lookup parameters on page 1086.
4 Create a new Script See Creating new lookup plug-ins on page 1086.
Plugin.
5 Enter the Script This value is the local path to the script engine executable on the Enforce Server
Command. host.
6 Specify the Arguments. This value is the path to the Python script file to use for attribute lookup and any
command line arguments. Begin the script path with the -u argument to improve
lookup performance.
7 Enable the stdin and Enable both options to help prevent script injection attacks.
stout options.
See Enabling the stdin and stdout options on page 1114.
Implementing lookup plug-ins 1112
Configuring Script Lookup Plug-Ins
8 Optionally, enable You can specify the incident types by protocol for passing attribute values to look
protocol filtering. up scripts.
9 Optionally, enable and You can encrypt and pass credentials required by the script to connect to external
encrypt credentials. systems.
9 Save the plugin. Verify that the correct save message for the plugin is displayed.
10 Enable the lookup You can chain scripts together and chain scripts with other lookup plugins.
plugin.
Output stdout To work with the plugin and populate attributes, scripts
must output a set of key-value pairs to standard out
(stdout).
host-name=mycomputer.company.corp
username=DOMAIN\bsmith
exit code 0 Scripts must exit with an exit code of 0. If scripts exit with
any other code, the Enforce Server assumes that an error
has occurred in script execution and terminates the
attribute lookup.
error handling stderr to a file Scripts cannot print out error or debug information. Redirect
stderr to a file. In Python this would be:
@ Attributes containing these characters will be ignored during processing if the stdin and
stdout options are enabled.
.
$ Attributes containing the $ and % characters are allowed if these characters are properly
escaped by a backslash.
%
Note: Network and Mobile protocols are configured at the System > Settings
> Protocols screen. Endpoint protocols are configured at the System > Agents
> Agent Configuration screen. Discover protocols are configured at the
Policies > Discover Scanning > Discover Targets. And, once an incident is
generated, the protocol value for the incident is displayed at the top of the
Incident Snapshot screen.
1 Create a text file that contains the The format of this file is key=value, where key is the name
credentials that are needed by the script of the credential.
to access the appropriate external
For example:
systems.
username=msantos password=esperanza9
2 Save this credential file to the file system The file needs to be saved to the Enforce Server temporarily.
local to the Enforce Server.
For example: C:\temp\MyCredentials.txt.
3 On the Enforce Server, open a shell or This directory on the Enforce Server contains the Credential
command prompt and change directories Generator Utility.
to
\SymantecDLP_home\Protect\bin.
CredentialGenerator.bat C:\temp\MyCredentials.txt
C:\temp\MyCredentialsEncrypted.txt
5 Select Enable Credentials. At the System > Lookup Plugins > Edit Script Lookup
Plugin page, select (check) the Enable Credentials option.
6 Enter the Credentials File Path. Enter the fully qualified path to the encrypted credentials file.
For example:
C:\temp\MyCredentialsEncrypted.txt.
7 Save the plug-in. You can now use the encrypted credentials to authenticate
to an external system.
8 Secure the clear-text credentials file. If you want to save the clear-text credentials file, move it to
a secure location. It can be useful to save the file if you plan
to update and re-encrypt it later. If you do not want to save
the file, delete it now.
9 Reload the lookup plug-in. See Managing and configuring lookup plug-ins on page 1084.
Implementing lookup plug-ins 1118
Configuring Script Lookup Plug-Ins
8 Save the plugin and ensure that the plugin loads successfully as indicated by
the system message.
9 Enable the following lookup parameters: Incident, Message, and Sender.
10 Generate an incident that passes the date-sent attribute.
11 Go to the Incident Snapshot for the new incident and click Lookup.
12 Verify that the Script-attribute custom attribute is populated with the value
of script value.
Implementing lookup plug-ins 1120
Configuring Script Lookup Plug-Ins
Example script
The following script is provided as an example for the Script Lookup Plug-In . It is
written in Python 2.6. The purpose of this script is to provide a basic working example
for writing scripts in Python that can be used for Script Lookup Plugins.
This script contains the date-sent lookup parameter key and returns the "script
value" for the custom attribute Script-attribute.
See Script Lookup Plug-In tutorial on page 1118.
__name__="__main__"
def main(args):
try:
attributeMap = parseInput(args)
except:
error()
print "something went wrong!"
return "something went wrong!"
def parseInput(args):
def error():
# "SCRIPT PROCESSING ERROR"
if(debugMode):
Implementing lookup plug-ins 1122
Configuring migrated Custom (Legacy) Lookup Plug-Ins
#-----------------------------------------------------------------
# DOS-style shells (for DOS, NT, OS/2):
#-----------------------------------------------------------------
def getstatusoutput(cmd):
""" Return (status, output) of executing cmd in a
shell."""
#-----------------------------------------------------------------
# Entry Point
#-----------------------------------------------------------------
if __name__ == "__main__":
if(len(sys.argv) == 0):
error()
else:
main(sys.argv)
1 Create custom attributes. Create the custom attributes that your Custom (Legacy)
Lookup Plugin will retrieve the values for.
2 Edit the Custom (Legacy) Plugin. Successful upgrade should import the Custom (Legacy)
Lookup Plugin to the user interface where you can enable
it.
3 Verify the Plugin Class. After upgrade, the class name should be populated from
the Plugins.properties file.
4 Verify the Required JARs. After upgrade, the JAR files previously copied to the Enforce
Server should appear in this field.
6 Enable parameter lookup keys. Select the keys to trigger attribute lookup.
7 Create a policy and generate an incident of For example, create a keyword policy and generate an
the type expected by the plug-in. SMTP network incident that passes the sender-name
attribute.
8 Verify that the custom attributes are updated. Check the Incident Snapshot for the populated attributes.
A card on the Network Monitor Server host to capture the network traffic that is
acquired from the SPAN or tap. Either a network interface card (NIC) or
high-speed packet capture adapter (Endace or Napatech) can be used. (Note
that in addition to this traffic-capturing card, a separate NIC is required for
communication between the Network Monitor Server and the Enforce Server.
WinPcap is required for this purpose.)
Packet capture software. When you use a NIC for packet capture, packet capture
software must be installed on the Network Monitor Server host. When you use
a high-speed packet capture adapter card (Endace or Napatech), the card must
use the correct driver.
See Choosing a network packet capture method on page 1128.
To implement packet capture and set up a Network Monitor, perform the following
high-level tasks:
1 Install and set up the network tap or SPAN that captures network traffic.
2 Choose a method of capturing network traffic.
See Choosing a network packet capture method on page 1128.
3 Install the necessary NIC or high-speed packet capture adapter (Endace or
Napatech) on the Network Monitor as described by the card documentation.
Also use the appropriate Symantec Data Loss Prevention Installation Guide
(Windows or Linux). This NIC or high-speed packet capture adapter (Endace
or Napatech) must operate in promiscuous mode so that all inbound and
outbound traffic is relayed through this port.
See the Symantec Data Loss Prevention System Requirements and
Compatibility Guide for information about supported NICs and high-speed
packet capture adapters.
Implementing Network Monitor 1127
About IPv6 support for Network Monitor
To see the current status of checksum offloading, use the ethtool -k eth0
command.
implementations of Network Monitor and does not include support for other Symantec
Data Loss Prevention products.
Here is an overview of specific support for IPv6 in Symantec Data Loss Prevention:
Installation of a Network Monitor Server that is capable of monitoring IPv6
networks or dual-stack networks is the same as installation of a Network Monitor
Server that monitors an IPv4 network.
The hardware and operating system requirements are the same as for IPv4
Network Monitor. See the Symantec Data Loss Prevention System Requirements
Guide for more information on third-party hardware and software compatibility.
IP address data types can hold either IPv4 or IPv6 addresses.
Network incidents can include IPv6 addresses.
Network protocol definitions can include IPv6 addresses.
Symantec Data Loss Prevention IPv6 support is limited to monitoring. The Enforce
Server administration console must still be deployed on an IPv4 network; there is
no support for command and control functionality over IPv6.
This release does not include support for:
Deployment of Symantec Data Loss Prevention over IPv6 networks
Support of other Symantec Data Loss Prevention servers on IPv6 networks
Use of IPv6 system-defined data identifiers
Use of IP fragmentation over IPv6
Configuring or communicating with detection servers over IPv6
Deployment of IPv6 endpoints
Deployment of Symantec Encryption Server on IPv6
Deployment of the Oracle database on an IPv6 connection
See Configure a protocol in online Help for more information about specific
implementation details of IPv6 support.
Linux Native
Napatech
If you use a high-speed packet capture adapter (Endace or Napatech), you will
need to install or update the adpater driver software.
See Installing WinPcap on a Windows platform on page 1130.
See Updating the Endace card driver on page 1130.
See Installing and updating the Napatech network adapter and driver software
on page 1130.
1 Install the supported Refer to the Symantec Data Loss Prevention System Requirements and Compatibility
Napatech Guide for the supported Napatech card version.
high-speed packet
capture adapter.
2 Install the Napatech For supported versions of the Napatech driver, see the Symantec Data Loss Prevention
driver. System Requirements and Compatibility Guide.
The Napatech driver has to be compiled from source as a part of installing Napatech
software package (see step 2 above).
The Napatech driver has to be loaded using the script
/opt/napatech/bin/load_driver.sh once for each computer bootstrap
before capturing packets. Note for RHEL Linux, edit the file /etc/rc.d/rc.local
to append /opt/napatech/bin/load_driver.sh and restart the system.
Verify that the Napatech library file libntcommoninterface.so is present in
directory /<nt_installation_directory>/lib/.
4 Configure the Deploy a Network Monitor detection server and configure the Advanced Server settings:
Network Monitor
Enable Napatech packet capture by setting the following flag to true:
detection server.
PacketCapture.IS_NAPATECH_ENABLED.
Update the value to the path to the Napatech driver tools directory by entering the
path in the field for the following entry: PacketCapture.NAPATECH_TOOLS_PATH.
For example, on Windows Napatech tools binaries are included as part of the
Napatech software package:
\ntcap_package_windows_<version>\tools\nt_tools_windows_<version>.zip\tools\binary\Tools\<architecture>\
For Linux, Napatech tools are compiled from source as part of Napatech
software package installation process:
/<nt_installation_directory>/bin/
4 For Napatech cards, enter the appropriate values in the following fields:
5 Stop and restart the Network Monitor Server. Symantec Data Loss Prevention
displays the Endace card in the Network Interfaces field of the Configure
Server screen for the Network Monitor Server.
6 Go to System > Servers > Overview and again click on the Network Monitor
Server.
7 On the Server Detail screen, click Configure. You can verify or modify settings
in the general section at top and on the Packet Capture tab, as described in
subsequent steps.
Implementing Network Monitor 1133
Enabling GET processing with Network Monitor
8 Leave the Source Folder Override field blank to accept the default directory
for buffering network streams before the Network Monitor Server processes
them. (This setting is the recommended setting.) To specify a custom buffer
directory, type the full path to the directory.
9 Select one or more Network Interfaces (NICs, Napatech cards, or Endace
cards) through which the Network Monitor Server should capture traffic.
10 In the Protocol section, select one or more protocols to monitor. For example,
select the check boxes for SMTP, HTTP, and FTP. For a protocol to appear
in this section, it must already be configured on the global Protocols screen in
the Enforce Server.
See the online Help associated with the Configure Server screen.
Symantec Data Loss Prevention has standard settings for each protocol in the
list. To modify a protocols settings, click the Pencil icon next to the appropriate
protocol. For details on modifying protocol settings, see the online Help.
11 Click Save.
12 Stop and restart the Network Monitor Server. Click Recycle next to the Status
entry in the Server Detail screen.
After selecting a network interface and choosing protocols, you may want to create
a test policy to test your deployment.
See Testing Network Monitor on page 1135.
See Enabling GET processing with Network Monitor on page 1133.
See Creating a policy for Network Monitor on page 1134.
Note: Network Monitoronly inspects GET requests, it does not inspect HTTP GET
responses.
Implementing Network Monitor 1134
Creating a policy for Network Monitor
Note: Network Monitoronly inspects HTTP GET requests; it does not inspect HTTP
GET responses.
See Enabling GET processing for Network Prevent for Web on page 1157.
Configuring Network Prevent for Email Server for reflecting or forwarding mode
Note: Review the Symantec Data Loss Prevention MTA Integration Guide for
Network Prevent for Email to determine your preferred integration architecture
before you continue with the implementation.
Figure 53-1 shows an integration of Network Prevent for Email Server with a
next-hop MTA that you manage in the network. As an alternative, you can integrate
Network Prevent for Email Server with a hosted email server that resides outside
the firewall.
First, you need to know the high-level steps that are required for implementing
Network Prevent for Email. You can check the cross-referenced sections for more
details.
Implementing Network Prevent for Email 1138
About Mail Transfer Agent (MTA) integration
See Specifying one or more upstream mail transfer agents (MTAs) on page 1144.
Field Description
companyname.com
Field Description
smtp1.companyname.com
smtp2.companyname.com
smtp3.companyname.com
7 Click Save.
Implementing Network Prevent for Email 1142
Configuring Network Prevent for Email Server for reflecting or forwarding mode
Field Description
Field Description
9 Click Save.
10 Click Done.
11 If your email delivery system uses TLS communication in forwarding mode,
each next-hop mail server in the proxy chain must support TLS and must
authenticate itself to the previous hop. This means that Network Prevent for
Email Server must authenticate itself to the upstream MTA, and the next-hop
MTA must authenticate itself to Network Prevent for Email Server. Proper
authentication requires that each mail server stores the public key certificate
for the next hop mail server in its local keystore file.
See Specifying one or more upstream mail transfer agents (MTAs) on page 1144.
See Creating a policy for Network Prevent for Email on page 1145.
See Testing Network Prevent for Email on page 1148.
If the computer receives mail for inspection on a restricted port (for example, port
25), use the iptables command to route that traffic to a non-restricted port, such
as the Network Prevent for Email default port 10025. Then ensure that Network
Prevent for Email listens on the non-restricted port to inspect email.
Use the following instructions to configure a Linux system to route from port 25 to
port 10025. If you use a different restricted port or Network Prevent for Email port,
enter the correct values in the iptables commands.
To configure route traffic from port 25 to port 10025
1 Configure Network Prevent for Email to use the default port 10025 if necessary.
See Configuring Network Prevent for Email Server for reflecting or forwarding
mode on page 1139.
2 In a terminal window on the Network Prevent for Email computer, enter the
following commands to reroute traffic from port 25 to port 10025:
iptables -N Vontu-INPUT
iptables -A Vontu-INPUT -s 0/0 -p tcp --dport 25 -j ACCEPT
iptables -I INPUT 1 -s 0/0 -p tcp -j Vontu-INPUT
iptables -t nat -I PREROUTING -p tcp --destination-port 25 -j REDIRECT --to-ports=10025
iptables-save > /etc/sysconfig/iptables
Note: If you only want to test local IP routing between the ports with Telnet,
use the command: iptables -t nat -I OUTPUT -o lo -p tcp
--destination-port 25 -j REDIRECT --to-ports=10025
If later you decide to delete the IP tables entry, use the command:
review and release messages. Such mailboxes are outside the Symantec Data
Loss Prevention system.
Network: Modify SMTP Message
Modifies the email messages that contain confidential data or significant metadata
(as defined in your policies). You can use this action to modify the message
subject or add specific RFC 5322 message headers to trigger further downstream
processing. For example, message encryption, message quarantine, or message
archiving.
For details on setting up any response rule action, open the online Help. Go to
Manage > Policies > Response Rules and click Add Response Rule.
For details on using the Network: Modify SMTP Message action to trigger
downstream processes (such as message encryption), see the Symantec Data
Loss Prevention MTA Integration Guide for Network Prevent.
Even if you do not incorporate response rules into your policy, Network Prevent for
Email captures incidents as long as your policies contain detection rules. This
feature can be useful if you want to review the types of incidents Symantec Data
Loss Prevention captures and to then refine your policies.
To create a test policy for Network Prevent for Email
1 In the Enforce Server administration console, create a response rule that
includes one of the actions specific to Network Prevent for Email. For example,
create a response rule that includes the Network: Block SMTP Message
action.
See Configuring response rules on page 870.
2 Create a policy that incorporates the response rule you configured in the
previous step.
For example, create a policy called Test Policy as follows:
Include a Content Matches Keyword detection rule that matches on the
keyword secret.
Include a Network: Block SMTP Message response rule.
Associate it with the Default policy group.
See Configuring policies on page 330.
See About policy violation data headers on page 1147.
Implementing Network Prevent for Email 1147
About policy violation data headers
Changes to these settings do not take effect until you restart the server.
Three RequestProcessor advanced settings enable different kinds of
multiple-policy-violation message headers:
RequestProcessor.TagPolicyCount.
When the setting is set to true, Network Prevent adds a header reporting the
total number of policies that the message violates. For example, if the message
violates 3 policies a header reading: X-DLP-Policy-Count: 3 is added.
RequestProcessor.TagHighestSeverity.
When the setting is set to true, Network Prevent adds a header reporting the
highest severity among the violated policies. For example, if a message violates
three policies, one with a severity of Medium and two with a severity of Low
a header reading: X-DLP-Max-Severity: MEDIUM is added.
RequestProcessor.TagScore.
When the setting is set to true, Network Prevent adds a header reporting the
total cumulative score of all the violated policies. Scores are calculated using
the formula: High=4, Medium=3, Low=2, and Info=1. For example, if a message
violates three policies, one with a severity of medium and two with a severity
of low a header reading: X-DLP-Score: 7 is added.
Setting a value to true causes the corresponding header to be automatically added
to every outgoing message that is processed. This occurs even if the message
violates only a single policy.
See About policy violation data headers on page 1147.
First, you need to know the high-level steps that are required for implementing
Network Prevent for Web. You can check the cross-referenced sections for more
details.
To implement Network Prevent for Web
1 Make sure the Network Prevent for Web Server is configured to communicate
with your HTTP proxy server. Optionally, configure the detection server to filter
traffic as wanted.
See Configuring Network Prevent for Web Server on page 1151.
2 Configure your HTTP proxy server to work with the Network Prevent for Web
Server.
See About proxy server configuration on page 1154.
3 Create and deploy a policy for Network Prevent for Web.
See Creating policies for Network Prevent for Web on page 1157.
Implementing Network Prevent for Web 1151
Configuring Network Prevent for Web Server
Ignore Requests Smaller Than Specifies the minimum body size of HTTP
requests to inspect. (The default is 4096
bytes.) For example, search-strings typed
in to search engines such as Yahoo or
Google are usually short. By adjusting this
value, you can exclude those searches
from inspection.
Ignore Requests without Attachments Causes the server to inspect only the
requests that contain attachments. This
option can be useful if you are mainly
concerned with requests intended to post
sensitive files.
Ignore Requests from User Agents Causes the server to ignore requests from
user agents (HTTP clients) you specify.
This option can be useful if your
organization uses a program or language
(such as Java) that makes frequent HTTP
requests. You can type one or more user
agent values, each on its own line.
Implementing Network Prevent for Web 1153
Configuring Network Prevent for Web Server
5 Verify or modify the filter options for responses from Web servers. The options
in the Response Filtering section are as follows:
Ignore Responses Smaller Than Specifies the minimum size of the body of
HTTP responses that are inspected by this
server. (Default is 4096 bytes.)
6 Verify or modify settings for the ICAP connection between the HTTP proxy
server and the Web Prevent Server. The Connection options are as follows:
7 Click Save to exit the Configure Server screen and then click Done to exit
the Server Detail screen.
Note that most proxy servers provide methods of filtering what is forwarded to the
Network Prevent for Web Server in both REQMOD mode and RESPMOD modes.
Consult the proxy server's documentation for details.
See Specifying one or more proxy servers on page 1156.
See Configuring request and response mode services on page 1155.
icap://ip_address|FQDN[:port]/reqmod
icap://ip_address|FQND[:port]/respmod
Where:
ip_address|FQDN identifies the Network Prevent for Web Server using either
an IP address or fully qualified domain name.
Port is the port number to which Network Prevent for Web Server listens.
Specifying the port number is optional when the default ICAP port (1344) is
used.
/reqmod is required for correct functionality in REQMOD mode.
Examples:
icap://10.66.194.45/reqmod
icap://10.66.194.45:1344/reqmod
icap://netmonitor1.company.com/reqmod
icap://10.66.194.45/respmod
Implementing Network Prevent for Web 1156
Specifying one or more proxy servers
icap://10.66.194.45:1344/respmod
icap://netmonitor1.company.com/respmod
Note that the port that is specified in the ICAP service definition on the proxy must
match the port on which Network Prevent for Web Server listens.
See About proxy server configuration on page 1154.
Incidents appear in Network reports, but This is expected behavior when the Network
Symantec Data Loss Prevention does not Prevent for Web Server is running in trial
perform the action specified in the relevant mode (the default setting). If you do not want
response rule. to run in trial mode, change the setting.
Network
Discover Network
Monitor
Network
Protect Enforce
Platform
Endpoint
Network
Endpoint Prevent
Discover
3 Create a policy. Go to Manage > Policies > Policy List on the Enforce
Server.
6 Set options for the See Network Discover/Cloud Storage Discover scan
target. target configuration options on page 1173.
4 The configuration for parallel scanning is on the Discover tab. Enter the number
of parallel scans to run on this Network Discover/Cloud Storage Discover
Server. The default is 1.
The maximum count can be increased at any time. After it is increased, then
any queued scans that are eligible to run on this Network Discover/Cloud
Storage Discover Server are started.
The count can be decreased only if the Network Discover/Cloud Storage
Discover Server has no running scans. Before you reduce the count, pause or
stop all scans on the Network Discover/Cloud Storage Discover Server.
Parallel scans of server and scanner target types are supported.
See Configuring parallel scanning of Network Discover/Cloud Storage Discover
targets on page 1208.
5 When you finish modifying a server configuration, click Save to exit the
Configure Server screen and then click Done to exit the Server Detail screen.
6 To view the active scans on this Network Discover/Cloud Storage Discover
Server, go to Policies > Discover Scanning > Discover Servers.
See Managing Network Discover/Cloud Storage Discover target scans
on page 1191.
3 On the General tab, enter the name of this Network Discover/Cloud Storage
Discover target. This name displays for management of scans.
See Managing Network Discover/Cloud Storage Discover target scans
on page 1191.
4 Enter the remaining required parameters. Enter the policy group. Enter the
Network Discover/Cloud Storage Discover Server.
See Configuring the required fields for Network Discover targets on page 1174.
5 Continue the addition of a new target, with the entries specific to that target
type.
Network file servers and shares (CIFS, See Setting up server scans of file
NFS, DFS) systems on page 1229.
Local file systems on Windows desktops See Setting up remote scanning of file
and laptops systems on page 1296.
Web servers (Web sites and Web-based See Setting up remote scanning of Web
applications) servers on page 1308.
Provide authentication for Box cloud Authorization See Providing Box cloud
storage. storage authorization
credentials on page 1179.
Filter targets by date last accessed or Filters See Filtering Discover targets
modified. by date last accessed or
modified on page 1184.
Optimize your resources with scan Advanced See Optimizing resources with
throttling. Network Discover/Cloud Storage
Discover scan throttling
on page 1187.
Apply a visual tag to Box cloud storage Protect See Configuring Network
content with Network Protect. Protect for Box cloud storage
targets on page 1227.
6 Click Save.
To pause a scan during specified times
1 In the Enforce Server administration console, go to Manage > Discover
Scanning > Discover Targets.
2 Click the name of the scan that you want to pause during specified times.
3 Click the General tab.
4 Select the item Pause Scan between these times.
5 Select the pause options.
This option automatically pauses scans during the specified time interval. You
can override a targets pause window by going to the Discover Targets screen
and clicking the start icon for the target entry. The pause window remains intact,
and any future scans that run up against the scan window pause as specified.
You can also restart a paused scan by clicking the continue icon in the target
entry.
Note: If the target configuration is modified while it is paused, then the modified
configuration does not apply to items that were already scanned. When a scan
is paused and restarted, the scan is restarted from a checkpoint that is created
when the scan is paused. The modified configuration is used for the items that
are scanned from that checkpoint.
6 Click Save.
Network Discover scan target configuration options 1178
Providing the password authentication for Network Discover/Cloud Storage Discover scanned content
5 The format of the credentials depends on the type of scan. For the specific
format and examples of credentials for each target type, see the topic for that
target type.
See About Network Discover/Cloud Storage Discover on page 1162.
6 You can set other options on the Scanned Content tab.
See Network Discover/Cloud Storage Discover scan target configuration
options on page 1173.
Remediation credentials can be set on the Protect tab.
See Configuring Network Protect for file shares on page 1247.
Note that all filters are combined with and if a value is provided. Consider all filter
values (for example size and date) when adding or modifying scan filters. Avoid
unintentionally including everything, or excluding everything from the scan.
See Network Discover/Cloud Storage Discover scan target configuration options
on page 1173.
To set up include filters or exclude filters:
1 In the Enforce Server administration console, go to Manage > Discover
Scanning > Discover Targets.
2 Click the name of the scan where you want to add include filters or exclude
filters.
3 Click the Filters tab.
4 Enter file names or paths into the include filters and the exclude filters to select
a subset of items that Symantec Data Loss Prevention should process. Delimit
entries with a comma, but no spaces. The path filter is case-sensitive.
When both include filters and exclude filters are present, exclude filters take
precedence.
The include filter and exclude filter file names are relative to the file system
root. Specify full paths or subdirectories, as needed. Some wildcards are
allowed.
Table 57-1 shows the syntax for the filters.
If the exclude filter entry exceeds the 1024-character limit, you can create an
exclude file with the file names to be excluded.
