0% found this document useful (0 votes)
1K views4 pages

DLP Use Cases

The document outlines 21 criteria that any data loss prevention (DLP) solution should fulfill, including preventing information leakage via email, social media, external drives, screen capturing and more. It also notes the browser and architecture compatibility of the DLP agent.

Uploaded by

Shumail Ali Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views4 pages

DLP Use Cases

The document outlines 21 criteria that any data loss prevention (DLP) solution should fulfill, including preventing information leakage via email, social media, external drives, screen capturing and more. It also notes the browser and architecture compatibility of the DLP agent.

Uploaded by

Shumail Ali Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1.     Prevents information leakage via G-mail & G Drive.

2.     Prevents information leakage via Facebook.


3.     Prevents information leakage via Any URL.
4.     Keeps copies of all types of files uploaded e.g. Word file should be uploaded on DLP Se
5.     Protects the DLP agent from getting its process killed by the user.
6.     Prevents information leakage via USB, CD/DVD.
7.     Blocks password protected archives .zip| .rar | .tar| .Gz from getting uploaded.
8.     Blocks password protected PDF | MS WORD | Excel | PPT etc. from getting uploaded.
9.     Blocks encrypted data files such as TXT PDF | MS WORD | Excel | PPT from getting upl
10.     Completely blocks screen shot capturing.
11.     Prevents information leakage via Network sharing .
12.     Prevents information leakage via RDP.
13.     Prevents information leakage via SSH .
14.     Prevents information leakage from user laptop if a user is connected over VPN tunnel.
15.     Prevents information leakage via WinSCP.
16.     Prevents leakage via Virtual Machine hosted as guest on host machine (Agent is install
17.     Prevents information leakage via scanned images.
18.     java and PHP scripts.
19.     Multi language document detection.
20.     Block files via extension less / unknown extension files.
21.     Block files via P2P.
Following are the criteria that should be fulfilled by any DLP solution

1.     Prevents information leakage via G-mail & G Drive.


2.     Prevents information leakage via Facebook.
3.     Prevents information leakage via Any URL.
4.     Keeps copies of all types of files uploaded e.g. Word file should be uploaded on DLP Server.
5.     Protects the DLP agent from getting its process killed by the user.
6.     Prevents information leakage via USB, CD/DVD.
7.     Blocks password protected archives .zip| .rar | .tar| .Gz from getting uploaded.
8.     Blocks password protected PDF | MS WORD | Excel | PPT etc. from getting uploaded.
9.     Blocks encrypted data files such as TXT PDF | MS WORD | Excel | PPT from getting uploaded.
10.     Completely blocks screen shot capturing.
11.     Prevents information leakage via Network sharing .
12.     Prevents information leakage via RDP.
13.     Prevents information leakage via SSH .
14.     Prevents information leakage from user laptop if a user is connected over VPN tunnel.
15.     Prevents information leakage via WinSCP.
16.     Prevents leakage via Virtual Machine hosted as guest on host machine (Agent is installed on host machine
17.     Prevents information leakage via scanned images.
18.     java and PHP scripts.
19.     Multi language document detection.
20.     Block files via extension less / unknown extension files.
21.     Block files via P2P.
Mozilla Chrome

32bit 64bit Internet explorer 64bit 32bit Opera Latest Version

Done Done Done Done Done N.Done


Done Done Done Done Done N.Done
Done Done Done Done Done N.Done
Done Done Done Done Done N.Done

Done Done Done Done Done

n host machine

You might also like