DLP Guide PDF
DLP Guide PDF
com
DLP GUIDE
Content
The guide is split into three parts: Exercises, DLP guide and Advanced DLP.
Exercises will let you see how Safetica protects the files without having to understand individual
settings. Just follow the steps in each exercise to configure Safetica for the given scenario. DLP guide
explains the workflow of setting up DLP and goes through the main options for each option. Finally,
Advanced DLP expands on the previous section with additional settings, giving you all the tools you
need to configure Safetica for virtually any environment and workflow. But first…
You have multiple options how to choose which files will be tagged as sensitive, based on:
Path
Keyword in file name
File extension
Application or category of applications that created the file
Web address from which the file was downloaded
Once you have the files tagged, you can apply the following restrictions to them:
Area access:
Local drives and folders (where can you save the file?)
External devices (what devices can you copy the file to?)
Printers (can you print it?)
Network (can you upload it?)
Email (can you mail it?)
Encrypted drives (can you copy the file only to an encrypted device?)
Cloud drives (can you upload it to a cloud drive?)
Remote transfer (can you transfer it via RDP?)
Operations:
Screenshots
Clipboard
Burning
Virtual printing
The combination of a tagging rule and a restriction put together a DLP rule that effectively defines
the way you can and cannot work with specific files, based on their location, origin and other
attributes.
Exercise: Use-cases for most common scenarios
1) Open Safetica - DLP - DLP rules - Manage security policies - New Security Policy.
2) Choose Policy type – Application policy.
3) Fill in the name of the policy (e.g. Sensitive files), add description, and then click Next.
4) Choose the following settings:
a. Set External devices to Zone
b. Create new zone or choose existing one, which will contain the company’s flash
drives
c. Set this zone to Allow.
d. Set all other options to Denied.
e. Click Finish.
5) In Security policies, click Finish.
6) In DLP -> DLP rules, click New rule.
7) Choose application category from the list on the left – Office suite; click Next.
8) Click Select Security policy (“Sensitive files” in our case).
9) Choose the mode – Testing, Informative or Restrictive.
10) Click Save.
More details about each of these steps and settings is available in the following chapters.
Preventing data loss via external devices
A Company has experienced a data leak. They now want to deny all external devices (USB flash drives
…) except several devices that are encrypted. CD/DVD burning shall be denied, but employees must
be able to read CDs. Employees can charge their phones, but copying files to a phone is not allowed
either.
Only devices added to the zone Allowed will be able to connect to computers. Any new device (in the
zone Not in zone/Not set) will behave based on the port settings.
Detailed settings of Device control are described in chapter Device control settings.
DLP Guide: Analyzing and tagging of existing files
Prior to securing data, it is crucial to scan the computers and find the existing data you want to
protect. Such scan can be performed using various filtering rules. Data analysis results can then be
processed and the resulting data tagged with appropriate data categories.
You can access to managing filtering rules from two basics locations, where you use the filtering
rules:
New rule
1. To create a new filtering rule, click New rule.
2. In the next step enter the rule name and description. Then click Next at the bottom right.
3. In this step set the file search rule in detail. Only files that meet all the specified conditions
will be tagged.
Note that the rule settings are split between local and network settings:
To see detailed description of possible conditions, see Help -> Console -> DLP -> Data analysis ->
Filtering rules.
2. Create data categories
In the Data categories view you can create any number of data categories. Data categories are
practically a label used for the tagged files. DLP rules and restrictions are then assigned to the
categories. This helps to keep your DLP rules organized.
You can access the management of categories from two basic locations, where you use the filtering
rules:
If you wish to create a new data category, click New data category. Enter a name and description
and by clicking OK the category will be added to the list shown on the left.
You can edit the name and description of an existing data category by clicking the Edit button in the
list with each data category.
When you finish the settings of new analysis, don’t forget to apply the settings on the top right
corner.
When the analysis itself is finished, you can see the results by clicking the Visualization mode in the
top left corner or the Finished button.
This will show you what files matched the rule. You can fine-tune the rule and repeat the process.
Once you are happy with the result, you can proceed to the next step.
For more details, see the Help -> Console -> DLP -> Data Analysis
On the fly tagging – a tagging task that runs permanently on the computers. This means that if new
files that match the filtering rule are added or created, such files are automatically tagged with the
respective data category. When tagging, security rules are immediately applied to such files, as
defined by the DLP rule for the given data category.
On demand tagging – a tagging task set to one-time tagging will be executed only once. This means
that files matching the filtering rule at the moment the task is executed are tagged with the
respective data category. When tagging, security rules are immediately applied to such files, as
defined by the DLP rule for the given data category. However, new files matching the filtering rule or
located in the respective folder created after applying the rules will not be tagged.
Best practice is to create an On the fly task first, so you tag all new files from now on. Afterwards, you
can create and run an On demand task to tag all remaining files matching the rule.
Creating a tagging task
Click the New on demand tagging task or New on the fly tagging task button to launch the tagging
task creation wizard.
a. Set data category – only the selected data category will be applied to the file. All
previous categories will be removed.
b. Merge data categories – the data category will be applied to the file. If the file was
tagged previously with another category, both (all) categories will be kept.
c. Remove data category – choose this option when you want to remove tags from files
5. Check the settings in Summary and click Finish.
6. Save the changes by pressing the checkmark button in upper-rigth corner and the task will be
launched on the stations selected in the network tree in the left part of the window.
Once the task is launched, you can see the results in the Visualization mode. You can select specific
tagging task and see the results only from this task.
See more details in Help -> Console -> DLP -> File tagging.