5 Click Save.
Network Discover scan target configuration options 1182
Setting up Network Discover/Cloud Storage Discover filters to include or exclude items from the scan
Table 57-1 Syntax for the include filters and exclude filters
Wildcard Description
The forward slash (/) and backslash (\) These characters are equivalent. They usually
characters represent directory separators, although on
Linux the backslash is a valid character in a
file name.
White space at the beginning and end of the White space is ignored at the beginning and
pattern end of the pattern. Do not use spaces before
or after the commas that delimit entries.
Network Discover scan target configuration options 1183
Filtering Discover targets by item size
Table 57-1 Syntax for the include filters and exclude filters (continued)
Wildcard Description
Syntax and examples for SQL Database scanning are in the SQL Database section.
See Configuring and running SQL database scans on page 1257.
Syntax and examples for SharePoint scanning are in the SharePoint section.
See Configuring and running SharePoint server scans on page 1268.
Note that if the After date is later than the Before date, then no items are
scanned. If the Before date and the After date are the same, then no items
are scanned. No items are scanned because the assumed time of the Before
parameter is at zero hours, and After is at 24 hours.
When you select this option, you can also select from the following options:
After
To include the items that are created or modified (whichever is newer) after
a particular date, type the date. You can also click the date widget and
select a date.
Before
To include the items that are created or modified (whichever is older) before
a particular date, type the date. You can also click the date widget and
select a date.
6 Select Only scan files last accessed to include files based on the last
accessed date.
Symantec Data Loss Prevention only scans items after the specified After
date, before the specified Before date, or between the dates you specify.
The last-accessed feature is only supported for Windows Network
Discover/Cloud Storage Discover Server scanning of CIFS shares.
Note that if the After date is later than the Before date, then no items are
scanned. If the Before date and After date are the same, then no items are
scanned. No items are scanned because the assumed time of the Before
parameter is at zero hours, and After is at 24 hours.
When you select this option, you can also select from the following options:
After
To include the items that are accessed after a particular date, enter the
date. You can also click the date widget and select a date.
Before
To include the items that are accessed before a particular date, enter the
date. You can also click the date widget and select a date.
Note: The default mount process uses the CIFS client. If the default mount
does not work, the mount task can use theJCIFS client by setting
filesystemcrawler.use.jcifs=true in the properties file
Crawler.properties.
Note: Use of item throttling significantly reduces the scan rate. Expect the scan rate
to reduce to half the original scan rate or less.
Running a scan in Inventory Mode can also improve the performance of scanning
large numbers of computers or large amounts of data. Setting incident thresholds
can improve the performance of scanning by skipping to the next content root to
scan, rather than scanning everything. A content root is one line (a file share, Domino
server, or SQL database) specified on the Scanned Content tab.
You can set a maximum number of incidents for a scan item. The scan item can
be a file share or a physical computer.
After the incident threshold has been reached, the scanning of this content root is
stopped, and scanning proceeds to the next content root. Because the process is
asynchronous, a few more incidents may be created than specified in the incident
threshold.
Inventory Mode scanning is supported for the following cloud and server-based
scan targets:
Box cloud storage
For Box cloud storage, you can specify the incident threshold per user.
File shares
For file shares, you can also specify whether to count incidents by content root,
or by computer. The content root is one file share on the list that is specified on
the Scanned Content tab. The selection is specified in the field Count
Incidents By.
3 On the Advanced tab, you can optimize scanning with Inventory Mode
scanning.
4 Set the Incident Threshold.
Enter the number of incidents to produce before moving on to the next content
root (specified on the Scanned Content tab).
5 Set the Count Incidents By option.
For file shares you can also choose the following methods to count the incidents:
Content root (the default)
The content root is one file share from the list on the Scanned Content
tab.
After the incident threshold is reached, the scan moves to the next file share.
Machine
Select this option to count by computer (from the specified shares on a
computer).
When the incident threshold is reached, the scan moves to the next content
root on the list to scan. If that content root is on the same physical computer
as the previous item, it is skipped.
Note that the computer name must be literally the same for the content root
to be skipped. For example, \\localhost\myfiles and
\\127.0.0.1\myfiles are treated as different computers, even though
they are logically the same.
Chapter 58
Managing Network Discover
target scans
This chapter includes the following topics:
You can select the number of entries to display in the Discover Target list using
the drop-down menu above the Actions column.
See Managing Network Discover/Cloud Storage Discover target scans on page 1191.
Table 58-1 lists the columns for each target scan.
Target Description
Information
Target Type Type of target for the scan (such as File System or SharePoint).
Policy Groups Lists the policy groups to which the target is assigned.
Last Modified Specifies the date and time that the target was last modified.
Scan Status Displays the status of the scan. Click the link in this column to view a
filtered scan history page for this target.
Next Scan Displays the next scheduled scan for the target, if applicable.
Actions Click the Edit Target icon to edit the target definition.
4 To clear a filter, clear the value from the relevant text field or drop-down list,
or click Filter.
Table 58-2 lists the fields that are displayed for each scan.
Scan Description
History
Target Type Type of target for the scan (such as File System or SharePoint).
Scan Status Current status of the scan: Running, Paused, Completed, Stopped.
Bytes/Items Number of bytes scanned in the target, as well as the number of items
Scanned scanned.
Actions Click the View Incidents icon to view an incident summary report for the scan.
Click the Delete icon to delete the scan. Make sure to first delete differential
scans before you delete the base scan.
4 To clear a filter, clear the value from the relevant text field or drop-down list,
or click Filter.
General Description
Scan
Detail
Target The type and icon of the target that was scanned.
Type
Table 58-4 shows the Scan Statistics section, which provides detailed information
about the scan.
Scan Description
Statistics
Processed Number of items that have been scanned. If the scan is still running, this
field provides a benchmark of scan progress.
Managing Network Discover target scans 1199
Managing Network Discover/Cloud Storage Discover scan histories
Scan Description
Statistics
Run Time Amount of time that the scan took to complete. If the scan is still running,
(dd:hh:mm:ss) the amount of time that it has been running. The total does not include any
time during which the scan was paused.
Errors Number of errors that occurred during the scan. A list of the errors is
available in the Recent Scan Errors section.
Total Total number of incidents that were detected during the current scan.
Detected
Incident
Count
Current Number of incidents that were detected during the current scan, less any
Incident deleted incidents. You can click this number to see an incident list for this
Count scan.
The Recent Scan Errors section is a listing of the errors that occurred during the
scan.
If a scan has many errors, the Scan Detail screen does not display them all. To
see a complete list of errors that occurred during the scan, click Download Full
Error Report.
Table 58-5 shows the information in the Recent Scan Errors report, which provides
information about each error.
Recent Description
Scan Error
Details
Date The date and time of the error during the scan.
Path The directory path to the location of the file with the error during the scan.
Recent Scan Activity displays the most recent log entries of the notable events that
occurred during the scan.
If a scan has many activity messages, the Scan Detail screen does not display
them all. To see a complete list of scan activity messages, click Download Full
Activity Report.
Table 58-6 shows the Recent Scan Activity report, which provides information about
each activity.
Date/Time The date and time when the logged event occurred.
Download Full Download a report with all scan statistics in CSV format.
Statistics
Report
Download Full Download a report with all scan errors in CSV format.
Error Report
Download Full Download a report with all scan activity in CSV format.
Activity
Report
Server Name The name of the server. In parentheses is the type of detection server,
either Discover or Endpoint.
Running Scans A list of the scans that are currently running on this server.
Queued Scans A list of the scans that are queued to run on this server.
Scheduled Scans A list of scans that are scheduled to run in the future on this server.
You can break up scans with include, exclude, size, and date filters.
See Setting up Endpoint Discover filters to include or exclude items from the
scan on page 1380.
See Filtering Discover targets by item size on page 1183.
See Filtering Discover targets by date last accessed or modified on page 1184.
Scan non-binary files first. Binary files are less likely to contain policy violations.
For example, you can set the Exclude Filter to the following list to scan non-binary
files:
*.exe,*.lib,*.bin,*.dll,*.cab,*.dat
*.au,*.avi,*.mid,*.mov,*.mp,*.mp3,*.mp4,*.mpeg,*.wav,*.wma
To scan the rest of the files, use this filter as the Include Filter of a different scan
target.
See Setting up Endpoint Discover filters to include or exclude items from the
scan on page 1380.
For File System targets, you can configure incremental scans to check only
those files that have not yet been scanned.
See Scanning new or modified items with incremental scans on page 1206.
See About the difference between incremental scans and differential scans
on page 1205.
Scan new or recently modified items in one scan target, and older ones in a
second scan target.
Use the date filter to break up scans by date values, by files older than, or files
newer than.
See Filtering Discover targets by date last accessed or modified on page 1184.
After the initial scan, run differential scans to check only those items that were
added or modified since the last complete scan.
See Scanning new or modified items with differential scans on page 1208.
See About the difference between incremental scans and differential scans
on page 1205.
Scan small files in one scan target and large files in another. Scanning many
small files carries more overhead than fewer large files.
Use the size filter to break up scans by size.
See Filtering Discover targets by item size on page 1183.
Scan compressed files in a separate scan target.
Use the Include Filter to scan compressed files. For example, use the following
list:
*.zip,*.gzip
Managing Network Discover target scans 1204
About Network Discover/Cloud Storage Discover scan optimization
To scan the rest of the files, use this filter as the Exclude Filter of a different
scan target.
See Setting up Endpoint Discover filters to include or exclude items from the
scan on page 1380.
Scan database or spreadsheet files in a separate scan target.
Use the SQL Database target to scan database files.
See Configuring and running SQL database scans on page 1257.
Use the Include filter to scan spreadsheet files:
*.xls
Set up a separate scan target and use the Exclude Filter to scan everything
else.
See Setting up Endpoint Discover filters to include or exclude items from the
scan on page 1380.
Exclude the folders internal to applications. For example, in the scan of a DFS
share, exclude the internal DfsrPrivate folder. In the scan of a share on a
NetApp filer, exclude the .snapshot folder.
See Excluding internal DFS folders on page 1241.
See Configuring scans of file systems on page 1243.
Use Inventory Mode scanning to move to the next scan item after an incident
threshold is reached. Inventory Mode scanning can audit where confidential
data is stored without scanning all of it.
See Creating an inventory of the locations of unprotected sensitive data
on page 1188.
Dedicate as much hardware as possible to the scans. For example, suspend
or quit any other programs that run on the server.
Use Scan Pausing to automatically suspend scanning during work hours.
Run scans in parallel.
See Configuring parallel scanning of Network Discover/Cloud Storage Discover
targets on page 1208.
Use throttling to reduce network load.
See Optimizing resources with Network Discover/Cloud Storage Discover scan
throttling on page 1187.
Update the server hardware.
You can use up to 12 GB of memory, quad CPUs, ultra-fast hard drives, and
network cards to address any bottlenecks in the hardware.
Managing Network Discover target scans 1205
About the difference between incremental scans and differential scans
Incremental scans are Differential scans are supported for the following targets:
supported for the following
Server > Lotus Notes
targets:
Server > Exchange
Server > File System Endpoint > File System
Server > SharePoint
Partial scans retain the Differential scans begin with a full scan of the Discover target.
information about the items This full scan is called the base scan.
that have been scanned.
Partial scans cannot be used as a base scan.
If files, shares, or other items
are missed because they are
inaccessible, the next
incremental scan
automatically covers the
missed items.
Subsequent runs scan all Subsequent runs scan all items that have been added or
items that have not modified since the date of the most recent full (base) scan
previously been scanned, completed.
including new or modified
The system considers the start date of the base scan for
items.
differential scanning.
An incremental scan index The most recent complete base scan serves as the
keeps track of which items comparison for which items to scan, based on the date of the
have already been scanned. base scan.
Managing Network Discover target scans 1206
About incremental scans
4 Under Scan Type, select Scan only new or modified items (incremental
scan). This option is the default for new targets.
If you have changed the policy or other definitions in an existing scan, you may
want to set up the next scan as a full scan to ensure complete policy coverage.
Select the following option:
Scan all items for the next scan. Subsequent scans will be incremental.
If you always want to scan all items in this target, select the following option:
Always scan all items (full scan)
5 Complete the other steps to set up or modify a Discover target and run the
scan.
See Configuring the required fields for Network Discover targets on page 1174.
See Network Discover/Cloud Storage Discover scan target configuration
options on page 1173.
See Setting up server scans of file systems on page 1229.
6 To manage incremental scanning and diagnose issues, refer to the following
topic:
See About managing incremental scans on page 1207.
After a scan starts, it continues to run on the same server until the scan completes,
is aborted, or paused. On resumption the scan may be assigned to run on a different
server.
Automated load balancing is not supported. If a Network Discover/Cloud Storage
Discover Server completes running all its scans, scans from other servers do not
migrate to the unloaded server. However, a scan can be migrated manually, by
pausing and restarting the scan.
To run multiple scanner targets on the same Network Discover/Cloud Storage
Discover Server, separate ports must be configured for each scanner. The default
port for a new scanner is a value not already used by any scan targets.
See Troubleshooting scanners on page 1287.
To configure parallel scanning
1 In the Enforce Server administration console, go to System > Servers >
Overview.
2 Select a Network Discover/Cloud Storage Discover Server to configure, and
click the server name.
3 Click the Configure option at the top.
4 Then select the Discover tab.
5 Set the maximum number of parallel scans to run on this Network
Discover/Cloud Storage Discover Server.
The default value for Maximum Parallel Scans is 1. The maximum count can
be increased at any time. After it is increased, then any queued scans that are
eligible to run on the Network Discover/Cloud Storage Discover Server are
started. The count can be decreased only if the Network Discover/Cloud Storage
Discover Server has no running scans. Before you reduce the count, pause or
stop all scans on the Network Discover/Cloud Storage Discover Server.
6 Click Save.
7 Click Done.
8 You can view the scans that are actively running, queued, scheduled, or paused
on each Network Discover/Cloud Storage Discover Server. In the Enforce
Server administration console, go to Manage > Discover Scanning > Discover
Servers.
See Managing Network Discover/Cloud Storage Discover target scans
on page 1191.
Chapter 59
Using Server FlexResponse
plug-ins to remediate
incidents
This chapter includes the following topics:
the Java programming language. The Server FlexResponse API enables developers
to build a plug-in that can be used to implement incident responses for use in
Automated and Smart Response rules.
The following are example Network Protect actions that you can implement by
developing a Server FlexResponse plug-in:
Change Access Control Lists (ACL) on files. For example, you can remove guest
access to selected files.
Apply Digital Rights Management (DRM). For example, you can apply digital
rights to documents so external parties are restricted in their access to sensitive
material. These digital rights can include do not forward or do not print.
Encrypt files.
Migrate files to SharePoint. The custom protect action can move files from shares
to a SharePoint repository, and then apply DRM and ACLs.
Perform workflow and automation of remediation responses.
Use the Symantec Workflow business process automation workflow.
The following steps are involved in building, deploying, and using a Server
FlexResponse plug-in:
Developing a plug-in using the Java API. This stage involves designing and
coding the plug-in and remediation action.
Note: Server FlexResponse plug-ins that were created for Symantec Data Loss
Prevention versions 11 and 12 are compatible with Symantec Data Loss Prevention
14.
The sections that follow describe how to deploy and configure pre-made
FlexResponse plug-ins, as well as how to use custom plug-in actions in Symantec
Data Loss Prevention policies. You can obtain some Server FlexResponse plug-ins
directly from Symantec. You can also develop your own custom plug-ins using the
Server FlexResponse API. For information about developing plug-ins using the
Java API, See the Symantec Data Loss Prevention Server FlexResponse Platform
Developers Guide.
Table 59-1
Step Action Description
1 Deploy a Server FlexResponse plug-in to the Each Server FlexResponse plug-in must be deployed to
Enforce Server computer. the Enforce Server computer before you can use the plug-in
actions in Symantec Data Loss Prevention policies.
2 Create a response rule that uses a custom See Configuring the Server FlexResponse action
Server FlexResponse incident response on page 891.
action.
Using Server FlexResponse plug-ins to remediate incidents 1213
Deploying a Server FlexResponse plug-in
3 (Optional) Use the Server FlexResponse If you are using a Server FlexResponse plug-in action in a
plug-in to manually remediate incidents. smart response rule, you must manually locate an incident
and execute the FlexResponse action.
4 Verify the results. See Verifying the results of an incident response action
on page 1220.
SymantecDLP\Protect\plugins\
SymantecDLP\Protect\plugins\
5 Make sure that the Symantec Data Loss Prevention protect user has read and
execute access to both the plug-in JAR file and the plug-in properties file.
6 To load the plug-in, stop the Vontu Incident Persister and Vontu Manager
services, and then restart them.
SymantecDLP\Protect\config
2 Locate the following line in the file, which specifies the JAR files of the plug-ins
to construct at load time:
com.symantec.dlpx.flexresponse.Plugin.plugins =
plugin1.jar,plugin2.jar
Remove the comment mark from the beginning of the line, if necessary, and
replace plugin1.jar,plugin2.jar with the names of the plug-in JAR files
you want to deploy. Separate multiple JAR files with commas.
3 Edit any additional parameters in this file.
Table 59-2 describes the additional properties for the Server FlexResponse
API in the Plugins.properties file.
4 Stop the Vontu Incident Persister and Vontu Manager services, and then restart
them. This loads the new plug-in and the other parameters in this file.
If you later change the Plugins.properties file, you must restart both the
Vontu Incident Persister and Vontu Manager services to apply the change.
In Table 59-2 plugin-id is a unique identifier of the plugin within this properties file,
for example test1.
Using Server FlexResponse plug-ins to remediate incidents 1215
Deploying a Server FlexResponse plug-in
protect.plugins.directory The directory under which all Symantec Data Loss Prevention
plug-ins are installed.
The container in which your JAR file is deployed includes all of the
public JRE classes provided by the JVM installed with Symantec
Data Loss Prevention. The container also includes all of the
FlexResponse API classes described in this document (classes in
the com.symantec.dlpx package hierarchy). Your FlexResponse
plug-in code may have dependencies on other JAR files that are
not provided by the plug-in container. Place any external JAR files
that you require in the \plugins directory of the Enforce Server
where the FlexResponse plug-in is deployed. Then reference the
JAR in this property.
com.vontu.enforce.incidentresponseaction. The maximum number of incidents that can be selected from the
incident list report for one Server FlexResponse Smart Response
IncidentResponseActionInvocationService.
rule invocation.
maximum-incident-batch-size
The default is 100.
com.vontu.enforce.incidentresponseaction. The execution thread timeout for the serial thread executor (global).
An individual plug-in properties file is not necessary if the plug-in satisfies the
following conditions:
Does not need custom properties.
Provides the display name and the plug-in identifier in the implementation of
the plug-in metadata class.
Does not need a stored credential.
2 In this file, enter the keys and values of all the parameters for the plug-in:
display-name=plugin 1
plugin-identifier=IncidentResponseAction1
To update the properties, you must stop the Vontu Manager and Vontu Incident
Persister services, and then restart them to load in the new values.
See Table 59-3 on page 1217.
3 Make sure that the Symantec Data Loss Prevention protect user has read and
execute access to the plug-in properties file.
Table 59-3 describes the properties in the plug-in-name.properties file.
Using Server FlexResponse plug-ins to remediate incidents 1217
Deploying a Server FlexResponse plug-in
If you change the value of this name in the properties file after the plug-in is loaded,
you must restart the Vontu Incident Persister and Vontu Manager services to load in
the new name.
This value is mandatory and it must be specified in at least one place, either in the
configuration properties file, or the plug-in metadata class.
For international environments, this display name can be in the local language.
plugin-identifier The identifier for this plug-in. This identifier should be unique for all Server
FlexResponse plug-ins on this Enforce Server.
This value is mandatory and it must be specified in at least one place, either in the
configuration properties file, or the plug-in metadata class.
If any response rule is assigned to this Server FlexResponse plug-in, do not change
this identifier in your properties file.
inventory-credential.credential=
InventoryDB1
custom name These optional custom parameters are required to pass information to your plug-in.
These parameters are passed to each invocation of the plug-in and can optionally
Example:
be made available at the time this plug-in is constructed.
test1.value.1
test1.value.2
Using Server FlexResponse plug-ins to remediate incidents 1218
Locating incidents for manual remediation
timeout Optional parameter with the timeout in milliseconds for the execution threads for this
plug-in.
If the timeout value is reached, the user interface shows the Server FlexResponse
plug-in status as failed, and the incident history is updated with a timeout message.
If you change the value of this property in the properties file after the plug-in is loaded,
you must stop the Vontu Incident Persister and Vontu Manager services, and then
restart them.
maximum-thread-count Optional parameter with the number of parallel threads available for execution of this
plug-in. This parameter is ignored if is-serialized is set.
The default is 2.
If you change the value of this property in the properties file after the plug-in is loaded,
you must stop the Vontu Incident Persister and Vontu Manager services, and then
restart them.
is-serialized The value of this parameter can be true or false. Set this optional parameter to true
if this plug-in execution must be serialized (one thread at a time). All serialized plug-ins
share a single execution thread. If this parameter is set, then timeout and
maximum-thread-count are ignored.
If you change the value of this property in the properties file after the plug-in is loaded,
you must stop the Vontu Incident Persister and Vontu Manager services, and then
restart them.
From the list of incidents, check the box to the left of each incident to select
that incident for remediation. You can select multiple incidents.
From the list of incidents, select all incidents on this page by clicking the
check box on the left of the report header.
From the list of incidents, select all incidents in the report by clicking the
Select All option on the upper-right side of the report.
Click one incident to display the Incident Detail, and select that one incident
for possible remediation.
After you have selected the incidents for remediation, you can manually
remediate them.
See Using the action of a Server FlexResponse plug-in to remediate an incident
manually on page 1219.
Issue Suggestions
During creation of a Smart Response This issue happens because your plug-in did not
Rule, the drop-down menu does not load.
display the action All: Server
At the end of the file Plugins.properties, enter
FlexResponse.
the name of your plug-in JAR file on the list of
During creation of an automated plug-ins. Make sure that this line is not commented
Response Rule, the drop-down menu out.
does not display the action All: Server
Restart both the Vontu Incident Persister and Vontu
FlexResponse.
Manager services to load your plug-in.
If you have multiple plug-ins, your
Your plug-in properties file and plug-in code may
plug-in name does not display in the All:
not match appropriately. Look at the Tomcat log
Server FlexResponse drop-down
for errors.
menu.
The log file is localhost.date.log. This log
file is in SymantecDLP\Protect\logs\tomcat.
Issue Suggestions
Your plug-in does not execute Check the incident snapshot history for messages
successfully. from your plug-in and the plug-in framework.
2 Set any additional scan See Network Discover/Cloud Storage Discover scan
target configuration target configuration options on page 1173.
options.
3 To apply a visual tag to See Configuring Network Protect for Box cloud
confidential files, storage targets on page 1227.
configure Network
Protect.
4 Start the Box cloud Select the scan target from the target list, then click
storage scan. the start icon.
Go to Manage >
Discover Scanning >
Discover Targets.
5 Verify that the scan is See About the Network Discover/Cloud Storage
running successfully. Discover scan target list on page 1192.
5 Select the Discover Server (or multiple Discover Servers) where you want to
run the scan.
If you select more than one server, Symantec Data Loss Prevention
automatically selects one of the servers when the scan starts.
Only the detection servers that were configured as Discover Servers appear
on the list. If there is only one Discover Server on your network, the name of
that server is automatically specified. You should configure your Discover
Servers before you configure targets. You must specify at least one server
before you can run a scan for this target.
6 Under Scan Type, select Scan only new or modified items (incremental
scan). This option is the default for new targets.
If you have changed the policy or other definitions in an existing scan, you
can set up the next scan as a full scan. Select the following option:
Scan all items for the next scan. Subsequent scans will be incremental.
If you always want to scan all items in this target, select the following option:
Always scan all items (full scan)
Users/Groups: Select Scan all to scan all users and groups for this target.
Select Scan selected to scan only the specified users and groups. Upload
a CSV or text file (comma- or new-line separated) list for the users and
groups you want to scan.
Folder Collaboration: Select an option for scanning collaborative folders
from the drop-down list in this section:
Scan All: Select this option to scan all folders for this target.
Scan only private folders: Select this option to scan only private,
non-collaborative folders.
Scan only collaborative folders (external or internal): Select this
option to scan all collaborative folders for this target.
Scan only external collaborative folders: Select this option to scan
only external collaborative folders for this target.
Shared Links: Select Scan only shared links to scan if you only want to
scan files or folders with shared links. You can select from these additional
options:
Not password protected: Select this option to scan only files and
folders with shared links that are not password protected.
With no expiration date: Select this option to scan only files and folders
with shared links that have no expiration date.
With download permissions: Select this option to scan only files and
folders with shared links that have download permissions.
File Type: Enter the extension for file types you want to include or exclude
from your scan, such as *.dwg or *.csv.
File Size Filters: Enter the lower and upper file size limits you want to
ignore in your scan, in bytes, kilobytes, or megabytes.
File Date Filters: Enter a date range for the added or modified files and
folders you want to scan.
5 Click Save.
6 Add a new policy, or edit an existing policy.
See Configuring policies on page 330.
7 Click the Response tab.
8 In the pull-down menu, select one of the response rules that you previously
created.
9 Click Add Response Rule.
This response rule then specifies the automated response when this policy
triggers an incident during the scanning of a file.
Several response rules with different conditions can exist for a policy.
10 Create a new Box cloud storage Network Discover/Cloud Storage Discover
target, or edit an existing target.
See Configuring scans of Box cloud storage targets on page 1224.
11 With Network Protect enabled in the license, a Protect tab appears on the Box
target page that contains the Network Protect remediation options.
12 Under Allowed Protect Remediation, check Enable all tag response rules
when scanning.
Chapter 61
Setting up scans of file
shares
This chapter includes the following topics:
1 Verify that your network file system is on the list of supported targets. See Supported file system targets
on page 1230.
2 Optional: Run a Content Root Enumeration scan to automatically See Automatically discovering
discover file system content roots within your domain. servers and shares before
configuring a file system target
on page 1231.
3 Go to Manage > Discover Scanning > Discover Targets to create a See Configuring scans of file
new target for a file system and to configure scanning of file systems. systems on page 1243.
4 Set any additional scan target configuration options. See Network Discover/Cloud
Storage Discover scan target
For scanning of Microsoft Outlook Personal Folders, verify that the option
configuration options on page 1173.
is set.
See Configuring scans of Microsoft
Outlook Personal Folders (.pst
files) on page 1242.
5 To automatically move or quarantine files, configure Network Protect. See Configuring Network Protect
for file shares on page 1247.
6 Start the file system scan. Select the scan target from the
target list, then click the Start icon.
Go to Manage > Discover Scanning > Discover Targets.
7 Verify that the scan is running successfully. See About the Network
Discover/Cloud Storage Discover
scan target list on page 1192.
In addition, the File System target supports scanning of the following file types:
Microsoft Outlook Personal Folders (.pst files) created with Outlook 2007, 2010,
and 2013.
The Network Discover/Cloud Storage Discover Server scanning this target must
be running a Windows operating system, and Outlook 2007 or later must be
installed on that system.
See Configuring scans of Microsoft Outlook Personal Folders (.pst files)
on page 1242.
File systems on UNIX systems, even if they are not exposed as CIFS or NFS
shares.
Use the SFTP protocol to provide a method similar to the scans of file shares.
You can also scan the local file system on a Linux Network Discover/Cloud
Storage Discover Server by listing the path name in the content root. For
example, you can enter /home/myfiles.
7 In the Filters section, select at least one filter for your scan:
IP Range: Specify an IP range to scan for content roots.
Server Names: Specify one or more server name filters. Use the drop-down
menu to refine your filter.
8 Click Save.
To start or stop a Content Root Enumeration scan
1 In the Enforce Server administration console, go to Manage > Discover
Scanning > Content Root Enumeration.
2 Select the scan or scans you want to start or stop.
3 Do one of the following:
To start a scan, click Start.
To stop a running scan, click Stop.
Setting up scans of file shares 1233
Automatically discovering servers and shares before configuring a file system target
Table 61-2
Configuration property Default value Description
Table 61-4
Property Default value Description
If you have changed the policy or other definitions in an existing scan, you
can set up the next scan as a full scan. Select the following option:
Scan all items for the next scan. Subsequent scans will be incremental.
If you always want to scan all items in this target, select the following option:
Always scan all items (full scan)
\\server\marketing
nfs:\\share\marketing
//server/engineering/documentation
/home/protect/mnt/server/share/marketing
c:\share\engineering
\\server\share
\\server.company.com
smb://server.company.com
\\10.66.23.34
If your content root list includes a large number of content roots, you can filter
the list to include only those content roots that are relevant to your Discover
Target scan. In the Content Roots section, click Filters, then enter your filter
text. For example, to see only shares on a server named my_company, enter
\\my_company in the Filters text field.
To delete content roots from your target, select the content roots from the list
and click Delete.
10 On the Filters tab, specify include and exclude filters, size filters, and date
filters.
Use Include Filters and Exclude Filters to specify the files that Symantec
Data Loss Prevention should process or skip. Note that you must specify
absolute paths. If the field is empty, Symantec Data Loss Prevention
performs matching on all files in the file share. If you enter any values for
the Include Filters, Symantec Data Loss Prevention scans only those files
or documents that match your filter. Delimit entries with a comma, but do
not use any spaces. When both Include Filters and Exclude Filters are
present, Exclude Filters take precedence.
See Setting up Endpoint Discover filters to include or exclude items from
the scan on page 1380.
When scanning DFS shares, exclude the internal DFS folder.
Setting up scans of file shares 1246
Optimizing file system target scanning
5 Click Save.
6 Add a new policy, or edit an existing policy.
See Configuring policies on page 330.
7 Click the Response tab.
8 In the pull-down menu, select one of the response rules that you previously
created.
9 Click Add Response Rule.
This response rule then specifies the automated response when this policy
triggers an incident during the scanning of a file.
Several response rules with different conditions can exist for a policy.
Setting up scans of file shares 1249
Configuring Network Protect for file shares
1 Verify that your Lotus Notes database is on the list of supported See Supported IBM Notes targets
targets. on page 1251.
2 Configure the scan for Lotus Notes DIIOP mode. See Configuring Lotus Notes DIIOP mode
configuration scan options on page 1254.
3 Click Manage > Discover Scanning > Discover Targets to See Configuring and running Lotus Notes
create a Lotus Notes target and to configure scans of Lotus scans on page 1251.
Notes databases.
Setting up scans of Lotus Notes databases 1251
Supported IBM Notes targets
4 Set any additional scan options for the Lotus Notes target. See Network Discover/Cloud Storage
Discover scan target configuration options
on page 1173.
5 Start the Lotus Notes database scan. Select the scan target from the list, then click
the Start icon.
Click Manage > Discover Scanning > Discover Targets.
6 Verify that the scan is running successfully. See Managing Network Discover/Cloud
Storage Discover target scans on page 1191.
Click Add to specify the servers you want to scan. Server credential
information that is entered here takes precedence over the default values
and applies only to the server specified.
[hostname,username,password]
For a native mode configuration, you can use the name "local" in the list of
Domino servers. Specifying "local" includes the local databases visible to
the client only to be scanned. For example, instead of the URI enter the
following text:
local
dominoserver1.company.com
dominoserver2.company.com
dominoserver3.company.com
specify the unit of measurement from the drop-down list. The options are
bytes, KB (kilobytes), or MB (megabytes).
Inventory Scanning
Enter the number of incidents to produce before moving on to the next
Domino server that is specified in the Scanned Content tab. To audit
whether confidential data exists on a target, without scanning all of it, set
up Inventory Mode for scanning. Setting incident thresholds can improve
the performance of scanning by skipping to the next server to scan, rather
than scanning everything.
See Creating an inventory of the locations of unprotected sensitive data
on page 1188.
They can be found in the installation directories of a Lotus Notes client, and a
Lotus Domino server with the Domino Designer installed.
The Notes.jar file is in the following Lotus Notes client default installation
directories:
IBM Notes 8
C:\Program Files\IBM\lotus\notes\jvm\lib\ext\Notes.jar
Lotus Notes 7
C:\Program Files\lotus\notes\jvm\lib\ext\Notes.jar
Use the version of the JAR file corresponding to the version of the Lotus Notes
client.
See Supported IBM Notes targets on page 1251.
The NCSO.jar file is in the following Lotus Domino server default installation
directories, when the Domino Designer is installed:
Setting up scans of Lotus Notes databases 1255
Configuring Lotus Notes DIIOP mode configuration scan options
IBM Notes 8
C:\Program Files\IBM\lotus\Notes\Data\domino\java\NCSO.jar
Lotus Notes 7
C:\Program Files\lotus\notes\data\domino\java\NCSO.jar
lotusnotescrawler.use.diiop = true
1 Verify that your SQL database is on the list of supported See Supported SQL
targets. database targets
on page 1257.
2 Click Manage > Discover Scanning > Discover See Configuring and
Targets to create an SQL database target and to running SQL database
configure scans of SQL databases. scans on page 1257.
Setting up scans of SQL databases 1257
Supported SQL database targets
3 Set any additional scan options for the SQL database See Network
target. Discover/Cloud Storage
Discover scan target
configuration options
on page 1173.
4 Install the JDBC driver for the SQL database, if needed. See Installing the JDBC
driver for SQL database
targets on page 1260.
5 Start the SQL database scan. Select the scan target from
the target list, then click the
Click Manage > Discover Scanning > Discover
Start icon.
Targets.
DATE, TIME, and TIMESTAMP. The mapping between these column types and
those of a specific database depends on the implementation of the JDBC driver for
the scan.
To set up a scan for an SQL Database
1 Select one of the following methods for entering the databases:
Upload a file with the list of databases
Create and save a plain text file (.txt) with the servers you want to scan.
Click Browse to locate the list and Upload to import it. The user name and
password that is specified on the Scanned Content tab of the Add SQL
Database Target page is used.
Enter the databases using the following syntax. The vendor name can be
oracle, db2, or sqlserver. The data source is the subname of the JDBC
connection string for that driver and database. The documentation for the
JDBC driver describes this subname. You can optionally enter the maximum
rows to scan per table in the database.
vendor_name:datasource[, maximum-rows-to-scan]
For example:
oracle:@//oracleserver.company.com:1521/mydatabase
db2://db2server.company.com:50000/mydatabase,300
For some SQL Servers, you must also specify the SQL instance name, as
in the following example:
sqlserver://sqlserver.company.com:1433/mydatabase;
instance=myinstance
2 On the Filters tab, enter the optional Include and Exclude filters.
Use the Include Filters and Exclude Filters to specify SQL databases and the
tables that Symantec Data Loss Prevention should process or skip.
When both Include Filters and Exclude Filters are used, the Exclude Filters
take precedence. Any table that matches the Include Filters is scanned, unless
it also matches the Exclude Filters, in which case it is not scanned.
If the Include Filters field is empty, Symantec Data Loss Prevention performs
matching on all tables. These tables are returned from the table query of the
target SQL databases. If you enter any values in the field, Symantec Data Loss
Prevention scans only those databases and tables that match your filter.
The syntax is a pattern for the database, a vertical bar, and a pattern for the
table name. Multiple patterns can be separated with commas. Standard pattern
matching applies. For example, ? matches a single character.
Because the table name matching is not case-sensitive for many databases,
upper case conversion occurs. The table name in the pattern and the table
name it is matched against are converted to upper case before the match.
The following example would match the employee table in all databases.
*|employee
The following example would match all tables in all Oracle databases.
oracle:*|*
For SQL Server 2005 and DB2, the default table query returns table names in
the format schema_name.table_name. Include Filters and Exclude Filters for
SQL Server and DB2 should match this format.
See the following examples:
sqlserver:*|HRschema.employee
sqlserver:*|*.employee
Setting up scans of SQL databases 1260
Installing the JDBC driver for SQL database targets
For Microsoft SQL Server, the open source driver jTDS, can be obtained
from Source Forge at http://jtds.sourceforge.net/.
The jTDS JDBC driver version 1.2.2 was tested with Network Discover/Cloud
Storage Discover.
For DB2, the IBM driver JAR files are in the IBM DB2 distribution, under
the java folder. They can be obtained from IBM at http://www.ibm.com/db2.
The IBM JDBC driver version 1.4.2 was tested with Network Discover/Cloud
Storage Discover.
2 Copy the driver files to the default SQL drivers directory Protect/lib/jdbc.
3 Change the permissions of the JDBC driver files so that the Protect user has
at least read permission.
4 The sqldatabasecrawler.properties file may also need to be modified to
specify the correct JAR names for the selected drivers.
See SQL database scan configuration properties on page 1261.
driver_class.sqlserver = net.sourceforge.jtds.jdbc.Driver
driver_subprotocol.vendor_name
Specifies the subprotocol portion of the JDBC connection string.
Example:
driver_subprotocol.sqlserver = jtds:sqlserver
driver_jar.vendor_name
Specifies the list of JAR files that the driver requires. The JAR files are stored
in the directory that is named in sqldrivers.dir.
See Installing the JDBC driver for SQL database targets on page 1260.
Examples:
Setting up scans of SQL databases 1262
SQL database scan configuration properties
driver_jar.sqlserver = jtds-1.2.2.jar
driver_jar.db2 = db2jcc.jar, db2jcc_license_cu.jar
driver_table_query.vendor_name
Specifies the query to execute to return a list of tables to scan. Typically, the
query should return all user tables in the database. Note that the database
account that issues this query needs appropriate rights to be granted to it by
the database administrator.
You must use an account to scan that can make the driver_table_query in
sqldatabasecrawler.properties and return results. You can test the scan
configuration by using sqlplus to log on as the scan user, and to run the query.
If you get results, you have the permissions to complete the scan. If you do not
get results, then you either have to change the query, or change the privileges
for the scan user.
Example:
driver_row_selector.vendor_name
Specifies the format of the query to use to select the rows from the table. This
vendor name varies, depending on the database. Examples are included in the
sqldatabasecrawler.properties configuration file for the most common
databases.
The following substitution variables are used in the query:
0=TABLENAME
1=COLUMNS
2=ROWNUM
Example:
quote_table_names.vendor_name
Specifies whether table names are quoted before the row selection query is
created. Enabling this feature allows tables with numeric names to be scanned.
For example, Payroll.1 becomes Payroll.1 when the name is quoted.
Example:
quote_table_names.sqlserver=true
sqldrivers.dir
Setting up scans of SQL databases 1263
SQL database scan configuration properties
Specifies the location of the directory in which the JDBC driver JAR files are
placed.
Chapter 64
Setting up scans of
SharePoint servers
This chapter includes the following topics:
1 Verify that your SharePoint server is on the list of See Supported SharePoint
supported targets. server targets on page 1267.
Setting up scans of SharePoint servers 1265
About scans of SharePoint servers
2 Verify that you have sufficient permissions to See Access privileges for
install the SharePoint solution on the Web Front SharePoint scans on page 1267.
Ends in a Farm.
See Installing the SharePoint
Also verify that the scan user has the permissions solution on the Web Front Ends
to run the scan of the SharePoint server. in a farm on page 1272.
3 Install the SharePoint solution on the Web Front See Installing the SharePoint
Ends in a Farm. solution on the Web Front Ends
in a farm on page 1272.
4 Click Manage > Discover Scanning > Discover See Configuring and running
Targets to create a SharePoint target and to SharePoint server scans
configure scans of SharePoint servers. on page 1268.
5 Set any additional scan options for the SharePoint See Network Discover/Cloud
target. Storage Discover scan target
configuration options
on page 1173.
Wiki pages
Blogs
Calendar entries
Tasks
Project tasks
Discussion entries
Contact lists
Announcements
Links
Surveys
Issue tracking
Custom lists
Documents in the document library
The communication between the Discover Server and the SharePoint Web Front
End (WFE) is SOAP-based.
Communication is secure when the SharePoint Web sites are configured to use
SSL.
For HTTPS, validation of the server SSL certificate is not the default. To enable
validation of the server SSL certificate, turn on the advanced setting
Discover.ValidateSSLCertificates. Then import the server SSL certificate to
the Discover Server.
See Advanced server settings on page 209.
See Importing SSL certificates to Enforce or Discover servers on page 203.
If the specified SharePoint site is configured to be on a port that is not the default
(80), ensure that the SharePoint server allows the Discover Server to communicate
on the required port.
The SharePoint solution uses Windows SharePoint Services (WSS) application
programming interfaces. User access to the content is based on the rights for the
specified user in SharePoint. Enter the user credentials to specify this user when
you configure a SharePoint scan.
Setting up scans of SharePoint servers 1267
Supported SharePoint server targets
SharePoint
Web Front
Network End
Enforce
Discover Windows
Server
Server
For the SharePoint site, use the public URL instead of the internal URL.
The Following syntax applies for the URL and credentials on each line.
URL,[username,password]
Select one of the following methods of entering the location for the SharePoint
server:
Uploaded file
Setting up scans of SharePoint servers 1270
Configuring and running SharePoint server scans
Select Scan Sites From an Uploaded File. Create and save a plain text
file (.txt) listing the servers you want to scan. Create the file using an
ASCII text editor and enter one URL per line. Then click Browse to locate
the file with the list. Click Upload Now to import it.
Individual entries
Select Scan Sites. Click Add to use a line editor to specify the servers you
want to scan. Server information that is entered here takes precedence
over the default values and applies only to the path specified.
8 Under Scan Type, select Scan only new or modified items (incremental
scan). This option is the default for new targets.
If you have changed the policy or other definitions in an existing scan, you can
set up the next scan as a full scan. Select the following option:
Scan all items for the next scan. Subsequent scans will be incremental.
If you always want to scan all items in this target, select the following option:
Always scan all items (full scan)
9 On the Filters tab, select path filters.
Use the Include Filter and Exclude Filter to specify the items that Symantec
Data Loss Prevention should process or skip. If the field is empty, Symantec
Data Loss Prevention performs matching on all items. If you enter any values
for the Include Filter, Symantec Data Loss Prevention scans only those items
that match your filter. Delimit entries with a comma, but do not use any spaces.
You can provide filters using regular expressions, or paths relative to the
location of the SharePoint site. Filters can include a site collection, site, sub
site, folder, file name, or file extension. Path filters are not applied on
attachments of an item, such as a .doc attachment to a list item.
All path filters are case-sensitive.
For the Include Filter, regular expression matching is applied to files, but not
to folders.
For the Exclude Filter, regular expression matching is applied to both files
and folders.
Only the path until the first "?" or "*" is considered when a folder or file is
matched.
When all the specified path filters are relative, the matching folder is skipped,
and the scan statistics do not include the items in the skipped folders.
See Setting up Endpoint Discover filters to include or exclude items from the
scan on page 1380.
Setting up scans of SharePoint servers 1271
Configuring and running SharePoint server scans
Note: Byte throttling is only applied after the fetch of each item. Therefore,
actual network traffic may not exactly match the byte throttling that is set.
Inventory Scanning
Enter the number of incidents to produce before moving on to the next site
to scan (a URL from the Scanned Content tab). To audit whether
confidential data exists on a target, without scanning all of it, set up Inventory
Mode for scanning. Setting incident thresholds can improve the performance
of scanning by skipping to the next site to scan, rather than scanning
everything.
After the incident threshold has been reached, the scanning of this site is
stopped, and scanning proceeds to the next site. Because the process is
asynchronous, a few more incidents may be created than specified in the
incident threshold.
Setting up scans of SharePoint servers 1272
Installing the SharePoint solution on the Web Front Ends in a farm
11.5.1 11.5.1
14.0 14.0
Setting up scans of SharePoint servers 1273
Installing the SharePoint solution on the Web Front Ends in a farm
[libdefaults]
default_realm = ENG.COMPANY.COM
[realms]
ENG.COMPANY.COM = {
kdc = engADserver.emg.company.com
}
MARK.COMPANY.COM = {
kdc = markADserver.emg.company.com
}
See Creating the configuration file for Active Directory integration on page 107.
4 On the Discover Server, update the Protect.properties file in the folder
C:\SymantecDLP\Protect\config (in a Windows default Symantec Data Loss
Prevention installation). Update the property that points to the updated krb5.ini
file.
If an internal Specify the public URL for the SharePoint site. All the site collections
SharePoint URL is are scanned.
specified, only the
default site collection
is scanned.
No site collections, or Specify the site collection/site/web application URL with a fully
only the default site qualified domain name.
collection, are
To validate the access from the Discover Server, try to access the
scanned when the
SharePoint URL from a browser. If a short name does not work, try
Discover Server and
to use the fully qualified domain name.
SharePoint site are in
different domains. Only the default site collection is scanned if the web application URL
does not contain fully qualified domain name.
The bytes reported as To improve performance, the scan statistics do not include items in
scanned does not the folders that are skipped (filtered out).
match the number of
Dynamic content, such as .aspx files, can change size.
bytes in the content.
You can set the Advanced Server setting
Discover.countAllFilteredItems to get more accurate scan
statistics.
Scans are not working If you are having trouble with Kerberos authentication, check the
properly with following items:
Kerberos configured.
Ensure that DNS resolution for the domain controller and
SharePoint servers is successful from the detection server.
Ensure that client integration is enable for the zone in which the
web application runs.
Consider adding domain realms to the
C:/SymantecDLP/jre/lib/security/krb5.ini file. For
example:
[domain_realms]
.MYDOMAIN.COM=MYDOMAIN.COM
Chapter 65
Setting up scans of
Exchange servers
This chapter includes the following topics:
1 Verify that Exchange Web Services and the For information about Exchange Web Services and the
Autodiscover Service are enabled on your Exchange Autodiscover service, see your Microsoft Exchange
server and are accessible from the Network documentation.
Discover/Cloud Storage Discover server.
Setting up scans of Exchange servers 1277
About scans of Exchange servers
2 If you need secure access between the Discover Server By default, Symantec Data Loss Prevention only allows
and Exchange Web Services or your Active Directory HTTPS connections to the Active Directory server and
server, set up HTTPS and LDAPS. Exchange Web Services. To allow HTTP connections,
set the
Discover.Exchange.UseSecureHttpConnections
setting in Server Detail > Advanced Server Settings
to false.
3 Ensure that your Exchange user credentials can For information about enabling impersonation for your
impersonate any mailbox you want to scan. user credentials, see your Microsoft Exchange
documentation.
4 Go to Manage > Discover Scanning > Discover See Configuring Exchange Server scans on page 1279.
Targets to create an Exchange target and to configure
scans of Exchange servers.
5 Set any additional scan options for the Exchange See Network Discover/Cloud Storage Discover scan
target. target configuration options on page 1173.
6 Start the Exchange server scan. Go to Manage > Discover Scanning > Discover
Targets.
Select the scan target from the target list, then click
the Start icon.
7 Verify that the scan is running successfully. See Managing Network Discover/Cloud Storage
Discover target scans on page 1191.
Note: Network Discover/Cloud Storage Discover does not support scans of Exchange
targets using Dynamic Distribution Groups.
DOMAIN_NAME\user_name
Ensure that the user credentials you provide can impersonate all mailboxes
you want to scan. For information about configuring Exchange Impersonation,
see http://msdn.microsoft.com/en-us/library/bb204095.aspx.
See Providing the password authentication for Network Discover/Cloud Storage
Discover scanned content on page 1178.
7 Enter a target URL for the Microsoft Active Directory server. For example,
ldaps://dc.domain.com:636.
Note: Only one Active Directory server can be specified per Discover target.
Setting up scans of Exchange servers 1280
Configuring Exchange Server scans
8 Select Public folders to scan all public folders on the Exchange server. The
user of the credentials that are specified must have access to these public
folders.
You can select this option in addition to All users on a Directory Server or
Directory groups and users.
9 Select Mailboxes to scan user mailboxes on your Exchange servers. Select
one of the following methods of entering the items to scan on the Exchange
server:
All users on Directory Server
If a directory server is available, then select the Directory Server from the
drop-down list.
To use this option, select the Directory Server connection you have already
specified, or click the Create new Directory Connection link to configure
another directory connection.
See Configuring directory server connections on page 128.
Directory groups and users
If directory user groups are available, then select the groups to include in
this target.
To use this option, directory groups must be established. If no directory
groups are set up, click the link Create new User Group to jump to the
page to configure the directory user groups.
See Configuring User Groups on page 669.
Specify User Mailboxes to include in this Target
Enter specific mailboxes. Alphanumeric characters and the following special
characters are allowed in mailbox names:
! # $ ' - ^ _ ` { }
You can combine this option with directory groups and users. No directory
groups are needed for the user mailboxes option.
Personal Archives
Setting up scans of Exchange servers 1281
Configuring Exchange Server scans
Select this option to scan Exchange 2010 and 2013 Personal Archive
mailboxes for the users you have specified.
You can provide filters using regular expressions, or paths relative to the
location of the Exchange site. Filters can include a site collection, site, sub site,
folder, file name, or file extension. All path filters are case-sensitive .
For Include Filters, regular expression matching is applied to files, but not to
folders.
For Exclude Filters, regular expression matching is applied to both files and
folders.
Only the path until the first "?" or "*" is considered when a folder or file is
matched.
When all the specified path filters are relative, the matching folder is skipped,
and the scan statistics do not include the items in the skipped folders.
See Setting up Endpoint Discover filters to include or exclude items from the
scan on page 1380.
11 On the Filters tab, select size filters.
The size filters let you exclude items from the matching process based on their
size. Symantec Data Loss Prevention includes only the items that match your
specified size filters. If you leave this field empty, Symantec Data Loss
Prevention performs matching on items of all sizes.
See Filtering Discover targets by item size on page 1183.
Setting up scans of Exchange servers 1282
Example configurations and use cases for Exchange scans
Scan all user mailboxes and Select the following options in the user interface:
public folders.
Public folders
Mailboxes > All users on Directory Server
The credentials must have permission to impersonate all mailboxes you want to scan.
Scan all user mailboxes (but Select Mailboxes > All users on Directory Server in the user interface.
not public folders).
The credentials must have permission to impersonate all mailboxes you want to scan.
Scan all public folders. Select Public folders in the user interface.
Scan specific groups or Select Mailboxes > Directory groups and users in the user interface.
users.
To scan a Directory Group, select the Directory Group from the groups in the list. All
user mailboxes in the group are scanned. You can click Create new User Group to
create a new Directory Group.
To scan for specific users, enter a comma-separated list of user mailbox names.
The credentials must have permission to impersonate all mailboxes you want to scan.
Scan an Exchange 2010 Select Mailboxes > All users on Directory Server > Personal Archives or Mailboxes
Personal Archive. > Directory groups and users > Personal Archives in the user interface. If necessary,
specify which mailboxes to scan. Network Discover/Cloud Storage Discover scans the
Personal Archives associated with the specified mailboxes.
java.util.logging.FileHandler.level = FINEST
org.apache.cxf.interceptor.LoggingInInterceptor.level = FINEST
net.entropysoft.eci.exchangewebservices.schema.SchemaHelper.level = WARNING
net.entropysoft.eci.exchangewebservices.schema.PropertyManagersReader.level = WARNING
org.apache.commons.beanutils.converters.level = WARNING
net.entropysoft.eci.exchangewebservices.AutodiscoverHelper.level = FINEST
net.entropysoft.eci.exchangewebservices.ExchangeWebServicesHelper= FINEST
net.entropysoft.eci.exchangewebservices.level = FINE
Setting up scans of Exchange servers 1284
Troubleshooting Exchange scans
Exchange logs: You might find useful troubleshooting information in the logs
created by your Microsoft Exchange Server.
Chapter 66
About Network Discover
scanners
This chapter includes the following topics:
Troubleshooting scanners
Scanner processes
Scan public folders using a specific account to find the confidential data.
Scan all the mailboxes using an Administrator account that can access all the
mailboxes.
Scan a particular user's mailbox using the Administrator account.
Scan a single user's mailbox, with the user name and password known.
To set up scanning of Microsoft Exchange Servers , complete the following process:
5 On the Enforce Server, add a new Exchange See Adding a new Network
target. Discover/Cloud Storage
Discover target on page 1169.
For example, in a two-tier configuration you might have an Enforce Server and a
Network Discover/Cloud Storage Discover Server that is connected to a
Documentum server with a scanner installed.
You can perform the following tasks on the computers in this configuration:
On the Enforce Server, define the scan target (in this example, Documentum).
On the Documentum server, install the Documentum scanner, configure the
scanner to post content to the Network Discover/Cloud Storage Discover Server,
and start (or stop) a scanner.
On the Enforce Server, start or stop a target scan (with the Start icon), and view
the incident reports.
The scanner system communicates with the Network Discover/Cloud Storage
Discover Server using the HTTP protocol.
When the scanner runs, it performs following tasks:
Natively connects to the repository, and crawls the repository to read the content
and metadata.
Extracts the text and some metadata.
Posts this extracted information to the Network Discover/Cloud Storage Discover
Server.
Network Discover/Cloud Storage Discover consumes the text and metadata
and applies detection.
See About Network Discover/Cloud Storage Discover on page 1162.
Troubleshooting scanners
After a scan is started, it extracts content and metadata from the repository. Then
it passes this content to the Scan Controller and the Network Discover/Cloud Storage
Discover Server.
See How Network Discover/Cloud Storage Discover scanners work on page 1286.
If a scanner does not seem to be processing items, use the following suggestions:
About Network Discover scanners 1288
Troubleshooting scanners
Issue Suggestions
Scanner does not seem to Verify that the scanner was installed properly.
be running.
On the system where the scanner is installed, make sure that the scanner processes
are running.
Incidents do not appear in Verify that the scan target is set up properly. Scanners can only send content to a target
the reports. of the same type. Multiple scanners of the same type can feed content to a Network
Discover/Cloud Storage Discover scan of that type.
Items that appear and disappear from this folder indicate normal progress.
About Network Discover scanners 1289
Scanner processes
Issue Suggestions
The scan appears stalled. If a scanner cannot send content to Network Discover/Cloud Storage Discover, the
scanner content queues up on the scanner system. The scanner system must have
access to the Network Discover/Cloud Storage Discover Server. System warnings such
as low disk space or down services should be in place on both systems before installation.
Verify that scan information moves through the scan process by checking the logs and
temporary directories.
Scanner processes
Table 66-3 provides the information about Network Discover/Cloud Storage Discover
scanner processes on a Windows operating system.
About Network Discover scanners 1290
Scanner installation directory structure
Path Description
/scanner_typeScanner
About Network Discover scanners 1291
Scanner installation directory structure
Path Description
Path Description
ScannerControllerLogging.properties In the
ScannerControllerLogging.properties
file, you can configure the following options:
discover.retry.interval 1000 Milliseconds the scanner should wait before it retries to connect
to the Network Discover/Cloud Storage Discover Server after
a disconnect or previous failure.
scanner.send.endofscanmarker true If this parameter is set to false, the scanner runs until it is
stopped manually in the Enforce Server console. The scan
restarts from the beginning after it reaches the end of the scan
list.
scanner.incremental false When true, the scanner only scans documents with created
or modified dates after the last complete scan. When false, all
files are scanned each time the scan is run.
dre.fake.port disabled Used only by certain scanners to prevent content from being
misdirected to an incorrect process. Must also be modified
http://localhost:19821
with values for DREHost and ACIPort in the
scanner_typeScanner.cfg file.
queue.folder.path disabled Used only for certain scanners to bridge a difference in location
between where .idx files are written and where they are
./scanner/outgoing
expected. This parameter is for the Exchange and SharePoint
2003 scanners.
Chapter 67
Setting up scanning of file
systems
This chapter includes the following topics:
Example configuration for scanning that skips symbolic links on UNIX systems
Setting up scanning of file systems 1296
Setting up remote scanning of file systems
1 Verify that your file system is on the list of See Supported file system
supported targets. scanner targets on page 1297.
2 On the server that contains the file system, install See Installing file system
the file system scanner. scanners on page 1297.
The setup for scanning file systems requires See Installing file system
installation of the scanner software on the scanners silently from the
computer where the file system is located. command line on page 1301.
3 Perform any manual configurations by editing the See Configuration options for
configuration files and properties files. file system scanners
on page 1302.
4 On the Enforce Server, add a new Scanner File See Adding a new Network
System target. Discover/Cloud Storage
Discover target on page 1169.
5 Start the file system scan. See Starting file system scans
on page 1300.
Start the scanner on the scanner computer, and
also start the scan on the Enforce Server.
xlC.rte (v8.0.0.0+)
The following 32-bit Solaris file systems can be scanned (64-bit systems are not
supported):
Solaris 9 (SPARC platform)
Solaris 10 (SPARC platform)
Solaris requires the following patch levels for the scanner:
Solaris 9, 115697-01
http://sunsolve.sun.com/search/document.do?assetkey=1-21-115697-02-1
File systems on UNIX systems can also be scanned using the SFTP protocol. This
protocol provides a method similar to share-based file scanning, instead of using
the File System Scanner. Contact Symantec Professional Services for details.
SymantecDLPScanners_Aix_14.0.sh
Note: You can install either the 32-bit or 64-bit scanner on 64-bit Linux
systems. Symantec recommends the 64-bit version.
SymantecDLPScanners_Solaris_14.0.sh
SymantecDLPScanners_windows_x32_14.0.exe
./SymantecDLPScanners_Unix_x32_14.0.sh
./SymantecDLPScanners_Unix_x32_14.0.sh -c
3 If applicable, confirm the version of the scanner you want to install (32-bit or
64-bit).
4 Confirm the license ageement.
5 Select File System Scanner.
6 Select the installation Destination Directory (the directory where you want the
SymantecDLP File System Scanner installed).
Setting up scanning of file systems 1299
Installing file system scanners
7 For Windows, select the Start Menu Folder (shortcut in the Start menu). The
default is SymantecDLP FileSystem Scanner.
8 Enter the following connection information for the Network Discover/Cloud
Storage Discover Server:
Discover Host (IP or host name of the Network Discover/Cloud Storage
Discover Server)
Discover Port
/opt/FileSystemScanner/bin/FileSystemScanner_Console
To start a file system scan with multiple scanners for one target
1 On each of the scanner computers, start the File System scanner on that
computer.
On Windows, select Start > Vontu FileSystem Scanner > Vontu FileSystem
Scanner Console.
On UNIX, enter the following command:
/opt/FileSystemScanner/bin/FileSystemScanner_Console
Make sure that each of the scanners has started, and has posted information.
Check the outgoing folder on each of the computers.
See Scanner installation directory structure on page 1290.
2 Log on to the Enforce Server.
Go to Manage > Discover Scanning > Discover Targets to navigate to the
list of targets.
3 Select the scan target from the target list, then click the Start icon.
4 The scanner starts the process of scanning data.
See How Network Discover/Cloud Storage Discover scanners work
on page 1286.
5 If the scan does not progress normally, you can troubleshoot it.
See Troubleshooting scanners on page 1287.
6 Stop and restart the scanner whenever you make changes to the configuration
file. To stop the scanner, type the control-C character in the console window.
sys.programGroup.allUsers$Boolean=true
discover.host=test-server.test.lab
discover.port=8090
sys.service.selected.417$Boolean=true
job.0.excludeFilters=
sys.languageId=en
sys.programGroup.linkDir=/usr/local/bin
installService$Boolean=false
sys.installationDir=/opt/FileSystemScanner
sys.programGroup.enabled$Boolean=true
job.0.includeFilters=
job.0.directory=/home/text_files/text_scan/text
sys.service.startupType.417=auto
startAfterInstall$Boolean=false
3 To run the installation with the varfile, type the following command (for Linux):
# ./FileSystemScanner_Unix_11.6.sh
-varfile FileSystemScanner.varfile -q
DirectoryFileMatch=*
DirectoryPathCSVs=C:\
DirectoryMustHaveCSVs=
DirectoryCantHaveCSVs=
DirectoryPathCSVs=/usr
DirectoryMustHaveCSVs=
DirectoryCantHaveCSVs=
DirectoryPathCSVs=C:\Windows
DirectoryMustHaveCSVs=*/temp/*
DirectoryCantHaveCSVs=
Include only the files that end with extension tmp or the directory name has xml in
the path.
DirectoryPathCSVs=C:\Windows
DirectoryMustHaveCSVs=*/xml/*,*.tmp
DirectoryCantHaveCSVs=
Include only the files that end with the extension txt under the UNIX directory
/home/data.
DirectoryPathCSVs=/home/data
DirectoryMustHaveCSVs=*.txt
DirectoryCantHaveCSVs=
Setting up scanning of file systems 1305
Example configuration for scanning with exclude filters
DirectoryPathCSVs=C:\Windows
DirectoryMustHaveCSVs=
DirectoryCantHaveCSVs=*.exe
Exclude all files that end with extension tmp or if the directory name contains bin
under the UNIX directory /home/data.
DirectoryPathCSVs=/home/data
DirectoryMustHaveCSVs=
DirectoryCantHaveCSVs=*/bin/*,*.tmp
DirectoryPathCSVs=C:\data
DirectoryMustHaveCSVs=*/temp/*,*.pdf
DirectoryCantHaveCSVs=*/bin/*,*.tmp
DirectoryMustHaveCSVs=*.pdf
DirectoryAfterDate=-180
DirectoryBeforeDate=0
Scan all files that have been modified between 60 days and 360 days in the past.
DirectoryAfterDate=-360
DirectoryBeforeDate=-60
ImportPreImportMinLength=3000
ImportPreImportMaxLength=4000
ImportEmptyFiles=false
DirectoryMustHaveCSVs=*.doc
ImportPreImportMinLength=4096
ImportEmptyFiles=false
Setting up scanning of file systems 1307
Example configuration for scanning that skips symbolic links on UNIX systems
PollingMethod=1
FilePollFilename=/opt/test/filenames.txt
Chapter 68
Setting up scanning of Web
servers
This chapter includes the following topics:
files to Network Discover/Cloud Storage Discover for content processing. The Web
server scanner can retrieve content from various document types, including Web
documents, Word, Excel, and PDF files.
The Web server scanner crawls Web pages for links and content. The crawler
processes the page content and either accepts or rejects the page for retrieval. If
the page is accepted, the crawler looks for links from the page, filters the links and
queues the accepted links for the crawler process. If the page is rejected, the crawler
looks for links only if you have configured it to follow links on rejected pages. The
links are filtered before they are added to the crawler queue. The crawler then
retrieves the page content of accepted pages. The crawler requests the next link
in its queue, and the process repeats.
To set up scanning of Web servers, complete the following process:
1 The Web server scanner can scan Web sites. See Supported Web server
(scanner) targets on page 1309.
It has been tested with IIS and Apache Web
servers.
2 On the server with read access to the Web site, See Installing Web server
install the Web server scanner. scanners on page 1310.
3 Perform any manual configurations by editing the See Configuration options for
configuration files and properties files. Web server scanners
on page 1313.
4 On the Enforce Server, add a new Scanner File See Adding a new Network
System target. Discover/Cloud Storage
Discover target on page 1169.
5 Start the file system scan. See Starting Web server scans
on page 1312.
Start the scanner on the scanner computer, and
also start the scan on the Enforce Server.
SymantecDLPScanners_windows_x32_14.0.exe
Linux GUI:
./SymantecDLPScanners_Unix_x32_14.0.sh
Linux console:
./SymantecDLPScanners_Unix_14.0.sh -c
3 Confirm the version of the scanner you want to install (32-bit or 64-bit).
4 Confirm the license ageement.
5 Select Web Server Scanner.
6 Select the installation Destination Directory (the directory where you want
the Web server scanner installed).
Click Next.
7 Select the Start Menu Folder (shortcut in the Start menu). The default is
Symantec DLP WebServer Scanner.
Click Next.
Setting up scanning of Web servers 1311
Installing Web server scanners
14 On the Enforce Server, create a New Target for the scanner Web server type.
15 Start the scan on both the scanner computer and the Enforce Server.
See Starting Web server scans on page 1312.
To start a Web server scan with multiple scanners for one target
1 On each of the scanner computers, start the Web server scanner.
Click Start > Vontu WebServer Scanner > Vontu WebServer Scanner
Console.
Make sure that each of the scanners has started, and has posted information.
Check the outgoing folder on each of the computers.
See Scanner installation directory structure on page 1290.
2 Log on to the Enforce Server.
Go to Manage > Discover Scanning > Discover Targets to navigate to the
list of targets.
3 Select the scan target from the target list, then click the Start icon.
4 The scanner starts the process of scanning data.
See How Network Discover/Cloud Storage Discover scanners work
on page 1286.
5 If the scan does not progress normally, you can troubleshoot it.
See Troubleshooting scanners on page 1287.
6 Stop and restart the scanner whenever you make changes to the configuration
file. To stop the scanner, type the control-C character in the console window.
Scanned Content NavDirAllowCSVs The list with include filters for paths. This list
contains the strings that the URL of a page
must contain for the scanner to process the
page. Use the parameter NavDirCheck to
specify how and when the scanner checks
for these strings.
Scanned Content NavDirDisallowCSVs The list with exclude filters for paths. This list
contains the strings that the URL of a page
must not contain for the scanner to process
the page. Use the parameter NavDirCheck
to specify how and when the scanner checks
for these strings.
Extensions=*.doc,*.html*
Setting up scanning of Web servers 1315
Configuration options for Web server scanners
Scanned Content StayOnSite You can configure the crawler to stay on the
Web site on which it starts, or allow it to
follow links to external Web sites in domains
different from the starting Web site. By
default, the crawler stays on the starting Web
site domain.
Authentication LoginUserField The name of the user name form field (for
FORMPOST or FORMGET logon methods).
Setting up scanning of Web servers 1316
Example configuration for a Web site scan with no authentication
//##########################################################
//# Jobs
//##########################################################
URL=http://www.cnn.com
Setting up scanning of Web servers 1317
Example configuration for a Web site scan with basic authentication
//##########################################################
//# Jobs
//##########################################################
URL=http://site.domain.com
LoginURL=http://domain.server.com/login.html
LoginMethod=AUTHENTICATE
LoginUserValue=some_user
LoginPassValue=9sfIy8vw
//##########################################################
//# Jobs
//##########################################################
URL= http://wiki.symantec.corp/dashboard.action
LoginMethod=FORMPOST
LoginURL=http://wiki.symantec.corp/login.action
LoginUserField=os_username
LoginUserValue=some_user
LoginPassField=os_password
LoginPassValue=9sfIy8vw
Setting up scanning of Web servers 1318
Example configuration for a Web site scan with NTLM
//##########################################################
//# Jobs
//##########################################################
URL=http://some_site
NTLMUsername=Some_Domain\some_domain_user
NTLMPassword=9sfIy8vw
Case insensitive 64 If you add 64 to the URL value, the scanner checks the
URL of a page for a match for the strings that are specified
in the parameter NavDirAllowCSVs or
NavDirDisallowCSVs. This match is not case-sensitive
.
Before download 128 If you add 128 to the URL value, the scanner checks
whether the URL has any NavDirAllowCSVs or
NavDirDisallowCSVs strings before the page is
downloaded.
Setting up scanning of Web servers 1319
Example of date filtering for a Web site scan
Valid site structure 512 If you add 512 to the URL value, the scanner rechecks the
NavDirAllowCSVs and NavDirDisallowCSVs values
for the site to ensure that the site is still valid before it
updates it. If you do not include this setting, then changes
to these values are never checked. If the site is not valid,
it is not downloaded.
In the following example, the scanner checks the URLs for matches for the strings
"archive" or "test." This match is not case-sensitive , and part of a word or a whole
word is matched. If the URL contains one of these strings, the page is not processed.
NavDirDisallowCSVs=*archive*,*test*
NavDirCheck=65
In the following example, the scanner checks the URLs for matches for the strings
"news" or "home." This match is not case-sensitive , and part of a word or a whole
word is matched. If the URL does not contain one of these strings, the page is not
processed.
NavDirAllowCSVs=*news*,*home*
NavDirCheck=65
AfterDate=-365
BeforeDate=7
Chapter 69
Setting up scanning of
Documentum repositories
This chapter includes the following topics:
3 Perform any manual configurations by editing the See Configuration options for
configuration files and properties files. Documentum scanners
on page 1325.
4 On the Enforce Server, add a new Scanner See Adding a new Network
Documentum target. Discover/Cloud Storage
Discover target on page 1169.
SymantecDLPScanners_windows_x32_14.0.exe
9 Click Next.
Setting up scanning of Documentum repositories 1323
Installing Documentum scanners
Doc Broker The name of the server where the repository for the DocBase is
Host stored.
Doc Base The name of the repository you want the Documentum scanner to
retrieve.
User Name Specify an account with full access rights to the Documentum files
you want to scan.
Password Password for the account. This password is plain text in the
configuration file.
WebTop Host The host name of the Web interface to the Documentum content
repository.
11 Click Next.
12 The scanner installs.
13 Select the Startup Mode.
While you initially test or verify that the scanner runs successfully, do not select
either of these options, but start the scanner manually.
You can select one (or none) of the following options:
Install as a service on a Windows system.
Start after installation.
The default is to start the scanner manually.
14 The Documentum scanner installation is complete on the scanner computer.
15 Perform any manual configurations by editing the configuration files and
properties files.
See Configuration options for Documentum scanners on page 1325.
See Scanner installation directory structure on page 1290.
See Scanner configuration files on page 1292.
16 After installing the Documentum scanner, copy the dmcl40.dll file from your
Documentum installation bin directory, to the \DocumentumScanner\scanner
folder in the scanner installation directory.
See Scanner installation directory structure on page 1290.
Setting up scanning of Documentum repositories 1324
Starting Documentum scans
17 On the Enforce Server, create a New Target for the scanner Documentum
type.
18 Start the scan on both the scanner computer and the Enforce Server.
See Starting Documentum scans on page 1324.
Parameter Description
Parameter Description
ExtensionCSVs=*.doc,*.htm,*.ppt,*.xls
first_value,second_value
first_valuedocument_idsecond_value
ImportRefReplaceWithCSVs=
http://documentum-server.mycompany.com:8080/
webtop/component/drl?objectId=
N hours
N days
N weeks
N months
Parameter Description
N hours
N days
N weeks
N months
FolderCSVs=/support,/clients,/marketing,/finance
[DOCBROKER_PRIMARY]
host = documentum-server.mycompany.com
During installation of the Symantec Data Loss Prevention scanner, the host
parameter is set in the dmcl.ini file. If the Documentum Document Broker (server)
later changes, this file must be edited to point to the new server.
Parameter Description
host The computer that hosts the Documentum Document Broker (server).
//##########################################################
//# Jobs
//##########################################################
[JOBS]
NUMBER=1
0=Job0
[Job0]
DocBase=Vontu_1
UserName=Administrator
Password=mypassword
ImportRefReplaceWithCSVs=
http://documentum-server.mycompany.com:8080/webtop/
component/drl?objectId=
LogFile = Job0.log
Chapter 70
Setting up scanning of
Livelink repositories
This chapter includes the following topics:
1 Verify that your Livelink repository is on the list of See Supported Livelink scanner
supported targets. targets on page 1330.
Setting up scanning of Livelink repositories 1330
Supported Livelink scanner targets
2 Create an ODBC data source for SQL Server. See Creating an ODBC data
source for SQL Server
Install the Livelink scanner.
on page 1330.
3 Perform any manual configurations by editing the See Configuration options for
configuration files and properties files. Livelink scanners on page 1336.
4 On the Enforce Server, add a new Scanner See Adding a new Network
Livelink target. Discover/Cloud Storage
Discover target on page 1169.
Note: On 64-bit Windows systems, use the 32-bit ODBC administrator tool to
configure the data source. The 32-bit version is available at
c:\windows\sysWOW64\odbcad32.exe.
3 Click Add.
4 Select SQL Server.
5 Give it a name (for example, Livelink). This name is referenced in the
VontuLiveLinkScanner.cfg file.
6 Click Next.
7 Select With SQL Server authentication using a login ID and password
entered by the user.
8 Check the option for Connect to SQL Server to obtain default settings for
additional configuration options and enter the SQL Server credentials.
9 Click Next. Accept the defaults.
10 Click Next. Accept the defaults.
11 Click Finish.
SymantecDLPScanners_windows_x32_14.0.exe
7 Select the installation Destination Directory, the folder where you want the
Livelink Scanner to be installed.
The default is c:\Program Files\LivelinkScanner\.
Click Next.
8 Select the Start Menu Folder (shortcut in the Start menu).
The default is SymantecDLP Livelink Scanner.
Click Next.
9 Enter the following connection information for the Network Discover/Cloud
Storage Discover Server:
Discover Host (IP or host name of the Network Discover/Cloud Storage
Discover Server)
Discover Port
Click Next.
Setting up scanning of Livelink repositories 1333
Installing Livelink scanners
LiveLink User Name The user name to use when you scan.
LiveLink Connection The Livelink API connection name. This name is the
Name dbconnection in the opentext.ini file on the Livelink
server.
LiveLink API Port This port should be 2099 unless it has been changed in the
opentext.ini file on the Livelink server. The default is
2099.
ODBC DSN The name of the ODBC data source on the computer running
the Livelink scanner.
SQL User Name User name to use to connect to the ODBC data source.
Click Next.
11 The scanner installs.
12 Select the Startup Mode.
While you initially test or verify that the scanner runs successfully, do not select
either of these options, but start the scanner manually.
You can select one (or none) of the following options:
Install as a service on a Windows system.
Start after installation.
The default is to start the scanner manually.
13 The Livelink scanner installation is complete on the scanner computer.
Setting up scanning of Livelink repositories 1334
Starting Livelink scans
LAPI_ATTRIBUTES.dll
LAPI_BASE.dll
LAPI_DOCUMENTS.dll
LAPI_USERS.dll
LLKERNEL.dll
16 Create an ODBC data source for the database instance that Livelink uses. This
data source is referenced in the VontuLivelinkScanner.cfg file.
See Creating an ODBC data source for SQL Server on page 1330.
17 On the Enforce Server, create a New Target for the scanner Livelink type.
18 Start the scan on both the scanner computer and the Enforce Server.
See Starting Livelink scans on page 1334.
//##########################################################
//# Jobs
//##########################################################
[JOBS]
Number=1
0=Job0
[Job0]
OpenTextServer=mydatabase-livelink.test.lab
OpenTextPort=80
OpenTextUsername=Admin
OpenTextPassword=livelink
LLConnection=LivelinkDB
LLApiPort=2099
DSN=livelink
SQLUserName=lldbuser
SQLPassWord=livelink
Chapter 71
Setting up Web Services for
custom scan targets
This chapter includes the following topics:
3 Save and modify the WSDL, and a create a client See About setting up the Web
(such as a Java client), or SOAP request. Services Definition Language
(WSDL) on page 1339.
4 Run the client, and verify the results. See Example of a Web Services
Java client on page 1340.
See the online Help for a Web Services sample WSDL and for a Web Services
sample SOAP request.
Setting up Web Services for custom scan targets 1340
Example of a Web Services Java client
JAVA_HOME=jdk_install_dir
apache-cxf-installdir\bin\wsdl2java
-client sample_folder\DiscoverSOAPTarget.wsdl
javac DiscoverSOAPClient.java
11 On the Enforce Server, verify that the expected number of items are reported
for the Network Discover/Cloud Storage Discover target that is created in step
1.
import javax.xml.datatype.DatatypeFactory;
import javax.xml.namespace.QName;
import java.io.ByteArrayOutputStream;
import java.io.File;
import java.io.FileInputStream;
import java.net.URL;
import java.util.Date;
import com.vontu.discover.ComponentContentType;
import com.vontu.discover.ComponentType;
import com.vontu.discover.DocumentType;
import com.vontu.discover.ProcessDocumentsType;
import com.vontu.wsdl.discoversoaptarget.DiscoverSOAPTargetPortType;
import com.vontu.wsdl.discoversoaptarget.DiscoverSOAPTargetService;
import com.sun.org.apache.xerces.internal.impl.dv.util.Base6
{
private static final QName SERVICE_NAME = new QName(
"http://www.vontu.com/wsdl/DiscoverSOAPTarget.wsdl",
"DiscoverSOAPTarget_Service");
private static final String OWNER = "DiscoverSOAPClient";
private static final String BODY = "This is the body";
private static final String TYPE = "Text";
Setting up Web Services for custom scan targets 1342
Sample Java code for the Web Services example
//Change this based on your discover host name and scanner port
private static final String WSDL_PATH =
"http://localhost:8090/?wsdl";
//create a component
ComponentType body = new ComponentType();
Setting up Web Services for custom scan targets 1343
Sample Java code for the Web Services example
documentType.setComponent(body);
body.setName(file.getName());
//add body
ComponentContentType bodyContent =
new ComponentContentType();
body.setComponentContent(bodyContent);
bodyContent.setType(TYPE);
bodyContent.setContent(BODY);
ByteArrayOutputStream bytes =
new ByteArrayOutputStream();
FileInputStream in = new FileInputStream(file);
byte[] buf = new byte[1024];
for(;;)
{
int len = in.read(buf);
if(len == -1)
{
break;
}
bytes.write(buf,0,len);
}
attachmentContent.setContent(
Base64.encode(bytes.toByteArray()));
}catch(Exception e)
Setting up Web Services for custom scan targets 1344
Sample Java code for the Web Services example
{
}
}
}
Section 9
Discovering and preventing
data loss on endpoints
Endpoint Discover examines the local fixed drives of an endpoint and locates every
file that contains the information that matches a policy. Endpoint Discover scans
the endpoints to find the information that you have defined as at risk or sensitive.
See About Endpoint Discover on page 54.
You can configure agent settings, group agents, set response rules, check agent
health, and troubleshoot agents.
Agent configuration You can set detection types See About agent
and detection locations. You configurations on page 1390.
can specify file filters and
bandwidth limits. You set the
agent configuration to best
suite your implementation and
data security requirements.
Agent groups You use agent groups to send See About agent groups
agent configurations to on page 1435.
groups of agents.
Agent health and You can review DLP Agent See About Symantec DLP
management health and complete Agent administration
troubleshooting and on page 1449.
management tasks.
Application monitoring You can configure this feature See About monitoring
to monitor applications for applications on page 1496.
CD/DVD burning, IM, email,
or HTTP/S clients.
Endpoint tools You use Endpoint tools to See About Endpoint tools
complete various on page 1523.
maintenance tasks on the
endpoint, like shutting down
watchdog services, inspecting
the agent database, and
restarting Mac agents.
Overview of Symantec Data Loss Prevention for endpoints 1348
Guidelines for authoring Endpoint policies
Note: Agents running on Mac endpoints can perform DCM detection only.
Two-tiered detection has implications for the kinds of detection rules and response
rules you can combine in a policy and use on endpoints. It also has implications
for the optimization of system usage and performance of Symantec Data Loss
Prevention on endpoints. As you create the policies that apply to endpoints, the
following guidelines are recommended.
Do not create a policy that combines a server-side detection rule with an Endpoint
Prevent response rule. For example, do not combine an EDM or DGM rule with an
Endpoint Block or Endpoint Notify response rule. If a server-side detection rule
triggers an Endpoint Prevent response rule, Symantec Data Loss Prevention cannot
execute the Endpoint Prevent response rule, and the system displays an error
message.
See Author policies to limit the potential effect of two-tier detection on page 368.
When creating an endpoint policy that includes a server-side detection rule, combine
that detection rule with an agent-side detection rule in one compound rule. This
practice helps Symantec Data Loss Prevention perform detection on the endpoint
without sending the content to the Endpoint Server. Symantec Data Loss Prevention
saves network bandwidth and improves performance by performing detection on
the endpoint.
For example, you can couple an EDM detection rule with a keyword detection rule
in one compound rule. In a compound rule, all conditions must be met before
Symantec Data Loss Prevention registers a match. Conversely, if one condition is
not met, Symantec Data Loss Prevention determines there is no match without
having to check the second condition. For example, to register a match the content
must meet the first condition AND all other conditions in the same rule. When you
set up the compound rule in this way, the DLP Agent checks the input content
against the agent-side rule first. If there is no match, Symantec Data Loss Prevention
does not need to send the content to the Endpoint Server. However, if you create
Overview of Symantec Data Loss Prevention for endpoints 1349
Guidelines for authoring Endpoint policies
a compound rule that involves a DCM or an EDM policy, the content is still sent to
the Endpoint Server.
Before you combine a server-side detection rule (for example, an EDM rule) with
an All: Limit Incident Data Retention response rule that retains original files for
endpoint incidents, consider the bandwidth implications of retaining original files.
When it sends data to an Endpoint Server for analysis, the DLP Agent sends either
text data or binary data according to policy requirements. Whenever possible, DLP
Agents send text to cut down on bandwidth use. By default, Symantec Data Loss
Prevention discards original files for endpoint incidents. If a response rule retains
original files for endpoint incidents, DLP Agents must send binary data to the
Endpoint Server. In this case, make sure that your network can handle the increased
traffic between DLP Agents and Endpoint Servers without degrading performance.
Combine agent-side detection rules (for example, DCM) with an Endpoint Prevent
response rule in the same policy. Symantec Data Loss Prevention can execute an
Endpoint Prevent response rule only when a DLP Agent detection rule triggers the
response.
Table 72-2 lists detection and response rules that cannot be combined.
Note: Policy groups that are assigned to an Endpoint Server apply equally only to
connected Windows agents.
Endpoint Prevent can perform many different types of monitoring. The following
table provides references to the types of monitoring you can select.
Type of Monitoring
Type of Monitoring
Endpoint Prevent monitors the activity on endpoints regardless if they are connected
to an Endpoint Server. If an endpoint is disconnected from the network and cannot
connect to an Endpoint Server, Endpoint Prevent continues to monitor the endpoint.
All incidents are stored in the Agent Store until the endpoint is re-connected to the
Endpoint Server. If the Agent Store exceeds the specified size limit, older files are
ejected until the size limit is no longer exceeded. Endpoint Prevent does not stop
monitoring the endpoint if the Agent Store exceeds the specified size limit.
See About the DLP Agent store on page 1400.
See About Endpoint Prevent monitoring on page 1350.
See About the DLP Agent store on page 1400.
See Workflow for implementing policies on page 297.
Devices that use Media Transfer Protocol (MTP) (on Windows endpoints)
Mac supported removable storage file systems include the following:
HFS+ (all versions of Mac OS Extended)
FAT
exFAT
Windows supported removable storage file systems include the following:
NTFS
FAT
When the DLP Agent detects that an incident has occurred, the data is not
transferred. An incident is created and sent to the Endpoint Server. When an incident
occurs, the DLP Agent displays a pop-up notification to the user that informs the
user that the incident has occurred. The notification also requires a justification for
the file transfer. This justification appears in the incident snapshot.
See Setting report preferences on page 989.
For example, User 1 copies a Microsoft Word file that contains medical records
from an endpoint to a USB flash drive. The DLP Agent blocks this file from being
transferred to the flash drive. When the file is blocked, a pop-up notification appears
on the users screen, stating that the file transfer is a violation of a specific policy.
The pop-up notification also provides a text box in which users can justify moving
the file to the flash drive. The justification that the user enters into the pop-up window
is visible on the incident snapshot for this incident.
See About Endpoint Prevent monitoring on page 1350.
User Cancel pop-up. If a User Cancel response rule is included in a policy, and
a policy violation occurs, the Mac agent creates an incident but does not display
the User Cancel pop-up.
See Configuring the Endpoint Prevent: User Cancel action on page 908.
Active Directory (AD) user groups in policies. The Mac agent does not support
AD user group conditions in policies. If you use them in a policy, the Mac agent
does not match users on the condition. For example, if a credit card policy
applies to all users except those who belong to the
ALL_CREDIT_CARD_DEPT_EMPLOYEES AD group, then the Mac agent
treats this condition as not matched for all users. This means that the credit card
policy is applied to all users. You can create a new policy group for
ALL_CREDIT_CARD_DEPT_EMPLOYEES and include only those policies that
apply to ALL_CREDIT_DEPT_EMPLOYEES. You can then deploy this policy
group to a separate Endpoint Server where all the credit card department
employee Mac agents can point.
See Configuring User Groups on page 669.
True file type filtering. The Mac agent does not perform a file signature match
when it filters on certain file types. The agent uses the file extension to apply
file type filters.
See Filter by File Properties settings on page 1393.
Configurable recovery file path. When a block response rule is applied, sensitive
files are moved to the recovery folder on the Mac endpoint. This recovery folder
is at $HOME/My Recovered Files, where $HOME is the endpoint user's home
directory. The file is saved in the recover location to prevent a complete loss of
the file. The recover location is specified in the Block pop-up.
See Recovering sensitive files on Mac endpoints on page 1402.
Actual file names in incidents for Office files. When an Office file is saved to a
removable storage using a Save As operation, the Mac agent displays the actual
file name in the incident. For other applications, the Mac agent might capture a
temporary file name that Mac OS X creates during the Save As process.
See About endpoint incident lists on page 944.
Application whitelisting using the publisher name. If you want to prevent an
application from being monitored, you must add that application to the
Application Monitoring screen and whitelist it from the Removable Storage
channel in the agent configuration. You can only enter the binary name in the
Binary Name field. Other parameters, like the publisher name, are not supported.
See Ignoring Mac applications on page 1504.
Non-DCM Policies. The Mac agent only supports DCM policies.
See Guidelines for authoring Endpoint policies on page 1348.
Using Endpoint Prevent 1354
About Endpoint Prevent monitoring
Instant messaging applications such as AIM, MSN, and Yahoo Messenger are
monitored. IM monitoring analyzes outgoing messages both on an individual
message basis as well as on a session basis. For example, if a user opens a chat
session with another person through IM, Endpoint Prevent analyzes each message
that the user sends for sensitive information. Each of these messages is analyzed
individually. At the same time, Endpoint Prevent analyzes the entire conversation
for the sensitive information that may not be apparent from the individual messages.
IM messages and files can also be blocked. An IM incident contains information
regarding sender, recipient, and the content of the session.
Note: Some network types do not match on the file name monitoring condition.
These network events do not contain file names and so cannot match on this
condition. The network monitoring types that cannot match the file name condition
include HTTP/HTTPS, IM message body and text, and Outlook message body and
text.
All incidents are reported under the Endpoint Prevent in the Reports section.
See About Endpoint Prevent monitoring on page 1350.
See About monitoring applications on page 1496.
By selecting the CD/DVD device type, you have specified that the policy affects
only files burned to a CD/DVD. Endpoint hard drives and USB connected media
are not affected. By combining the device type and keyword match rules, you
guarantee that DLP Agents block only files with the specified keyword. The agents
do not block all of the files that are sent to the CD/DVD application. If you create
the CD/DVD block rule without the conjoined keyword rule, the policy blocks every
file that is sent to the burning application. Or, it would block the files that contain
the keyword at the endpoint hard drive and USB connected media as well.
Note: Depending on the CD/DVD burning application you use, a file that contains
confidential information is blocked or redacted. The redacted file contains no
sensitive data. If the redacted file is written to the disk, that specific CD or DVD
cannot be reused.
Note: Small files of less than 64 bytes are not detected when read by CD/DVD
monitoring. Files over 64 bytes in size are detected normally.
Note: Endpoint Prevent does not monitor the text in the cover page of a fax.
The incident snapshot contains information regarding which endpoint sent the
violating file, the violating file, and the printer name and the printer type. The printer
Using Endpoint Prevent 1357
About Endpoint Prevent monitoring
type is a locally connected printer, a shared printer, or a network printer, or the user
selected the Print to file option.
See Setting report preferences on page 989.
See About Endpoint Prevent monitoring on page 1350.
If an endpoint user updates content in the files that a cloud application syncs, the
file is uploaded to the cloud service. If a user adds sensitive content, Symantec
Data Loss Prevention prevents the file from moving to the cloud.
This feature also monitors and blocks sensitive files that a user attempts to save
from Microsoft Office 2007 and 2012 applications (Windows Excel, and PowerPoint)
to the OneDrive cloud storage application. You enable this feature using the
Hooking.CLOUD_STORAGE_HOOKING advanced agent setting. See Advanced
agent settings on page 1402.
You must enable a block response rule in the policy. Symantec Data Loss Prevention
then creates a Cloud Storage incident and sensitive content is quarantined on the
endpoint. The endpoint user can restore the previous file version from the configured
recover location where the file is saved indefinitely.
You cannot delete any of the default cloud storage applications that are provided
on the Application Monitoring screen. If you want to monitor a cloud storage
application that is not listed on this screen, you can add it. See Adding an
application on page 1500.
Table 73-2 lists the default cloud storage applications that Symantec Data Loss
Prevention monitors.
Table 73-2 Brand names and binary names of cloud storage applications
Box BoxSync.exe
Dropbox Dropbox.exe
HighTail Hightail.exe
iCloud iCloudDrive.exe
can configure DLP Agent to monitor storage volumes, print and fax requests,
clipboards, and network activity on the virtual desktop.
Endpoint Prevent can monitor virtual desktops hosted by any of the following
virtualization software:
Microsoft Hyper-V virtualization server
Microsoft Remote Desktop Services
VMware View virtualization server
VMware Fusion
Endpoint Prevent can also be used to monitor virtual Windows desktops and
Windows applications that are hosted through Citrix XenDesktop and Citrix
XenApp/Application servers. Symantec supports deploying the DLP Agent software
directly on Citrix XenApp/Application servers or Citrix XenDesktop virtual machines
to prevent clients from extracting confidential data from Citrix published applications
or desktops to the client computer. Symantec Data Loss Prevention provides this
functionality by monitoring volumes, print/fax requests, clipboards, and network
activity on the Citrix server to detect when confidential data is sent to a client
computer. A DLP Agent does not need to be installed on each individual Citrix client
to support this functionality. A single DLP Agent monitors all of the Citrix clients. All
Citrix clients that are protected by the agent monitor need to have a valid Endpoint
Prevent license. The license is required whether a DLP Agent is installed on the
client or not.
Note: All incidents that are generated on Citrix drives by the DLP Agent software
appear as Removable Storage Device incidents. In the Enforce Server administration
console, you cannot deselect the Removable Storage event for Citrix drives because
this event is always monitored by agents that are deployed to Citrix servers.
Note: You can specify whether or not to allow the default action of a timeout to block
the data transfer or allow it.
See Configuring the Endpoint Prevent: User Cancel action on page 908.
See Guidelines for authoring Endpoint policies on page 1348.
2 Create endpoint agent configurations. See About agent configurations on page 1390.
3 Set the endpoint location. This is an optional See Setting the endpoint location on page 1364.
step.
4 Install the Symantec DLP Agent. For installation details, see the appropriate Symantec
Data Loss Prevention Installation Guide.
5 Create an endpoint policy. See About policy creation for Endpoint Prevent
on page 1361.
6 Create endpoint response rules. See Response rules for endpoint detection
on page 856.
This status means that the DLP Agent is disconnected from the Endpoint Server.
The DLP agent may become disconnected ungracefully from the Endpoint
Server. For example, an ungraceful disconnection occurs when the network
interface that connects the agent to the Endpoint Server becomes disconnected.
If the DLP Agent is disconnected ungracefully, Symantec Data Loss Prevention
identifies the endpoint as off the corporate network.
Note: 12.0.x and earlier agents display connection status based on their constant
connection to an Endpoint Server. If they become disconnected from the corporate
network, Disconnected displays on the Summary Reports for 12.0.x and Earlier
Agents screen. See Using the Summary Reports for 12.0.x and Earlier Agents
screen on page 1466.
Using the manual method to determine endpoint location means that you must first
input a range of domain names or IP addresses. Symantec Data Loss Prevention
then uses this information to determine if the endpoint is connected to the corporate
network. If a range of domain names is configured, the DLP Agent performs a
reverse DNS lookup on the host IP address. It then matches the retrieved DNS
host names with the configured domain names in the list. If a range of IP addresses
is configured, the DLP Agent matches the host IP address against the list of
configured IP addresses. Each individual host IP address must be on the corporate
network for the endpoint to be considered connected to the corporate network.
Domain names must not contain wildcard characters and should be simple suffixes;
for example, symantec.com.
IP addresses may contain wildcard characters in place of a single block. For
example, 192.168.*.*.
See About Endpoint Prevent monitoring on page 1350.
To set the Endpoint Location setting
1 Go to System > Agents > Endpoint Location. The current endpoint location
settings are displayed. By default, the endpoint location determination is set
to Automatic.
2 Click Configure.
3 Select an item to configure how the Enforce Server determines endpoint
location.
Select Automatically to let the Endpoint Server determine whether an
agent is on or off the corporate network.
Using Endpoint Prevent 1366
How to implement Endpoint Prevent
Note: You must use automatic endpoint location to identify Mac endpoint
locations. Manual endpoint location is not supported for DLP Agents running
on Mac endpoints.
4 Click Save.
The changes take effect after the agent reconnects to the Endpoint Server.
See How to implement Endpoint Prevent on page 1363.
See Endpoint Serverbasic configuration on page 197.
Note: All English locales default to the English (United States) setting. All French
locales default to the French setting. For example, the French (France) setting
supports all types of French such as French (Canada) and French (France).
See Setting Endpoint Prevent response rules for different locales on page 1367.
The DLP Agent can only perform DCM scans locally for Endpoint Discover. For all
other types of scans, the DLP Agent sends the text of the files to the Endpoint
Server for analysis. Because the agent sends the files to the Endpoint Server, EDM
detection must be done on the Endpoint Server, along with IDM if two-tier detection
is enabled. See Two-tier detection for DLP Agents on page 313.
For example, you set up an Endpoint Discover scan to examine all of the local
drives of all of your endpoints. The policy that is associated with the scan contains
a DCM keyword condition as well as an EDM condition configured to match on
credit card numbers. During the Endpoint Discover scan, the system automatically
analyzes each file on the local drive for the keywords. If a policy matches a keyword,
the content is sent to the Endpoint Server for EDM analysis.
To start or stop a scan that is configured for a single Endpoint Server, the DLP
Agent must be connected to the Endpoint Server. If the DLP Agent is not connected
to the Endpoint Server, the scan starts when it reconnects to the Endpoint Server.
A scan is only complete when all of the endpoints have completed the scan. If one
endpoint is disconnected from the Endpoint Server, the scan cannot complete until
that endpoint reconnects or the scan times out. If an endpoint is disconnected after
a scan has started, the endpoint continues the scan after it reconnects to the
Endpoint Server. If the endpoint remains disconnected and exceeds a configured
timeout period, the scan reports a timeout status.
An Endpoint Discover scan can be configured to include multiple Endpoint Servers.
This feature lets you create one Endpoint Discover scan that includes a primary
Endpoint Server and any backup Endpoint Servers that might be configured. Scans
that include backup Endpoint Servers allow DLP Agents to be scanned if they
connect to a backup Endpoint Server during an active scan. The ability to scan a
DLP Agent when it connects to a backup Endpoint Server improves the ability of a
scan to successfully complete. It also improves the performance of Endpoint
Discover in a load-balanced environment.
All incidents are stored in the Agent Store until the computer is reconnected to the
Endpoint Server. If the Agent Store exceeds the specified size limit, the scan waits
until the Agent Store size is reduced. The scan waits until the endpoint reconnects
to the Endpoint Server and the Agent Store is cleared.
See About the DLP Agent store on page 1400.
By default, the DLP Agent scans most of the files on the endpoint while the computer
is active. Any file that requires a large amount of bandwidth to scan is not scanned
until the endpoint is idle. By waiting until the endpoint is idle, the DLP Agent uses
less CPU bandwidth while users are active on the computer. You can configure
how the DLP Agent defines the endpoint as idle. You can configure the DLP Agent
so that it does not scan the endpoint at all while the computer is active.
Using Endpoint Discover 1370
Preparing to set up Endpoint Discover
Note: DLP Agents running on Mac endpoints do not use CPU bandwidth
management.
Note: You cannot create Endpoint Discover scans that target Mac endpoints.
However, you can create exclusion filters to scan specific files and locations on
Mac endpoints. See Using filters to scan Windows and Mac operating systems
on page 1384.
If a DLP Agent is excluded from the scan it sends a Not participating status to the
Endpoint Server.
There can be only one Endpoint Discover scan running on an Endpoint Server at
a time. If you exclude DLP Agents based on the scan filters, those DLP Agents
cannot be scanned until the first scan is complete.
See Creating an Endpoint Discover scan on page 1374.
Note: Endpoint quarantine is not available for DLP Agents running on Mac endpoints.
Endpoint quarantine response rules are only applicable to Endpoint Discover running
scans on Windows endpoints.
The quarantine location can be either a secured folder on the local drive or a folder
on a remote file share that is accessible by the endpoint through the corporate
network. You can choose if you want to enable credentials on the secure location
or allow any anonymous user to access the location.
Note: Encrypting File Service (EFS) folders cannot support anonymous access.
Not all policy groups and policies are applicable with Endpoint response rules. If
you try to create a policy with incompatible rules and responses, you receive an
error message. The error states that the policy is incompatible with the Endpoint
response rules.
See Guidelines for authoring Endpoint policies on page 1348.
See How to implement Endpoint Prevent on page 1363.
See Configuring the Endpoint Discover: Quarantine File action on page 899.
Using Endpoint Discover 1374
Setting up and configuring Endpoint Discover
Step 2 Install the Symantec DLP Agent. For installation details, see the appropriate
Symantec Data Loss Prevention Installation
Guide.
Table 74-3 Steps to configure scan settings for an Endpoint Discover scan target
Table 74-3 Steps to configure scan settings for an Endpoint Discover scan target
(continued)
2 Add location, date, and file type filters to the See About Endpoint Discover
Endpoint Discover target. You enter this target filters on page 1377.
information on the Filter tab on the Manage >
Discover Scanning > Discover Targets screen.
3 Configure the scan idle timeout and max scan See Configuring Endpoint
duration settings. You set this information on the Discover scan timeout
Advanced tab on the Manage > Discover settings on page 1385.
Scanning > Discover Targets screen .
Note: You cannot schedule Endpoint Discover targeted scans. Each scan must be
started manually. You must also manually stop the scan, allow it to complete, or
allow it to timeout. You cannot pause an Endpoint Discover scan.
Policy Group Select the Endpoint Discover policy group you created.
If no other policy group has been selected, the Default Policy group
is used. You can assign multiple policy groups to a target.
Servers Select the Endpoint Server (or multiple Endpoint Servers) where
you want to allow the scan to run.
Note: Each time there are policy changes, the Enforce Server sends data to all
Endpoint Servers associated with the Endpoint Discover scan, which potentially
creates bandwidth issues.
Note: You cannot use exclude and include filters to target specific Mac endpoints.
See Using filters to scan Windows and Mac operating systems on page 1384.
Use the Include Filters field to specify the items that Symantec Data Loss
Prevention should process. If you leave the Include Filters field empty, Symantec
Data Loss Prevention performs matching on all items in the selected target. If you
enter any values in the field, Symantec Data Loss Prevention scans only those
items that match your filter.
Use the Exclude Filters field to specify the items that Symantec Data Loss
Prevention should not process. If you leave the Exclude Filters field empty,
Symantec Data Loss Prevention performs matching on all items in the selected
target. If you enter any values in the field, Symantec Data Loss Prevention scans
only those items that do not match your filter.
Table 74-4 lists the items you can include or exclude by using filters.
Files You can enter file extensions in the Include Filters and Exclude
Filters to include or exclude file types, respectively.
File folders You can enter folder names in the Include Filters and Exclude
Filters to include or exclude folders, respectively.
Computer names You can enter the host name, FQDN name, or NetBIOS name. You
can use the wildcard (*) character.
WINS names You can enter a WINS name to include or exclude endpoints.
Table 74-5 table lists the syntax you can use when you add filters.
Using Endpoint Discover 1379
Creating an Endpoint Discover scan
Table 74-5 Syntax for the include filters and exclude filters
Syntax Description
A *.* pattern added at the end of the path has the same behavior
as a *. For instance a filter like C:\ep_test\data\edar* or
C:\ep_test\data\edar*.* have the same meaning.
? (question mark) Use this wildcard to match one character in the place where it
appears.
The forward slash (/) These characters are equivalent. They usually represent directory
and backslash (\) separators, although on Linux and Mac the backslash is a valid
characters character in a file name.
Escape characters The matching process does not support escape characters, so
there is no way to match a question mark, a comma, or an asterisk
explicitly. In general, special characters in filter items are not
supported.
$Windows$/*,/Applications/*,/System/*,/.Spotlight*,*.mp3,*.wma,*.wav,
*.vox,*.aac,*.3gp,*.dat,*.avi,*.mpeg,*.wmv,*.mov,*.mp4,*.dylib,*.jar,*.dll,*.exe,
$ProgramFiles$/*,/opt/*,/sbin/*,/bin/*,/usr/bin/*
Note: You can configure what filters display in the Exclude Filters field by
updating the VontuManager file located here on the Enforce Server host.
The listed filters apply to both Mac and Windows endpoints. Filters display in
English only.
4 Enter file names or paths in the Include Filters field and the Exclude Filters
field to select a subset of items that Symantec Data Loss Prevention should
process. Delimit entries with a comma, but no spaces. The path filter is
case-sensitive.
Use * (asterisk) at the end of a path to include or exclude all content in the
specified folder. For example, if you enter C:/Users/*, /Users/* in the
Include Filter field, all contents in the C:Users folder on Windows endpoints
and the /Users/ folder on Mac endpoints are scanned.
When both include filters and exclude filters are present, exclude filters take
precedence.
The include filter and exclude filter file names are relative to the file system
root. Specify full paths or subdirectories, as needed. Some wildcards are
allowed.
5 Click Save.
See Creating an Endpoint Discover scan on page 1374.
See Using include and exclude filters on page 1377.
Using Endpoint Discover 1381
Creating an Endpoint Discover scan
Note: Environment variables are not supported on DLP Agents running on Mac
endpoints. See Using filters to scan Windows and Mac operating systems
on page 1384.
Table 74-6 lists the environment variable types you can use.
Operating system % You use this variable type to scan paths specific to the endpoint operating system.
defined variable For example, you would use %TEMP% to scan the TEMP folder on all targeted
endpoints.
Symantec Data Loss $ You use this variable to scan all user profile paths on a single endpoint. For
Prevention defined example, you would use $Documents$\* to scan the Documents folder in all
variable user profiles present on the targeted endpoints.
Variables that include or exclude user profile paths (whether Symantec Data Loss
Prevention or operating system defined) are resolved to all the user profiles present
on the endpoint. For example, if two user profiles exist on an endpoint, and you
specify $Documents$\* in the include filter, Symantec Data Loss Prevention scans
C:\Users\User1\Documents\ and C:\Users\User2\Documents.
Table 74-7 lists the Symantec Data Loss Prevention defined variables.
$CommonTemplates$ %ALLUSERSPROFILE%\Microsoft\Windows\Templates
$Cookies$ %APPDATA%\Microsoft\Windows\Cookies
$Desktop$ %USERPROFILE%\Desktop
$Documents$ %USERPROFILE%\Documents
$Favorites$ %USERPROFILE%\Favorites
$Fonts$ %WINDIR%\Fonts
$History$ %LOCALAPPDATA%\Microsoft\Windows\History
$LocalizedResourcesDir$ %WINDIR%\Resources\0409
$Music$ %USERPROFILE%\Music
$Pictures$ %USERPROFILE%\Pictures
$PublicDesktop$ %PUBLIC%\Desktop
$PublicDocuments$ %PUBLIC%\Documents
$PublicDownloads$ %PUBLIC%\Downloads
$PublicGameTasks$ %ALLUSERSPROFILE%\Microsoft\Windows\GameExplorer
$PublicMusic$ %PUBLIC%\Music
$PublicPictures$ %PUBLIC%\Pictures
$PublicVideos$ %PUBLIC%\Videos
$Recent$ %APPDATA%\Microsoft\Windows\Recent
$ResourceDir$ %WINDIR%\Resources
$RoamingAppData$ %USERPROFILE%\AppData\Roaming
$SendTo$ %APPDATA%\Microsoft\Windows\SendTo
$System$ %WINDIR%\system32
$SystemX86$ %WINDIR%\system32
$Templates$ %APPDATA%\Microsoft\Windows\Templates
$UserProfiles$ %SystemDrive%\Users
$Videos$ %USERPROFILE%\Videos
$Windows$ %WINDIR%
Scan all endpoints >192.64.110.0/24 None The endpoint is The endpoint is not
with the IP range scanned if it matches scanned.
192.64.110.0/24. the IP filter, otherwise
it is not scanned.
Scan endpoints in the >*.company.com >*.test.company.com The endpoint is The endpoint is not
*.company.com scanned if it is in the scanned.
domain, and exclude test.company.com
computers in domain. Endpoints in
*.test.company.com the .test.company.com
domain. domain are not
scanned.
Scan all endpoints None >L_CMP* All endpoints are All endpoints are
other than those scanned except for scanned.
starting with L_CMP*. those with names that
start with L_CMP.
Scan *.txt and >10.216.122.22,*.txt,*.doc None Scans *.txt and The endpoint is not
*.doc files on IP *.doc files if the IP scanned.
address address is
10.216.122.22. 10.216.122.22. All
other endpoints are
not scanned.
Note: To disable Scan Idle Timeout, select Indefinite for the duration of time.
Note: To disable Max Scan Duration, select Indefinite for the duration of time.
Incidents - All
Incidents - New
Policy Summary
Status Summary
Highest Offenders
If an incident is created that includes user justifications, those justifications are
included in the report in the Incident snapshot section. For example, if a violation
occurs that requires the user to enter the response User error, the incident report
includes the text SPECIAL: User typed response: "User error".
If the user selects a pre-generated justification, the justification appears in the report.
Justifications appear in the detailed report under the header Justifications.
Justifications and notifications are not compatible with Endpoint Discover, therefore
no justifications appear in Endpoint Discover reports.
You can also create customized reports for Endpoint Discover and Prevent.
However, if the user is not on the network at the time the justification is entered,
the justification section of the incident snapshot remains empty.
See About Symantec Data Loss Prevention reports on page 987.
See How to implement Endpoint Prevent on page 1363.
See Setting up and configuring Endpoint Discover on page 1374.
Chapter 75
Working with agent
configurations
This chapter includes the following topics:
Tab Description
Agent Monitoring Use this tab to select which aspects of the endpoint items
you want to monitor.
Agent Configuration Use this tab to set server communication settings, agent
monitoring resources, and the file recovery location.
Tab Description
Advanced Agent Settings You can also specify advanced settings for the agents. These
settings affect how the Symantec DLP Agents process
information, detect violations, and perform on endpoints.
Note: Contact Symantec Support before changing any of
the advanced settings.
Note: If you modify an existing agent configuration, clicking the Save button applies
the changes to all of the agent groups associated with the configuration. If you
create a new configuration, the configuration is saved and you can apply it on the
Agent Groups screen.
Field Description
Disable settings
You can use the Disable section to prevent endpoint users from printing. You enable
this feature by selecting Print Screen. Selecting this feature also disables the Print
screen function when endpoint users attempt to copy their screens using the Print
Screen key or when they hit the [Shift + Print Screen] key combination.
Enabling Print Screen applies to Window 7 and 8 endpoints but not endpoints
running in virtual environments.
destination, file size, file type, or file path. Existing filters are listed in this section.
The filters run in the order they appear in the list as determined by the Order column.
Note: The DLP Agent installed on Mac endpoints does not filter using a file signature
match for all file types. Instead, the agent uses the file extension to apply file type
filters.
If you plan to monitor HTTPS traffic for Google Chrome and you want to use filters,
you must also enable the Paste channel.
When you filter by file path, the drive letter is ignored and the specified path for
every local drive on the agent is filtered. For example, entering c:\temp causes
c:\temp and d:\temp to be filtered on an agent with two local drives.
CD/DVD
Local Drive
HTTP/HTTPS Attachment
IM File transfer
FTP transfer
Cloud Storage
The Application File Access option lets you monitor any applications that appear
on the Application Monitoring page.
See About monitoring applications on page 1496.
The File Attributes section is where you specify the filters that you want to apply.
Information you enter in this section applies to local drive and application file access
monitoring. Select Local Drive or Application File Access to edit the File Path
on Destination field.
You can specify the following filter attributes:
Size
You can specify a minimum, maximum, or baseline size of the files you want to
scan.
Type
Specify the exact file types that you want to filter. This section is pre-loaded with
common file types. If you specify any additional file types, enter each file type
on a separate line.
File Path on Destination
Working with agent configurations 1396
Adding and editing agent configurations
Specify the file-system path(s) to analyze. Enter one path per line. If you specify
any paths to include, Symantec Data Loss Prevention monitors only files in
those paths. If you leave this field blank, Symantec Data Loss Prevention
monitors all files except the files that you may have specified elsewhere. This
filter applies to local drive monitoring, cloud storage application monitoring, and
application file access. You can use environment variables to include or exclude
file locations regardless of the user profile or platform of the endpoint. For
example, if you enter:
%TEMP%
$PublicDownloads$
Symantec Data Loss Prevention scans the Downloads folder on all user profiles
and the Temp folder.
See Using environment variables in Endpoint Discover scans on page 1381.
Endpoint monitor filters always run in the order that they appear. If you want to
rearrange the run order of the filters, contact Symantec Support. Rearranging the
endpoint monitor filter order may cause agents to stop monitoring sensitive
information.
See About agent configurations on page 1390.
ip_protocol_filter := protocol_filter_multiple_entries [; *]
protocol_filter_multiple_entries := protocol_filter_entry
[; protocol_filter_multiple_entries]
protocol_filter_entry := +|-, destination_subnet_description,
destination_subnet_description source_subnet_description
source_subnet_description := subnet_description
subnet_description := subnet_description
:= network_ip_address / bitmask
| *
Working with agent configurations 1397
Adding and editing agent configurations
Note: Separate each entry with a comma to correctly monitor or ignore specified
items.
Each stream is evaluated in order against the filter entries until an entry matches
the IP parameters of the stream.
A minus sign (-) at the start of the entry indicates that the stream is dropped. A plus
sign (+) at the start of the entry indicates that the stream is kept.
A subnet network description of * means that any packet matches this entry.
A subnet bitmask size of 32 means that the entry must match the exact network
address. For example, a filter of +,10.67.0.0/16,*;-,*,* matches all streams going to
network 10.67.x.x but does not match any other traffic.
Note: The more specific you are when you define the recognition characteristics,
the more specific your results. For example, if you define only one specific IP
address, only incidents involved that IP address are captured. If you do not define
any IP addresses, or if you define a wide range of IP addresses, you achieve broader
results. Include at least one plus sign (+) clause and one minus sign (-) clause to
be explicit about what is included and what is excluded.
The Domain filters need to be applied separately for HTTP and HTTPS. To add
filters for any website that supports HTTP and HTTPS, add individual filters for
HTTP and HTTPS in the respective text boxes. The IP address filter works with all
other network protocols.
For filtering HTTP/HTTPS domain names, use the following rules:
Working with agent configurations 1398
Adding and editing agent configurations
You can use filters to include (inspect) or exclude (ignore) messages from specific senders.
You can also use filters to include or exclude specific recipients. The specific filter syntax
depends on the protocol.
You can use the wildcard symbol (*) in the domain entry.
For example, *symantec.com would match www.symantec.com, www.dlp.symantec
.com, and all domains that end with symantec.com.
A minus sign (-) at the start of the entry indicates that the URL is ignored.
A plus sign (+) at the start of the entry indicates that the URL is inspected.
If you add an asterisk (*) to the end of the filter expression, any URL domain not explicitly
matching any of the filter masks is ignored.
These filters are executed is from left to right until the first match occurs or the agent reaches
the end of the filter entries.
-sales.symantec.com,+*symantec.com,*
HTTP requests to sales.symantec.com are ignored, and all of the requests that are sent to
any other symantec.com domain are inspected. The last asterisk in the filter filters out all
other domains like www.xyz.com.
Note: If you leave the HTTP/HTTPS filter empty, all the URLs are inspected.
The filters that you specify with this screen only apply to the individual Endpoint
Server where these filters are configured. If you have more than one Endpoint
Server, you must individually configure the file filters for each server.
From Agent Maximum rate at which the DLP Agent uploads Throttle setting
Thottle incidents, status, events to the Endpoint Server. applies to all DLP
Agent versions.
To Agent Thottle Maximum rate at which the DLP Agent Throttle setting only
downloads policy and agent configuration applies to 12.5 and
updates from the Endpoint Server. later DLP Agent
versions.
Field Description
% of Total Disk Space limit For percentage enter the amount in the corresponding box.
The default percentage is 5% of total disk space.
Absolute disk space size limit Select the radio button for this option, enter the particular
size in the field, and choose the unit of measurement from
the drop-down list (Bytes, KB, MB, or GB).
Working with agent configurations 1400
Adding and editing agent configurations
Note: The long-term average CPU usage and minimum battery life remaining
features are not currently supported for agents running on Mac endpoints.
Field Description
Alternatively, you can set an absolute storage limit. The Agent Store Size limit
applies to all data stored on the endpoint host, including data stored in the agent
database and data stored on the host file system
If the Agent Store Size limit is exceeded, the DLP Agent deletes data from the
endpoint host according to a set priority until the Agent Store Size limit is no longer
exceeded. If the DLP Agent must delete incidents, the order of eviction is as follows:
1) Two-tier detection request data (oldest first)
2) Endpoint Discover incidents (oldest first)
3) Endpoint Prevent incidents (oldest first)
See Adding and editing agent configurations on page 1391.
Note: Files recovered from cloud sync application incidents are not removed from
the endpoint.
Field Description
File Recovery Area Location Specify the path to the file recovery
directory. The default is
%USERPROFILE%\My Recovered
Files on Windows endpoints.
Note: If you change advanced agent settings and the agents connect to Endpoint
Servers in a load-balanced environment, you must apply the same changes to all
Endpoint Servers in the load-balanced environment.
FileSystem.ENABLE_VEP_FILE_ELIMINATION.int 3
Working with agent configurations 1416
Adding and editing agent configurations
USB
Secure Digital
FireWire
It is enabled by default.
Note: The setting you enter should be 5 minutes greater than the agent polling
interval (ServerCommunicator.CONNECT_POLLING_INTERVAL_SECONDS.int).
See Advanced agent settings on page 1402.
Changing groups
With Agent Groups, attributes of logged-in users and endpoint computers can be
used to create group conditions. Symantec Data Loss Prevention provides six
predefined attributes. You can create other user-defined attributes based on Active
Directory attributes. For example, you can create a group condition based on a
location attribute, such as all users (agents) located in New York, and a department
attribute, such all users who are part of the Human Resources department. For that
group you can deploy a configuration in which removable storage is monitored. In
this example, the Agent Group definition has two conditions: location(s) and
department name(s).
Agent groups simplify the management of agent configuration exceptions by allowing
a logical grouping of endpoint agents based on conditions. For example, if you have
Instant Messenger monitoring enabled for US employees, except for those US
employees in the state of Texas, you can have a group named "United States
Texas," and disable IM monitoring for that group. Every new agent that is added in
the "United States Texas" group automatically gets a configuration with IM monitoring
disabled.
You can roll out configuration changes in stages using Agent Groups. In addition,
you can create groups for exceptions to monitor particular computers or sets of
computers differently. For example, you can create an Executive Staff group for
cases when the executive staff is not subject to configurations that apply to the rest
of the organization
The ability to change an agent group action is useful when you need to troubleshoot
problems in Symantec Data Loss Prevention. For example, you can create a
temporary group that disables certain monitoring and configurations for employees
(printing with a specific application, for example) to get around a security issue,
then change the employees back to the old group when the printing problem is
resolved
See Developing a strategy for deploying Agent Groups on page 1436.
Step 5 Create the groups you want See Creating a new agent
using the defined attributes. group on page 1445.
Note: Default Groups are available for freshly installed Symantec Data Loss
Prevention endpoints as well, but an administrator can create a new group for the
Endpoint Server.
For example, an administrator can add a new Endpoint Server for the Asia - Pacific
- Japan region. Since this is a new deployment, and the configuration management
strategy is not yet decided, the administrator is not ready to create various agent
groups for APJ region. In this case, the administrator can create an endpoint group
for the newly added Endpoint Server and assign one configuration that is specific
to the APJ region. This enables the administrator to have one unique configuration
for all endpoints from the APJ region that are connected to the newly added Endpoint
Server for APJ region. Specific groups addressing business needs for this region
can be defined later.
See Creating and managing agent attributes on page 1438.
Agent Groups are defined using agent attributes. On the Agent Attributes screen,
you can see a list of predefined and user-defined attributes. Notice that if the list
contains only predefined attributes, the Export, Apply Changes, and Undo
Changes buttons are not disabled; these actions can only be taken on user-defined
attributes.
From this screen you can use the buttons to
Create new attributes - See Creating a new agent attribute on page 1440.
Export attributes - See Verifying attribute queries with the Attribute Query
Resolver tool on page 1441.
Apply attribute changes. Note that attribute's values are not fetched from Active
Directory until you click Apply - See Applying a new attribute or changed
attribute to agents on page 1442.
Undo attributes changes - See Undoing changes to agent attributes on page 1443.
Use the Filters button to filter the list of attributes by any of the headings.
There are two types of agent attributes, predefined and user-defined. Predefined
attributes cannot be deleted or modified. Symantec Data Loss Prevention provides
six predefined attributes:
Attribute Definition
User-defined attributes are created by the administrator for the purpose of creating
groups. You can create user-defined attributes based on Active Directory (AD)
attributes. User-defined attributes can be deleted or modified.
Working with Agent Groups 1440
Creating and managing agent attributes
Note: User-defined attributes are not supported for computers running Mac OS.
6. Add a search filter. You can select from existing applied attributes to define a
search filter.
See Defining a search filter for creating user-defined attributes on page 1441.
7. Specify an Active Directory attribute.
Only Active Directory attributes are supported for user-defined agent group
attributes.
8. Click Save. Clicking Save saves your attribute but does not apply it.
9. Test the attribute and fix any issues you find in testing.
To test, export the attribute(s) from the Attribute List screen and review the
attribute.
Working with Agent Groups 1441
Creating and managing agent attributes
Then, use the Attribute Query Resolver test tool that runs on the Windows host
where the endpoint is installed, to test the attribute.
See Verifying attribute queries with the Attribute Query Resolver tool
on page 1441.
10. Apply the tested attributes. Agents start reporting attribute values as soon as
the agents resolves the attributes on Active Directory.
11. Verify that agents are reporting attribute values. Go to the System > Agents
> Overview > Agent List screen and verify that the agents are reporting
attribute values. You can select a particular agent entry and see the Preview
Pane. The Preview Pane lists all predefined and user-defined attributes and
their values, conflicts, and alerts.
See Using the Agent List screen on page 1452.
See Defining a search filter for creating user-defined attributes on page 1441.
(objectClass=User)(uid=$LoggedinUser$))
The value embedded in dollar ($ $) signs represents the agent attribute that you
can choose when you click the Select from existing attributes drop down on the
Configure Agent Attribute screen.
See Verifying attribute queries with the Attribute Query Resolver tool on page 1441.
Note: Attribute Query Resolver tool only fetches the attributes of the currently logged
in user.
Working with Agent Groups 1442
Creating and managing agent attributes
Next, use this XML file to test your attributes with the Attribute Query Resolver tool.
3. Attributes with errors display in the output with blank values. For example, if
the attribute User Email had an error, it displays as User Email= with no
value. Errors can occur if a user provides an incorrect search filter, if a specified
attribute does not exist in Active Directory, or if Active Directory is not reachable.
You can go to the AttributeQueryResolver.log log file to view details for
the attribute errors. In this attribute error log, files with no errors display an
Error code : 0 (no errors). Attributes with errors display an error code and
error description. For example, the User Email attribute with a blank attribute
in the output (indicating an error) displays an error message that reads:
2014-01-21 20:41:48 | AttributeQueryResolver | SEVERE | Attribute
: User Email Error code: -2147463161 Error description :
E_ADS_PROPERTY_INVALID
If you provide an invalid XML file as a parameter to the Attribute Query Resolver
tool, or if you do not have appropriate rights to run the tool, the following SEVERE
error is logged:
AttributeQueryResolver | SEVERE | Query store is not open.
If the attribute definitions are correct, you can deploy the attributes to agents. If
there are errors, edit the attributes reporting errors, export the attributes, and run
them through the Attribute Query Resolver tool. Repeat this process until there are
no errors.
See Applying a new attribute or changed attribute to agents on page 1442.
2. Verify the changes that appear on the Apply Changes pop-up and click Apply
Changes. If you see any discrepancies, click Cancel and go back to previous
screens to correct your errors.
3. Review the updated Agent Attributes screen. The Status of your recently
applied agent attributes should now read Up-to-date.
See Undoing changes to agent attributes on page 1443.
Note: If an agent is offline, it does not receive an updated configuration until the
agent comes online again.
5. When the Agent Groups page refreshes, the Assigned Configuration names
are displayed for the groups.
See Updating outdated agent configurations on page 1446.
versa), the conflict cannot be resolved and the agents with conflicts are placed in
a warning state and continue to belong to whatever group they belonged to before
the conflict arose. For these more complex conflicts, Symantec Data Loss Prevention
reports conflicts and you must edit the group definitions to resolve the group conflicts.
See Changing groups on page 1448.
Changing groups
You can change groups for agents to have a different configuration on the System
> Agents > Overview > View All Groups page. The ability to change an agent
configuration from one group to another is useful in many situations, especially
when you need to troubleshoot a problem with Symantec Data Loss Prevention.
For example, say that your employees in the group Trading Group Texas have
problems printing with the stock trading application. This issue causes a major
problem for your business, as traders are not able to work without the ability to print.
You can move the agents in Trading Group Texas to a temporary group, called
Troubleshoot Trading Group, with print monitoring disabled, until you can
troubleshoot the agent endpoints and fix the issue. After the problem is solved, you
can change the group back to Trading Group Texas to enable print monitoring.
To change groups for agent configurations:
1. Click the checkboxes for the agent entries that you want to move.
2. Click Change Group.
3. Choose a new group from the System > Agents > Agent List > Agent Group
menu.
4. Click OK.
See About Symantec DLP Agent administration on page 1449.
Chapter 77
Managing Symantec DLP
Agents
This chapter includes the following topics:
by status and then they are categorized by alert type. Alert types with the highest
number of affected agents are listed first and alert types with the fewest number of
affected agents are listed last.
An OK status indicates that the DLP Agents in this state are operating under normal conditions. This
status indicates:
Services and the file-system drivers for the DLP Agent are running
OK The DLP Agent cache is created and available
The DLP Agent is reporting to the Endpoint Server as expected
Managing Symantec DLP Agents 1451
About Symantec DLP Agent administration
A Warning status indicates that the DLP Agents in this state have experienced conditions which
may require attention.
A Critical status indicates that the DLP Agents in this state have experienced conditions that require
immediate attention:
The Agent Overview screen lets you quickly access agent summary reports, agent
configurations, and agent groups.
Section Description
Agent Summary Reports Agent summary reports let you summarize agent information and create reports.
See Using the Summary Reports for 12.0.x and Earlier Agents screen on page 1466.
Agent Configurations You can configure agent settings on the Agent Configurations screen.
Section Description
Agent Groups You can view existing agent groups and resolve agent group conflicts.
See About agent groups on page 1435.
Note: Use the Filters feature to execute or remove filters you select. See Agent
filtering on page 1458.
Managing Symantec DLP Agents 1453
About Symantec DLP Agent administration
Enable
Enables the disabled agents.
Enabled agents automatically reconnect with the
Endpoint Server and obtain the most current policies.
Enabling an agent enables monitoring on that endpoint.
Enabled agents can log events on the Endpoint Server.
Disable
Stops monitoring and any active scans on agents.
Set Log Level
Sets the logging level for the specified agent. Symantec
Technical Support uses agent logs for troubleshooting
purposes.
Note: It is recommended to contact Symantec
Technical Support before you change the log level for
an agent.
See About Endpoint Agent logs on page 1494.
Reset Log Level
Resets the logging level for the specified agent to the
default INFO level. Symantec Technical Support uses
agent logs for troubleshooting purposes.
See About Endpoint Agent logs on page 1494.
Set Under Investigation
Set if you believe there is some sort of issue with the
agent. You can set this status regardless of whether
the agent is running, disabled, or shut down. An
additional icon, a flag, appears next to the main status
icon of the agent.
Remove Under Investigation
Removes the Set Under Investigation status from the
selected agents.
Change Server Lets you change the Endpoint Server to which the agent
connects.
Change Group Lets you assign the selected agent to an agent group that
you select.
Pull Logs Lets you pull agent logs and operational logs for the agent.
You can pull either the agent logs, or the operational logs,
or both sets of logs.
When the logs are pulled from the endpoint, they are stored
on the Endpoint Server in an unencrypted format. After
you collect the logs from the Endpoint Server, the logs are
deleted from the Endpoint Server and are stored only on
the Enforce Server. You can only collect logs from one
endpoint at a time.
Section Description
OK
Indicates the agent service and file-system driver are running, that the
cache is created and available, and that the connection functions as
expected.
Warning
Indicates the agent may need attention. For example, Symantec Data
Loss Prevention assigns this status when the endpoint data share nears
its storage limit.
Critical
Indicates that the agent is experiencing transitory connection problems.
The agent may have been down for a period of time. Policy and
configuration may be out of date. The agent may not be compatible with
the Enforce Server.
Investigating
Indicates that the agent in question is under investigation. Agents may
be under investigation for a number of reasons. These reasons include
sending too many false positive incidents, and being unable to connect
to the Endpoint Server.
Not Investigating
You select this item to remove an agent from investigation.
Log Level Changed
Indicates that the log level for the agent has been changed or reset.
See About Endpoint Agent logs on page 1494.
Default Log Level
You select this item to change the log level.
See About Endpoint Agent logs on page 1494.
Alerts Displays the number of Warning and Critical alerts that occur on an agent.
To see a list of alerts for a particular agent, click on the relevant agent entry
to display the Events screen.
Section Description
Unknown
Agents with unknown status.
Reporting
DLP Agents that are currently connected to the corporate network.
Not Reporting
DLP Agents that are not currently connected to the corporate network.
Last Update Displays the date and time on the Enforce Server when the agent was last
Time updated.
Agent filtering
You can filter what agents display on the Agent List screen by clicking Filters.
After you are done selecting filter criteria, click the check box.
Note: You filter 12.0.x and earlier agents on the Summary Reports for 12.0.x and
Earlier Agents screen. See Using the Summary Reports for 12.0.x and Earlier
Agents screen on page 1466.
Click a column header to sort entries alpha-numerically. Click the column header
a second time to sort in reverse order. By default, Symantec Data Loss Prevention
lists agents by the endpoint name. Select items in the column headers to only
display agents containing the selected data.
You can filter the agents that display by a number of criteria including agent
configuration, server name, and agent IP address. Additionally, you can filter the
agent events by specific sets of criteria relating to the Symantec DLP Agent.
Summarizing and filtering the agents lets you view agents by specific criteria, and
in the order that you want. For example, you can display the agents that have the
Default Configuration associated and then display the agents that were updated
in the last 7 days. You can click a column to the agents by the date they were last
updated.
Note: Click Select all to select all agents that meet the filter criteria regardless of
what agents currently display on the grid. This selection is useful when agents flow
across more than one page. Click the box at the top left of the grid to select all
agents that display on the grid.
You can filter the agents that display in the grid by using the following items:
Alert Category Lets you filter on each of the agent alert categories.
Machine Name Enter the name of an endpoint you want to display. The
alphanumeric value you enter displays all endpoints that
contain the value string. For example, to display endpoints
with 123 anywhere in the name, enter 123.
Agent Group Select an agent group to display all the agents that are
contained in the group.
Managing Symantec DLP Agents 1459
About Symantec DLP Agent administration
Last Update Time Select an update time. This value represents the last time the
Enforce Server received data from agent.
Endpoint Server Click the Endpoint Server name to display the agent associated
with that server. You can also select Deleted to display agents
currently reporting to deleted Endpoint Servers.
Note: You complete agent management tasks on the Agent List screen. See Using
the Agent List screen on page 1452.
You can select which DLP Agents display in a report by filtering the agent events
by specific sets of criteria. For example, you can summarize the agents by the
associated agent configuration and then filter those configurations by the most
recently updated agents.
You can generate a filtered report by specifying a number of criteria, including agent
configuration, server name, and agent IP address. Summary reports take their
name from the summary criterion. If you rerun a report with new criteria, the report
name changes accordingly.
Managing Symantec DLP Agents 1460
About Symantec DLP Agent administration
4 Click Add filter if you want to add additional filters. Table 77-6 lists advanced
filters.
5 Click Apply to generate the report using the specified filters.
6 Click Save > Save As to save the report you created.
7 Click Send to email the report.
8 Click Export > All: CSV to download a CSV file of the report.
Managing Symantec DLP Agents 1461
About Symantec DLP Agent administration
Agent IP Contains Ignore Case Agent IP: Enter the IP address you
Does Not Contain want to filter.
Ignore Case
Matches Exactly
Does Not Match
Exactly
Matches Exactly
Ignore Case
Starts With
Ends with
Managing Symantec DLP Agents 1462
About Symantec DLP Agent administration
Agent Version Contains Ignore Case Agent Version: Enter the DLP Agent
Does Not Contain version number which you want
Ignore Case filtered.
Matches Exactly
Does Not Match
Exactly
Matches Exactly
Ignore Case
Starts With
Ends With
Machine Name Contains Ignore Case Machine name: Enter the computer
Does Not Contain name that you want to use as a filter.
Ignore Case
Matches Exactly
Does Not Match
Exactly
Matches Exactly
Ignore Case
Starts with
End with
Summary reports take their name from the summary criterion. If you rerun a report
with new criteria, the report name changes accordingly.
Table 77-7describes the columns that display in the summary report you create.
Item Description
Unknown/delete
Configuration: The
number of agents that are
running an unknown
version of the agent
configuration.
Managing Symantec DLP Agents 1468
About Symantec DLP Agent administration
Table 77-8 Advanced filters for DLP Agent summary reports (continued)
Agent Version Contains Ignore Case Version: Enter the DLP Agent
Does Not Contain Ignore version number which you
Case want filtered.
Matches Exactly
Does Not Match Exactly
Matches Exactly Ignore
Case
Starts With
Ends With
Managing Symantec DLP Agents 1469
About Symantec DLP Agent administration
Table 77-8 Advanced filters for DLP Agent summary reports (continued)
AD User Group
Resolution
Agent Configuration
Change Status
Agent Group Attribute
Discovery Status
Agent Group Change
Status
Agent Group Conflict
Status
Agent Logger Status
Agent Monitoring Status
Agent Service Status
Agent Store
Agent Troubleshooting
Status
AIM Plugin Status
Configuration Update
Connection Status
Crash Dump Status
Detection
File System Driver
Firefox Plugin Status
Lotus Notes Plugin
Status
Outlook Plugin Status
Software Compatibility
Software Update
Managing Symantec DLP Agents 1470
About Symantec DLP Agent administration
Table 77-8 Advanced filters for DLP Agent summary reports (continued)
Investigating
Not Investigating
Managing Symantec DLP Agents 1471
About Symantec DLP Agent administration
Table 77-8 Advanced filters for DLP Agent summary reports (continued)
Today
Yesterday
Current Week to Date
Current Month to Date
Current Quarter to Date
Current Year to Date
Last 7 Days
Last 30 Days
Last Week
Last Month
Last Quarter
Last Year
Custom: Select a date
range to filter DLP Agents
which have not connected
to the Endpoint Prevent
Server during the
specified date range.
Custom Since: Select a
date to filter DLP Agents
which have not connected
to the Endpoint Prevent
Server after the specified
date.
Custom Before: Select a
date to filter DLP Agents
which last connected to
the Endpoint Prevent
Server before the
specified date.
Managing Symantec DLP Agents 1472
About Symantec DLP Agent administration
Table 77-8 Advanced filters for DLP Agent summary reports (continued)
Table 77-8 Advanced filters for DLP Agent summary reports (continued)
Table 77-8 Advanced filters for DLP Agent summary reports (continued)
AD User Group
Resolution: Filter DLP
Agent by successful or
failed Active Directory
Group resolution.
Agent Logger Status:
Filter DLP Agents which
have an updated log level
status.
Agent Monitoring
Status: Filter DLP Agents
by their monitored status.
Agent Service Status:
Filter DLP Agents by the
state of the agent.
Agent Store: Filter DLP
Agents by the state of the
Agent Store.
Agent Troubleshooting
Status: Filter DLP Agents
based on the state of the
last attempted task that
was executed for the
Agent.
AIM Plugin Status: Filter
DLP Agents which have
AOL Instant Messenger
plug-ins that have failed
installation, been repaired,
or tampered with.
Configuration Update:
Filter DLP Agents that
have encountered an error
or have successfully
updated the agent
configuration.
Connection Status: Filter
DLP Agents that have
encountered
authentication failures,
have an active
connection, have a closed
Managing Symantec DLP Agents 1475
About Symantec DLP Agent administration
Table 77-8 Advanced filters for DLP Agent summary reports (continued)
connection, or lost
connection to the
Endpoint Prevent Server.
Crash Dump Status:
Filter DLP Agents that
have crash dumps
available or DLP Agents
that do not have a crash
dump.
Detection: Filter DLP
Agents that have a full
detection queue, have
experienced a detection
timeout, or have had files
removed from the Agent
Store.
File System Driver: Filter
DLP Agents using the
status of the file system
drivers on the agents.
Firefox Plugin Status:
Filter DLP Agents which
have Firefox plug-ins that
have failed installation,
been repaired, or
tampered with.
Lotus Notes Plugin
Status: Filter DLP Agents
which have Lotus Notes
plug-ins that have failed
installation, been repaired,
or tampered with.
Outlook Plugin Status:
Filter DLP Agents which
have Microsoft Outlook
plug-ins that have failed
installation, been repaired,
or tampered with.
Software Compatibility:
Filter DLP Agents by their
compatibility with the
Endpoint Prevent Server.
Managing Symantec DLP Agents 1476
About Symantec DLP Agent administration
Table 77-8 Advanced filters for DLP Agent summary reports (continued)
Note: Summary reports take their name from the summary criterion. If you
rerun a report with new criteria, the report name changes accordingly.
Managing Symantec DLP Agents 1477
About Symantec DLP Agent administration
Item Description
Agent Configuration
Agent Configuration Status
Agent IP
Agent Status
Agent Version
Category
Connection Status
Endpoint Server
Investigating State
Last Connection Time
Log Level
Machine Name
Sub Category
Item Description
Action Description
Change Endpoint Server Lets you change the Endpoint Server to which
the agent connects.
Action Description
Action Description
Reset Log Level Resets the logging level for the specified
agent to the default INFO level. Symantec
Technical Support uses agent logs for
troubleshooting purposes.
Set Log Level Sets the logging level for the specified agent.
Symantec Technical Support uses agent logs
for troubleshooting purposes.
Note: It is recommended to contact
Symantec Technical Support before you
change the log level for an agent.
You can view the most current information regarding the agent actions in a
knowledge base article. Log on to the DLP Knowledgebase at:
https://kb-vontu.altiris.com and search for the article "About Symantec DLP Agent
troubleshooting tasks." Or search for the article number: 54083.
confirm the task. The following table describes the different agent overview task
confirmation pages:
Change Endpoint Server Enter the IP address or host name and port
number to change the Endpoint Servers your
DLP Agents report to.
Pull Logs Select the type of agent logs that you want,
then click OK. You can select one of the
following types of logs:
Service Logs
Operational Logs
Click OK to confirm.
Note: After you disable an agent,
configuration updates and Endpoint Discover
requests from the Endpoint Server are not
received.
Click OK to confirm.
Note: After you enable the agent, restart it.
Restarting the agent ensures that you have
the latest policy, configuration updates, and
Endpoint Discover requests.
Reset Log Level Reset the logging level for a Symantec Data
Loss Prevention agent to the default INFO
level. Symantec Technical Support uses
agent logs for troubleshooting purposes.
Set Log Level Set the logging level for a Symantec Data
Loss Prevention agent. Symantec Technical
Support uses agent logs for troubleshooting
purposes.
Note: It is recommended to contact
Symantec Technical Support before you
change the log level for an agent.
3 If you want to add an alternate Endpoint Prevent Server, click the plus sign (+)
to add another entry.
4 Enter the IP address or the host name for the alternate Endpoint Prevent Server.
5 Enter the port number for the alternate Endpoint Prevent Server.
6 If you want to add an additional alternate Endpoint Prevent Server, repeat step
3.
7 If you have added too many Endpoint Prevent Server entries, you can delete
an entry by clicking the minus sign (-) next to the entry.
8 If you are finished adding or changing the Endpoint Prevent Servers, click OK
to submit your changes.
connection, file-system driver, and service. You can filter and summarize the event
list and click on individual event entries to see more details.
Event information is divided into several columns. Click any column header to sort
entries alpha-numerically in that column. To sort in reverse order, click the column
header a second time. By default, Symantec Data Loss Prevention lists events in
order of the time they occurred.
Entry Description
Type Displays the event type, which includes the following possible values:
Severe
Agent Information
OK
Category Lists the event category, such as Agent Service Status, Connection
Status, File-System Driver, or data store.
You can click any event to display the agent event detail screen for that event.
See Agent Event Detail screen on page 1485.
You can summarize how items display on the Events screen based on the items
listed in Table 77-12. You can also filter the information that displays on the Events
screen using a number of criteria, including computer name, agent sub categories,
information from the event summary, and event type. Summarizing and filtering the
events lets you view the agent data in the order that you want. For example, you
can summarize the agents by computer name and then filter by the most recently
updated agents.
You can delete agent events by selecting an event and clicking Delete. You cannot
delete agent events for version 12.0.x and earlier agents.
See About filters and summary options for reports on page 1027.
See Troubleshooting agent alerts on page 1486.
Managing Symantec DLP Agents 1485
About Symantec DLP Agent administration
Column Description
Info Lists the number of events associated with the agent. Click this
number to display more information about the event or events.
General Type Indicates the general type of event that has occurred. The
types possible events include:
Severe
Indicates an error that requires immediate attention.
Warning
Indicates a problem that is not severe enough to generate
an error.
Info
Lists agent information.
Time
Provides the time the event occurred.
Machine Name
Provides the endpoint name.
Managing Symantec DLP Agents 1486
About Symantec DLP Agent administration
DLP Outlook The Outlook plug-in was modified, To fix the issue:
plug-in disabled, or deleted.
Restart Outlook.
tampered with
Verify that the Outlook plug-in Outlook2k3 Addin is
enabled in Outlook.
Run Outlook for at least 15 seconds, then restart
Outlook.
Confirm that the Outlook plug-in Outlook2k3 Addin
is enabled.
DLP Outlook The Outlook plug-in installation failed. Run the AgentInstaller.msi manually to repair
plug-in the agent installation.
installation
failed
DLP Lotus The Lotus Notes plug-in was modified. To fix the issue:
Notes plug-in
Restart Lotus Notes.
tampered with
Uninstall the agent.
Restart the endpoint and install the agent.
DLP Lotus The Lotus Notes plug-in installation failed. Run the AgentInstaller.msi manually to repair
Notes plug-in the agent installation.
installation
failed
DLP AIM plug-in The AIM plug-in was modified or the plug-in To fix the issue:
tampered with installation failed.
Restart AIM.
Uninstall the agent.
Restart the endpoint and install the agent.
DLP AIM plug-in The AIM plug-in installation failed. Run the AgentInstaller.msi manually to repair
installation the agent installation.
failed
Active Directory Active Directory permissions conflict with Verify that the credentials that are passed to the agent
user group Symantec Data Loss Prevention have necessary permissions to extract logged-in user
resolution failed permissions. Also, Active Directory may information from Active Directory.
be missing attributes.
Managing Symantec DLP Agents 1488
About Symantec DLP Agent administration
Agent is The agent was disabled by the Start the Windows agent using the Agent List screen.
disabled by administrator who executed the Disable You can also start the agent by using the sc command.
enforce user troubleshooting task on the Agent List
See Using the Agent List screen on page 1452.
screen.
For Mac agents, you must use the agent_start tool to
start the agent.
Agent requires The administrator can either disable or Restart the agent on the Agent List screen.
restart enable data loss monitoring on endpoints
See Using the Agent List screen on page 1452.
by executing the Disable or Enable
troubleshooting task on the Agent List
screen. Monitoring is enabled by default
after the agent installation. However, when
the administrator executes the Enable or
Disable tasks and the agent is busy, the
agent status may not update, so the agent
remains in a Warning state.
Agent crash If the agent crashes, the Enforce Server To fix the issue:
dump available displays the Warning agent alert type. In
Shut down the agent on the Agent List screen.
on endpoint for this scenario, a log file is created that
See Using the Agent List screen on page 1452.
analysis Symantec Support can use to troubleshoot
Collect the crash dump files (*.dmp) from the path
why the agent crashed.
/AgentInstallDirectory/_MemDumpFiles/
Agent crashes can be caused by the on the respective endpoint.
following: Delete the crash dump files.
Temporary environment issues Restart the agent on the Agent List screen.
Unknown agent issues
Agent version is The agent is two versions older than the Upgrade the agent to the latest version.
older than Endpoint Server version to which it
Enforce Server connects. For example, if the Endpoint
version Server is version 12.0 and the agent is
10.x, a Warning agent alert type displays.
The features available in the Enforce and
Endpoint Server are not available for these
agents. Symantec Data Loss Prevention
identifies these agents with a Warning alert
because these agents do not provide
current Symantec Data Loss Prevention
features.
Agent group This alert occurs if the agent cannot collect To fix the issue:
attribute required data from Active Directory, which
Verify Active Directory attribute query syntax.
discovery failure prevents the Enforce Server from moving
Use AttributeQueryResolver.exe to test
the agent into an agent group. The agent
Active Directory queries that are defined in the
cannot collect data if there is an issue with
Enforce Server.
Active Directory permissions or if required
attributes are missing from Active See About agent groups on page 1435.
Directory.
Agent group The Endpoint Server automatically assigns To fix the issue:
conflicts the agent to an Agent Group depending
Review Agent Group settings.
on the endpoint attributes set during the
See About agent groups on page 1435.
Agent Group setup. If the endpoint meets
Re-create the agent group and use attributes that
multiple Agent Group conditions, the
satisfy the conditions of the agent.
Warning alert is thrown.
Agent is not The agent has not reported to an Endpoint To fix the issue:
reporting Server within the specified period of time.
Verify that the endpoint where the agent is installed
If the agent does not report after 18 hours,
exists. If it does not exist, you can delete the agent
then Symantec Data Loss Prevention
from the Enforce Server.
identifies the agent as not-reporting.
See Using the Agent List screen on page 1452.
Not-reporting agents do not receive the
Verify that the agent is running on the endpoint.
latest policies and configuration
information, so they are marked with a Verify the network connection between the Endpoint
Critical agent alert. Server and the endpoint.
Managing Symantec DLP Agents 1490
About Symantec DLP Agent administration
Agent version is The agent is two versions older than the Upgrade the agent to the latest version.
not supported Endpoint Server version to which it
connects. For example, if the Endpoint
Server is version 12.0 and the agent is
10.x, a Critical agent alert displays. The
features available in Enforce and Endpoint
Server are not available for these agents.
Symantec Data Loss Prevention identifies
these agents with a Critical alert because
these agents do not provide current
Symantec Data Loss Prevention features
and may not operate as designed.
File system The agent service cannot communicate To fix the issue:
driver is down with the Symantec Data Loss Prevention
Restart the endpoint.
driver installed on the endpoint.
Reinstall the agent.
Communication may not occur for the
following reasons:
Removing DLP Agents from Windows endpoints using system management software
Removing DLP Agents from Mac endpoints using system management software
msiexec /x AgentInstall.msi
msiexec /x {guid}
Managing Symantec DLP Agents 1492
About Symantec DLP Agent administration
msiexec /x AgentInstall.msi
4 Click OK.
You can add options to the uninstall command such as SilentMode or Logname.
SilentMode allows the Symantec DLP Agent to uninstall without displaying a
user interface on the desktop. The installation takes place in the background
of the workstation and is not visible to the user. Logname Lets you set any log
file you want. However, this option is only available if you have the original
installer present. If you do not have the original installer, you must use the
product code.
The code for a silent install is:
/QN:silentmode
/L*V _logname
msi.exe has several other options. For further options, see your MSI guide.
Note: You uninstall Windows 7/8/8.1 agents in Elevated Command Prompt mode.
/rm -f /tmp/uninstall_agent
Note: You can review uninstall logs on the Terminal application by running this
command: sudo ./uninstall_agent -prompt=no -log=console. By default, logs
are saved to the uninstall_agent.log file
Note: Symantec recommends that you contact Support before changing a log level
for an agent.
4 Select Troubleshoot > Set Log Level for current DLP Agents. Select Actions
> Set Log Level for DLP Agents older than Symantec Data Loss Prevention
version 12.5.
5 Select a log level from the Log level pull-down list.
6 If you want to change the log level for all of the components for this agent,
select All Agent Logger Components.
7 If you change the log level for specific components of this agent, enter each
component name into the provided field. When entering multiple component
names, use a comma to separate each component name. Component names
cannot exceed 255 characters.
8 Click OK to save your changes.
The Agent List screen displays an icon next to the agent to indicate the log
level change. For DLP Agents older than Symantec Data Loss Prevention
version 12.5, the Legacy Summary Reports screen displays an icon next to
the agent to indicate the log level change.
It is recommended that you reset the agent log levels to the default settings after
troubleshooting completes. Only general information about the agent is logged after
the log levels are reset.
To reset the log levels for all the components of an Endpoint Agent to the default
logging level
1 From the Enforce Server administration console, navigate to System > Agents
> Overview.
2 Click an agent status.
3 Select an agent.
4 Select Troubleshoot > Reset Log Level for current DLP Agents or Actions
> Reset Log Level for DLP Agents older than Symantec Data Loss Prevention
version 12.5.
The Agents Overview screen displays an icon next to the agent to indicate
the updated the log level.
Chapter 78
Using application
monitoring
This chapter includes the following topics:
Adding an application
Note: You can remove any application that you add, but you cannot remove a
system-provided application.
Network Access Monitors data moved over the network. The network includes
HTTP and FTP.
Write operations Monitors data moving between USB, network share, and local
disks and an application.
Application file Select Application File Access to monitor the files that the
access application opens or reads.
Note: If you have enabled HTTPS monitoring for Google Chrome,
it is recommended that you leave this setting disabled to prevent
duplicate incidents. Enabling HTTPS monitoring for Google
Chrome automatically enables application monitoring. See About
monitoring Google Chrome on page 1506.
Open Select the File Open option only if the application hangs or
crashes.
When this option is selected, the application does not open a file
if it contains sensitive information. However, Symantec Data Loss
Prevention scans the file regardless of whether the application
reads the content, which decreases performance.
Read Select the File Read option. File Read is the recommended
selection because it provides better performance.
When this option is selected, the file contents are monitored when
the application reads the file.
Table 78-1 Brand names and binary names of CD/DVD burning software
BsCLIP BsCLiP.exe
BurnAware burnaware_data.exe
CheetahBurner CheetahBurner.exe
CommandBurner CmdBurn.exe
CopyToDVD c2cman.exe
Creator 10 Creator10.exe
DeepBurner DeepBurner.exe
Mkisofs mkisofs.exe
Nero nero.exe
NeroStartSmart NeroStartSmart.exe
RecordNow RecordNow.exe
Roxio Creator.exe
Roxio_Central Roxio_Central.exe
Roxio5 Creatr50.exe
Table 78-1 Brand names and binary names of CD/DVD burning software
(continued)
StarBurn StarBurn.exe
Note: When you use a CD/DVD writer, small text files of less than 64 bytes are not
detected during a burn to ISO. Text files over 64 bytes in size are detected normally.
CD/DVD InfraRecorder
IM Viber
Adding an application
You can add applications to be monitored that are not already listed on the
Application Monitoring screen.
Using application monitoring 1501
Adding an application
Name Enter the application name. You must enter information in this field.
Binary Enter the binary file name. Include an escape character (\) between the
Name application name and the file extension. For example, if you want to add
Firefox, you enter firefox\.exe.
Original Enter the application file name. Include an escape character (\) between
Filename the application name and the file extension. For example, if you plan to
add Firefox, you enter firefox\.exe.
Additionally, you can add details about the publisher name for the
application. The publisher name details the maker of the software. Adding
the publisher name lets Symantec Data Loss Prevention verify the
application even if the binary name has been changed. Primarily, the
publisher name is used for identifying Symantec processes. However,
you can add the publisher name for any of your applications. Adding the
publisher name is optional.
Network Access Monitors data moved over the network. The network includes
HTTP and FTP.
Write operations Monitors data moving between USB, network share, and local
disks and an application.
Application file Select Application File Access to monitor the files that the
access application opens or reads.
Note: If you have enabled HTTPS monitoring for Google Chrome,
it is recommended that you leave this setting disabled to prevent
duplicate incidents. Enabling HTTPS monitoring for Google
Chrome automatically enables application monitoring. See About
monitoring Google Chrome on page 1506.
Open Select the File Open option only if the application hangs or
crashes.
When this option is selected, the application does not open a file
if it contains sensitive information. However, Symantec Data Loss
Prevention scans the file regardless of whether the application
reads the content, which decreases performance.
Read Select the File Read option. File Read is the recommended
selection because it provides better performance.
When this option is selected, the file contents are monitored when
the application reads the file.
4 Retain the application information the tool displays. You use the application
information when you add an application on the Application Monitoring screen.
See Adding an application on page 1500.
See About Application File Access monitoring on page 1504.
Using application monitoring 1504
Ignoring Mac applications
Note: You cannot use the Application File Access feature to monitor inline data
transfers using browsers (HTTPS) or instant messenger.
You can enable default applications on the Application Monitoring screen. You
can also set Symantec Data Loss Prevention to monitor the applications not found
on the Application Monitoring screen by adding them.
Using application monitoring 1505
Implementing Application File Access monitoring
1 Create a new policy or update an existing policy. You enable the Protocol or Endpoint
Monitoring protocol, then select
options to configure Application File
Access.
2 Set response rules for the policy. See Manage response rules
on page 868.
3 Create a policy group that is deployed to an Endpoint Server. See Policy groups on page 291.
Using application monitoring 1506
About monitoring Google Chrome
4 Enable the Application File Access feature in the endpoint Use environment, file, and folder filters
configuration. to optimize file monitoring
performance. The Application File
Access feature monitors every file that
an application opens or reads, which
can reduce application performance
and create false positives. You can
use environment variables to specify
locations where sensitive data is
potentially located.
5 Add an application to the Application Monitoring screen. Many applications are listed in the
Application Monitoring screen. If you
add an application, you must enable
the Monitor Application File Access
feature and select an activity to
monitor, either Read or Open.
Symantec Data Loss Prevention uses existing filters, or you add filters in the
agent configuration to specify URLs to be monitored. See Filter by File Properties
settings on page 1393.
Allow sensitive information to be pasted and uploaded to and printed from HTTPS
sites.
Symantec Data Loss Prevention uses existing filters, or you add filters in the
agent configuration to exclude specific URLs to be monitored. See Adding and
editing agent configurations on page 1391.
Prevent sensitive information from being pasted to HTTPS sites using Chrome.
Note: If you disable the Paste Clipboard channel in the agent configuration,
Symantec Data Loss Prevention continues to monitor and prevent sensitive file
uploads from Google Chrome to HTTPS sites.
Note: If you are upgrading a previous Symantec Data Loss Prevention version in
which application file access is enabled for Google Chrome, you should disable the
Monitor Application File Access setting before you enable the Chrome (HTTPS)
channel. Disabling this setting prevents duplicate incidents.
Using application monitoring 1508
About monitoring browser-based file uploads on Mac endpoints
Note: This feature only uses DCM detection. Consider this when creating policies
for Mac agents.
1 Confirm that the Application See About agent configurations on page 1390.
Monitoring channel is enabled
in the agent configuration
System > Agents > Agent
Configuration.
2 Add the browsers you want to Enter a distinct description in the Name field to
monitor to the Application differentiate Windows and Mac browsers.
Monitoring screen (System >
Enter browser information in the Binary Name
Agents > Application
field.
Monitoring).
For Firefox enter Firefox.
For Google Chrome enter Google Chrome.
For Safari version 6.x enter WebProcess.
For Safari version 7.x or 8.x enter
com.apple.WebKit.Networking.
3 Select the application type on Select Generic in the Application Type area.
the Application Monitoring
screen.
5 Add an ignore condition to The condition should ignore PDF files larger
improve monitor performance than 5MB. Place the ignore filter in the third
in the agent configuration position in the filter hierarchy.
(System > Agents > Agent
See Filter by File Properties settings
Configuration).
on page 1393.
Note: Add child processes you want to monitor to the Application Monitoring
screen. See Monitoring browser child processes on page 1510.
a single file with a browser, Symantec Data Loss Prevention monitors all files
that are located in the folder where the file to be uploaded resides. If sensitive
files are found in the folder, Symantec Data Loss Prevention creates an incident
for each and displays a pop-up depending on the response rule.
Use only the Endpoint Prevent: Notify or Endpoint Prevent: Block response
rules. The Endpoint Prevent: User Cancel response rule is not supported.
Increase the ResponseCache.AFAC_TIMEOUT setting to prevent false positive
incidents. False positives can occur when the DLP Agent blocks a file upload
and the browser retries the upload. Enter a period of time that exceeds the
interval between block pop-up messages. For example, enter 20000 if block
pop-up messages display within 20 seconds of each other. See Advanced
agent settings on page 1402.
Note: Symantec recommends that you not monitor Java child processes. Monitoring
Java may cause false positives and degrade endpoint performance.
The following table identifies child processes and the browsers on which they run.
Flash
You can use Endpoint FlexResponse rules on the following types of endpoint
destinations and protocols:
Endpoint Discover
Step 3 Deploy the plug-in to your endpoints See About deploying Endpoint
using the Endpoint FlexResponse FlexResponse plug-ins on endpoints
utility and third-party systems on page 1515.
management software (SMS).
Step 5 Add Endpoint FlexResponse actions See Adding a new response rule
to your response rules. on page 869.
Working with Endpoint FlexResponse 1515
About deploying Endpoint FlexResponse plug-ins on endpoints
Step 2 Copy any third-party Python modules that your plug-in requires to your
endpoints.
Step 5 Create response rules that use Endpoint: FlexResponse actions that
reference the plug-in, and add these rules to an active policy.
Action Description
See a list of deployed plug-ins Use the list option to retrieve a list of all
plug-ins that are deployed on a specific
endpoint. The list contains the names of the
deployed plug-ins.
The Endpoint FlexResponse utility must be run from the folder where the Symantec
DLP Agent is deployed. The location of this folder is configurable. By default, the
directory is located at:
c:\Program Files\Manufacturer\Endpoint Agent\
The name of the utility is flrinst.exe. The utility uses the following syntax:
flrinst.exe -op=install|uninstall|retrieve|list
-package=<package_name> -p=<Tools_password>
Option Description
installdeploys a plug-in
uninstallremoves a plug-in
listdisplays a list of deployed plug-ins
retrieveretrieves a plug-in and saves
it as an editable text file. The text file is
contained in a ZIP file that is saved in the
directory where the utility was run.
Working with Endpoint FlexResponse 1518
Deploying an Endpoint FlexResponse plug-in using the Endpoint FlexResponse utility
Option Description
If you have created a Tools password for your Symantec Data Loss Prevention
deployment, pass this password to the Endpoint FlexResponse utility with the -p
option. This password is required to install and uninstall a plug-in. You configure a
Tools password during Symantec Data Loss Prevention installation. For more
information, see the Symantec Data Loss Prevention Installation Guide.
If you have not configured a Tools password, an end user can retrieve and modify
previously-installed plug-ins using the default password, VontuStop. Symantec
recommends that you configure a Tools password to prevent such tampering.
Alternately, you can set your SMS application to remove the Endpoint FlexResponse
Utility after you have used it. Removing the utility prevents any unauthorized
modification or uninstallation of your plug-ins.
flrinst.exe -op=install
-package=<path_to_plug-in>
-p=<myToolsPassword>
Where:
<myToolsPassword> is the Tools password for your Symantec Data Loss
Prevention deployment. If you have not specified a Tools password, use
the default password: VontuStop.
<path_to_plug-in name> is the full path to the plug-in .zip file.
For example:
flrinst -op=install -package=c:\installs\myFlexResponse_plugin.zip
-p=myToolsPassword
flrinst.exe -op=uninstall
-package=<Plug-in name>
-p=<myToolsPassword>
Where:
<Plug-in name> is the name of the plug-in package .zip file.
You can edit the plug-in by editing the .py file. If you make edits, you must
re-package the ZIP file and re-deploy the plug-in to the endpoint before the edits
take effect. Modified plug-ins only affect the individual endpoints where they were
modified.
To retrieve an Endpoint FlexResponse plug-in from a specific endpoint
1 On the endpoint, open a command prompt window and navigate to the
Symantec DLP Agent installation directory:
The default location of this directory is c:\Program
Files\Manufacturer\Endpoint Agent\
Where:
<myToolsPassword> is the tools password for your Symantec Data Loss
Prevention deployment. If you have not specified a Tools password, use
the default password: VontuStop.
<plug-in name> is the name of the plug-in .zip file.
For example:
flrinst -op=retrieve -package=myFlexResponse_plugin.zip
-p=myToolsPassword
Shut down the agent and the service_shutdown See Shutting down the agent and the
watchdog services watchdog services on page 1526.
Available for Windows agents in the
Symantec_DLP_14.0_Agent_Win-IN.zip
file.
Using Endpoint tools 1524
About Endpoint tools
Inspect database files that are vontu_sqlite3 See Inspecting the database files
accessed by the agent accessed by the agent on page 1526.
Available for Windows agents in the
Symantec_DLP_14.0_Agent_Win-IN.zip
file.
View extended log files logdump See Viewing extended log files
on page 1527.
Available for Windows agents in the
.Symantec_DLP_14.0_Agent_Win-IN.zip
file.
Generate device information DeviceID.exe for Windows See About the Device ID utilities
removable devices. on page 1528.
Generate uninstallation passwords for UninstallPwdKeyGenerator See Creating passwords with the
your agents password generation tool on page 1532.
Available for Windows agents in the
Symantec_DLP_14.0_Agent_Win-IN.zip
file.
Start DLP Agents that are installed on start_agent See Starting DLP Agents that run on
Mac endpoints Mac endpoints on page 1533.
Available for Mac agents in the
AgentInstaller_Mac64.zip file.
This file is created after you complete
the agent installation package process.
2 Hold the Shift key and right-click Command Prompt in the results list.
3 Select Run as Administrator.
Using Endpoint tools 1526
About Endpoint tools
service_shutdown [-p=password]
where the installation directory is the directory where you installed Symantec
Data Loss Prevention and [-p=password] is the password you previously
specified. If you do not enter a password, you are prompted to input a password.
The default password is VontuStop.
You must run the Service_Shutdown.exe tool from the same directory as the
DLP Agent keystore file.
See About Endpoint tools on page 1523.
Note: You can use this tool to view DLP Agent log files on Mac endpoints. You must
have root or sudo access to make changes to the agent database.
The Symantec Data Loss Prevention database files for Windows agents
are located in the DLP Agent installation directory and end in the *.ead
extension. After you run the command, you are prompted for your password.
For Mac agents run the following command:
2 Enter the default password VontuStop unless you have already created a
unique password.
You are provided with a shell to enter SQL statements to view or update the
database.
Refer to http://www.sqlite.org/sqlite.html for complete documentation about
what commands are available in this shell.
See About Endpoint tools on page 1523.
Note: You can use this tool to view DLP Agent log files on Mac endpoints. You must
have root or sudo access to make changes to the agent database.
where log_file is the log file you want to view and password is the specified
tools password. All Symantec Data Loss Prevention extended log files are
present in the Symantec Data Loss Prevention Agent installation directory.
Using Endpoint tools 1528
About Endpoint tools
The files have names of the form edpa_extfile_number.log. After you run
this command, you can see the de-obfuscated log.
On Mac agents:
where log_file is the log file you want to view and password is the specified
tools password.
All Symantec Data Loss Prevention extended log files are present in the
Symantec Data Loss Prevention Agent installation directory. The files have
names of the form edpa_extfile_number.log. After you run this command, you
can see the de-obfuscated log.
2 (Optional) Print the contents of another log from this view.
To print the contents of another log
1 From the command window, run:
Result Description
Volume The volume or mount point that the DeviceID.exe tool found.
For example:
Volume: E:\
For example:
USBSTOR\DISK&VEN_UFD&PROD_USB_FLASH_DRIVE&REV_1100\5F73HF00Y9DBOG0DXJ
For example:
USBSTOR\\DISK&VEN_UFD&PROD_USB_FLASH_DRIVE&REV_1100\\5F73HF00Y9DBOG0DXJ
Result Description
For example:
SanDisk&.*
For example:
SanDisk&Cruzer Blade&.*
For example:
SanDisk&Cruzer Blade&DER45TG5444
The file appears in the C:\temp directory and contains the output from the
DeviceID process.
5 View the results of the DeviceID process.
The command prompt displays the results for each volume or mount point.
See Table 80-2 on page 1529.
6 Use the DeviceID utility to evaluate the proposed regex string against a device
that is currently connected.
See Table 80-4 on page 1530.
7 Use the regular expression patterns to configure endpoint devices for detection.
See Creating and modifying endpoint device configurations on page 655.
Command Example
parameters
Command Example
parameters
The output results display information for each volume or mount point in the
Terminal application dialog.
5 Review the DeviceID process results.
6 Use the regex information to configure endpoint devices for detection.
See Creating and modifying endpoint device configurations on page 655.
Using Endpoint tools 1532
About Endpoint tools
Table 80-5
Command parameter Example
Volume: /Volumes/FAT_USB/
Type (BUS): USB
Device ID Regex by Vendor: JetFlash&.*
Device ID Regex by Model:
JetFlash&Mass Storage Device&.*
Device ID Regex by Serial No:
JetFlash&Mass Storage
Device&79HCSMJ0RYOHT2FE
where <uninstall password> is the password that you want to use. Choose
a unique password key.
A password key is generated. Enter this key in the command line when you install
the agent.
Using Endpoint tools 1533
About Endpoint tools
Note: You must unzip this file to a Mac endpoint. You cannot use the tool if it is
unzipped to a Windows endpoint.
start_agent
where the installation directory is the directory where you installed Symantec
Data Loss Prevention.
2 Go to the Agent List screen and confirm that the agent is running.
See Using the Agent List screen on page 1452.
See About Endpoint tools on page 1523.
Section 10
Monitoring and preventing
data loss on mobile devices
Chapter 81. Introducing Symantec Data Loss Prevention Mobile Prevent for
Web
Corporate
Internet DMZ
Network
Firewall Firewall
VPN
VPN Tunnel subnetwork
for mobile
iOS iOS devices
Device VPN Server Device
Proxy
Server Mobile
Prevent for Web
Exchange MTA
ActiveSync Server
Server
Email
Gateway
In this deployment, mobile devices connect to the corporate network through your
VPN server. The VPN server assigns each mobile device an IP address. This
address lets the device access the internal corporate network. After the device is
assigned a unique IP address, all HTTP, HTTPS, and FTP traffic is monitored by
the Mobile Prevent for Web Server. Each device must be connected to the corporate
network through the VPN. If the VPN connection to the corporate network is lost,
Mobile Prevent for Web cannot detect any violations.
Introducing Symantec Data Loss Prevention Mobile Prevent for Web 1539
About digital certificates for Mobile Prevent for Web
iPads and iPhones use a native feature called VPN On Demand to create a secure
VPN connection automatically without user intervention. VPN On Demand requires
certificate-based authentication to create the connection to the VPN Server.
After the VPN connection is established, traffic is sent through the proxy server and
analyzed by Mobile Prevent for Web Server. Traffic between the proxy server and
the Mobile Prevent for Web Server is done over the ICAP protocol. If no violations
are discovered, the traffic is sent to its destination either internally or externally. If
violations are discovered, an incident is created and response actions are
implemented. Incidents are recorded on the Enforce Server.
When a mobile device sends an email through Microsoft Exchange ActiveSync,
the HTTP/HTTPS packets are sent to the ActiveSync server. The packets are then
sent to the Exchange Server. Any corporate email should go through Microsoft
Exchange ActiveSync. Mobile Prevent for Web does not support the SMTP protocol.
Note: Mobile Prevent for Web does not support response mode (RESPMOD).
Certificate mobile devices, The base CA. All other certificates are signed by
Authority (CA) root VPN Server, proxy the root CA or its subordinate CA. If a device trusts
certificate server the root CA, then it trusts all valid certificates that
are signed by the root CA or the subordinate CA.
Introducing Symantec Data Loss Prevention Mobile Prevent for Web 1540
About the VPN server and VPN On Demand
Table 81-1 Digital certificates for Mobile Prevent for Web (continued)
User certificate mobile devices Identifies individual users. Users must have this
certificate to gain access to the corporate
subnetwork. The certificate is sent to the VPN
server for authentication. This certificate is required
to establish the VPN tunnel to the corporate
network.
Device certificate VPN Server Establishes that the identity of the VPN server host
name is valid before the mobile device can connect
to it. The certificate ensures that the mobile device
does not connect to an unauthorized VPN server.
On the Mobile Prevent for Web side, VPN On Demand ensures that the VPN
connection is not interrupted. Apple mobile devices use VPN On Demand to
dynamically create a VPN session. VPN on Demand starts the VPN session when
connecting to a specific list of configured domains (for example .com, .net, or .org).
Certificate-based authentication is required to configure the VPN On Demand
feature. By configuring how VPN On Demand automatically enables VPN on an
iOS mobile device, you can ensure that all traffic goes through your corporate
network. You need a Web proxy that is deployed in transparent mode to route traffic
from the mobile devices in your corporate network to Symantec Data Loss
Prevention. The network traffic is routed uses the ICAP service.
You can use a mobile device management (MDM) solution to apply the network
and VPN configuration.
In this example, messages are sent from the iPad email client, which is configured
with ActiveSync, through the VPN-connected corporate network. The message is
sent as an HTTP/S request. The message is received in the ActiveSync Server and
sent on to the Microsoft Exchange Server. The Exchange Server sends the message
to the MTA server as an SMTP message. The MTA server sends the corporate
message on to the recipient.
You can disable ActiveSync monitoring by filtering.
Note: Mobile Prevent for Web does not support blocking or redacting contacts and
calendar traffic.
Note: These procedures assume that you already have your VPN and proxy servers
running in your environment.
Step 1 Add a new Mobile Prevent See Adding a detection server on page 201.
for Web Server.
Implementing Mobile Prevent for Web 1545
Implementing Mobile Prevent for Web
Step 2 Configure your Mobile See Configuring the Mobile Prevent for Web
Prevent for Web Server. Server on page 1545.
Step 3 Configure your VPN See the documentation for your VPN Server.
Server with the IP address
range that you want to
assign to the corporate
mobile devices for the
Mobile Prevent for Web
sub-network
Step 4 Configure your VPN profile See Configuring the VPN profile on page 1549.
with the MDM application.
Step 5 Define ICAP services on See About proxy server configuration on page 1154.
proxy to route traffic to
Mobile Prevent for Web.
Step 6 Create and deploy a policy See Creating policies for Mobile Prevent for Web
for Mobile Prevent for on page 1553.
Web.
Step 7 Test the system by See Testing Mobile Prevent for Web on page 1556.
generating an incident
against your test policy.
See the Symantec Data Loss Prevention System Requirements and Compatibility
Guide for more details on configuring Mobile Prevent for Web to work within your
organization.
Ignore Requests Smaller Than Specifies the minimum body size of HTTP
requests to inspect. (The default is 4096
bytes.) For example, search-strings typed
in to search engines such as Yahoo or
Google are usually short. By adjusting this
value, you can exclude those searches
from inspection.
Ignore Requests without Attachments Causes the server to inspect only the
requests that contain attachments. This
option can be useful if you are mainly
concerned with requests intended to post
sensitive files.
Ignore Requests from User Agents Causes the server to ignore requests from
user agents (HTTP clients) you specify.
This option can be useful if your
organization uses a program or language
(such as Java) that makes frequent HTTP
requests. You can type one or more user
agent values (for example, java/6.0.29),
each on its own line.
Implementing Mobile Prevent for Web 1547
Implementing Mobile Prevent for Web
5 Note: The Response Filtering options are not supported for Mobile Prevent.
Verify or modify the filter options for responses from Web servers. The options
in the Response Filtering section are as follows:
Ignore Responses Smaller Than Specifies the minimum size of the body of
HTTP responses that are inspected by this
server. (Default is 4096 bytes.)
6 Verify or modify settings for the ICAP connection between the HTTP proxy
server and the Mobile Prevent for Web Server. The Connection options are
as follows:
7 In the Mobile IP Ranges fields, enter the range of IP addresses that your VPN
server is configured to assign to mobile devices. The IP addresses are used
to identify the incidents that were triggered from mobile devices as Mobile
incidents.
The IP addresses you enter into this range do not dynamically affect the VPN
Server. This range is only to identify your mobile devices in the administration
console. You must enter the exact same range of IP addresses when you
configure the VPN Server to assign the addresses.
8 Click Save to exit the Configure Server screen and then click Done to exit
the Server Detail screen.
Implementing Mobile Prevent for Web 1549
Implementing Mobile Prevent for Web
VPN
Configuration
settings
Server Name Enter the host name or IP address for your VPN server.
User Name The user name for the mobile device that connects to the
VPN server.
For example, the domain suffixes .com, .net. .org, and .gov
are added as Always Establish. Any time a domain name
with one of those suffixes is called, the VPN tunnel must
be established before the connection can complete.
Credential
Settings
My Company The certificate for your company. This is the root certificate
for the Certificate Authority (CA).
Note: The proxy server must be deployed in transparent mode. Consult the proxy
server documentation for details.
Blue Coat ProxySG HTTP, HTTPS, FTP over Blue Coat product documentation
HTTP, or FTP proxy
icap://ip_address|FQDN[:port]/reqmod
Where:
ip_address|FQDN identifies the Mobile Prevent for Web Server using either an
IP address or fully qualified domain name.
Port is the port number to which the Mobile Prevent for Web Server listens.
Specifying the port number is optional when the default ICAP port (1344) is
used.
/reqmod is required for correct functionality in REQMOD mode.
Examples:
icap://10.66.194.45/reqmod
icap://10.66.194.45:1344/reqmod
icap://netmonitor1.company.com/reqmod
Implementing Mobile Prevent for Web 1552
Implementing Mobile Prevent for Web
Note: The port that is specified in the ICAP service definition on the proxy must
match the port where Mobile Prevent for Web Server listens.
Note: Certain applications may not provide an adequate response to the Mobile
Prevent for Web: Block HTTP/HTTPS response action. This behavior has
been observed with the Yahoo! Mail application when a detection server blocks
a file upload. If a user tries to upload an email attachment and the attachment
triggers a Mobile Prevent for Web: Block HTTP/HTTPS response action,
Yahoo! Mail does not respond or display an error message to indicate that the
file is blocked. Instead, Yahoo! Mail appears to continue uploading the selected
file, but the upload never completes. The user must manually cancel the upload
at some point by pressing Cancel.
Other applications may also exhibit this behavior, depending on how they handle
the block request. In these cases a detection server incident is created and the
file upload is blocked even though the application provides no such indication.
Note: The following procedure is an example of how to configure a Blue Coat proxy
server to redirect network traffic. For more information on configuring a proxy server,
see the documentation that comes with the proxy server.
Chapter 83. Introducing Symantec Data Loss Prevention Mobile Email Monitor
Chapter 84. Implementing Symantec Data Loss Prevention Mobile Email Monitor
Chapter 83
Introducing Symantec Data
Loss Prevention Mobile
Email Monitor
This chapter includes the following topics:
Figure 83-1 Symantec Data Loss Prevention Mobile Email Monitor Overview
Introducing Symantec Data Loss Prevention Mobile Email Monitor 1560
Using Mobile Email Monitor with Mobile Prevent for Web
Table 83-1 provides more detail about how an email destined for download to a
mobile device is monitored.
Step Action
Step 1 An email is downloaded from the Exchange ActiveSync Server, using either the HTTP
or HTTPS protocol, through a corporate reverse Web proxy using ICAP.
Step 2 A reverse Web proxy server intercepts the email and diverts it to Mobile Email Monitor
for detection using ICAP.
Step 3 Mobile Email Monitor scans the email according to policies you have set up using the
Enforce Server administration console.
Step 4 If the email violates a policy, an incident is logged in the Enforce Server.
Step 5 After inspection by Symantec Data Loss Prevention the email (ICAP response) is sent
back to the Web proxy.
Step 6 The Proxy server then sends the email to the recipient mobile email client.
See Using Mobile Email Monitor with Mobile Prevent for Web on page 1560.
Administration Guide. You must have a deployed Symantec Data Loss Prevention
Enforce Server and have a working Microsoft Exchange ActiveSync Server up and
running in your datacenter before implementing Mobile Email Monitor according to
the steps in the table.
Step 1 Add and configure a new Mobile See Adding and configuring the Mobile Email Monitor Server
Email Monitor Server. on page 1562.
Step 2 Configure a proxy server. See About proxy server configuration on page 1564.
Step 3 Specify one or more proxy servers See Specifying one or more proxy servers on page 1564.
and define ICAP services on the
See the Symantec Data Loss Prevention Administration Guide for
proxy to route traffic to the Mobile
more information.
Email Monitor Server.
Step 4 Configure the response mode See Configuring the response mode service on page 1565.
service.
Step 5 Set up a digital certificate for See About digital certificates for Mobile Email Monitor on page 1566.
communication with the proxy
server.
Step 6 Configure native mobile email See Setting up native email clients for monitoring on page 1566.
accounts to point to the proxy
See the documentation for your native mobile email clients.
server.
Step 7 Create and deploy a policy for See Creating policies for Mobile Email Monitor on page 1566.
Mobile Email Monitor.
See the Symantec Data Loss Prevention Administration Guide for
more information.
Step 8 Test the system by generating an See Testing Symantec Data Loss Prevention Mobile Email
incident against your test policy. Monitor on page 1567.
See Adding and configuring the Mobile Email Monitor Server on page 1562.
3 Verify or modify the filter options for responses from email servers. The options
in the Response Filtering section are as follows:
Ignore Responses Smaller Than Specifies the minimum size of the body of
HTTP responses inspected by this server.
(The default is 4096 bytes.)
4 Verify or modify settings for the ICAP connection between the HTTP proxy
server and the Mobile Email Monitor Server. The Connection options are as
follows:
5 Click Save to exit the Configure Server screen and then click Done to exit
the Server Detail screen.
See About proxy server configuration on page 1564.
Note: The Icap.BindAddress setting can affect a proxy server whitelist. By default,
the Icap.BindAddress setting is 0.0.0.0, and the listener binds to all available
addresses. If the Icap.BindAddress instructs the listener to bind to a specific IP,
a whitelisted proxy must also be able to reach the listener address.
icap://ip_address|[:port]/respmod
Implementing Symantec Data Loss Prevention Mobile Email Monitor 1566
About digital certificates for Mobile Email Monitor
Where:
ip_address|FQDN identifies the Mobile Email Monitor Server using either an IP
address or fully-qualified domain name.
Port is the port number where Mobile Email Monitor listens.FQDN Specifying
the port number is optional when the default ICAP port (1344) is used.
/respmod is required for correct functionality in RESPMOD mode.
Examples:
icap://10.66.194.45/respmod
icap://10.66.194.45:1344/respmod
icap://netmonitor1.company.com/respmod
Note: The port that is specified in the ICAP service definition on the proxy must
match the port where Mobile Email Monitor Server listens.
See About digital certificates for Mobile Email Monitor on page 1566.
don't need response rules, as long as your policies contain detection rules. You
can set up detection policies to monitor the emails downloaded to mobile devices.
To create a test policy for Mobile Email Monitor
Create a policy that incorporates a standard test detection rule.
For example, create a policy called Test Policy as follows:
Include a Content Matches Keyword detection rule that matches on the
keyword "secret."
Associate it with the Default policy group.
See Testing Symantec Data Loss Prevention Mobile Email Monitor
on page 1567.
Incidents do not appear in Symantec Data The Ignore Responses Smaller Than
Loss Prevention Mobile reports. parameter can cause emails smaller than the
set parameter size to be ignored. To enable
monitoring of smaller emails, set the
parameter to a lower value.
An email preview feature can cause a single If the email preview contains data that triggers
policy violation in an email to generate a policy, Mobile Email Monitor will count the
duplicate incidents. preview data as one incident and the same
data in the body as another incident, for a
total of two incidents.
Index
policy detection templates, configuration (continued) policy detection, keyword matching (continued)
UK National Health Service (NHS) Number 843 wildcards, about support for 599
UK National Insurance Numbers 843 policy detection, keyword matching, configuration
UK Passport Numbers 844 Content Matches Keyword 606
UK Tax ID Numbers 844 policy detection, keyword proximity
US Intelligence Control Markings (CAPCO) and about 601
DCID 1/7 845 policy detection, regular expressions
US Social Security Numbers 846 Content Matches Regular Expression 615
Violence and Weapons 846 implementing 613
Webmail 847 writing 613
policy detection, policy exceptions
endpoint destination 648 add 341
policy detection, about compound 346
EDM token matching 403 configure 344
keyword matching 599 policy exceptions, configure
policy detection, classification match counting 338
Enabling test mode when 636 policy groups
policy detection, conditions about 291
Content Matches Keyword 606 create 352
Content Matches Regular Expression 615 default policy group 291
Endpoint Device Class or ID 653 deployment 292
Endpoint Location 652 managing 351
Protocol or Endpoint Monitoring 650 modify 352
Recipient matches User Group based on a removing 355
Directory Server Group 673 policy match condition
Sender/User Matches Pattern 660 Message/Email Properties and Attributes 638
Sender/User matches User Group based on a policy match conditions
Directory Server Group 672 compound 312
policy detection, configuration content 305
select message components to match on 340 content based on index 305
policy detection, described identities cross-component matching 309
about 658 endpoint 308
Sender/User Matches Pattern 660 exceptions 311
policy detection, EDM token matching file properties 306
implementing 403 identities and groups 308
policy detection, endpoint message components 309
devices, about 649 network and mobile 307
devices, adding 655 server execution logic 312
devices, configuring 655 simple 312
Endpoint Device Class or ID 653 subject matching 636
Endpoint Location 652 two-tier detection 313
locations, about 649 types 304
Protocol or Endpoint Monitoring 650 policy rules
policy detection, international compound 346
data identifiers 621 policy rules, conditions
find keywords 621 configure 334
policy detection, keyword matching policy rules, configuration
exmaples 602 rule severity 337
implementing 599
Index 1580
V
Vector Machine Learning (VML)
about 524
accepting training 526
adjust similarity threshold 542
adjusting memory allocation 535
configuring VML exceptions 541
configuring VML rules 540
creating new VML profiles 530
Currernt Profile tab 530
editing profile name, description 539
implementation process 528