DLP Guide: Configuring DLP policies
Safetica uses DLP policies to protect tagged files (see previous chapter on how to tag your sensitive
files), and also to secure any new files created by some application, downloaded from an internal
system, etc.
There are two types of DLP Policies – Application and Data policy:
Application policy protects files created in the application – e.g. all files created in Excel or
Autocad.
Data policy protects files on your hard drive – e.g. existing DWX and XLS files.
Restrictive - the security policy will be applied exactly according to its settings. The user will be able
to access only allowed areas and any deny operations will be blocked.
Informative - the security policy will not be applied, but a warning dialogue will be shown. This mode
is used for testing and user education.
Testing – all blocked or restricted operations are logged, but there is no notification for the user and
the operations are not blocked. This is used for data flow analysis and for initial testing of restrictive
DLP rules.
1. Create security policy
Security policies are available via Safetica -> DLP -> DLP rules -> Manage security policies
Security policies are rules through which data is protected. You can apply a policy either to data
(tagged files), or to an application.
These Security policies are assigned to either Data category (Data policy) or Application category
(Application policy).
Please, see the Help -> Console -> DLP -> DLP rules -> Security policies -> Security Settings – Data
Policy for detailed information about all the options you can set here in this view.
2. Configure the DLP rules
The Security policies that you have created can be assigned to Data or Application categories. New
rules can be set in DLP -> DLP rules.
1) Choose Data or Application category from the list that you want to restrict. If no category
fits, create a new one (see Checking categories above). Click Next.
2) Select the Security policy that you want to apply for the chosen category. If no policy fits,
create a new one (See Creating security policy section above).
3) Select mode how the DLP policy should be applied (Restrictive – Informative - Testing)
4) Click Finish to add DLP rule to the list and click to save and apply DLP rule to selected
groups, users or PCs.
User groups
To create an effective DLP policy, it is needed to set the right structure of computers and users in
your company network. Different settings (monitoring, restrictions …) can be applied to different
users (computers) or groups of users depending on their role or needs in the company.
There are two built-in groups that cannot be deleted: Unknown and Active Directory.
Unknown - once a new client is connected, the newly connected users and computers are allocated
into this group. You can copy and paste/move these users and computers from the Unknown group
to the groups you have created by yourself. If you delete a user or computer from your own groups,
they will move back to the Unknown group. The same applies to the users and computers from a
group which has been deleted in the user tree. Delete the users or computers from the Unknown
group to erase them completely.
Active Directory – this is used for Active Directory synchronization to server. You can select the
Active Directory tree in the Server settings and, after confirmation, users and computers will be
loaded into the AD group. If the computers already exist in Unassigned category, they will move to
AD tree. If they already exist in different group, they will be in both – AD tree and original group. This
group is read-only, so you cannot create new users and computers here nor delete existing ones, but
you can copy them into your custom groups. The AD group is only used as a connection between the
Active Directory tree and the user tree in console.
More detailed description of User tree and its settings you can find in Help -> Console -> Interface
description -> User tree
Web and application categories
Settings of Categories is available in Maintenance -> Categories. Safetica can monitor or restrict
specific web sites, applications or file types. Therefore there are three databases with the most
known Application, Web and File type categories that you can use in DLP rules. Each category has its
own tab. You can customize every category based on your company needs. Items which are not
categorized yet are listed in the Unknown category. Another possibility to categorize Websites and
Applications is in Auditor. On respective view – you will see uncategorized items, choose Web
Categorization (Applications Categorization) layout, click on the Unknown category and choose the
correct one.
DLP Zones
All settings regarding Zones is available in DLP -> Zones.
Zones can be used for creating named sets of external devices, printers, IP addresses, network paths
and e-mail addresses which we can link to as separate entities. You can then use them in Security
Policies, DLP rules and Device Control. Zones can be arranged in a tree structure.
In the first tab Zone content, there are two basic categories – Allowed and Denied. You can create any
other category based on your needs (departments, offices, groups of users, etc.) and structure it by
setting a parent zone.
Any new device that has been found on workstations with Safetica client will be shown in the second
tab – Unassigned items. You can assign devices to prepared categories, or create a new category.
Mark the field you want the device assign to and then add selected device by clicking on Add, or
simply drag and drop the item to the middle field.
You can add two types of items – External device and Network. Details about each item and its
settings can be found in Help. Here in Zones, you will set only the structure of Zones and items,
which belong to each zone. Any device connected to computer with Safetica client will show up
automatically and you can simply add them to the Zone of your choice. The rules that will apply to
each zone can be set in DLP Rules, Security policies or Device control.
Advanced DLP: Secure channels
Using Safetica DLP you can restrict the input and output channels by specifying the restrictions in File
guard and external devices restriction in Device control.
1) From User tree, choose the group you want apply the settings on
2) Choose Enable, Disable or Inherit on selected group/user. If you choose inherit, the settings
will be same as for parent group.
1) General settings of all ports (section Advanced settings), which will be applied to all new and
unknown devices
2) Settings in zones
a. List of devices connected to workstations with client
b. Zones created for customized settings
General settings are made on each port separately. It defines the default behavior when an unknown
device is connected. When you know a device, you can add it to a certain zone and set a different
rule. If you want to add new device to Zone or edit Zone, click on Add devices or edit zones (see
chapter DLP Zones on how to edit them). Zone settings have always higher priority than port settings.
For example, if USB ports are disabled in the port settings but enabled for a certain zone, the use of
USB ports will be enabled in that particular zone.
All settings here – either in zones or in ports – have six options to choose from.
More detailed info you will in Help -> DLP -> Device control
1) From User tree, choose the group you want apply the settings on
2) Choose Enable, Disable or Inherit on selected group/user. If you choose inherit, the settings
will be same as for parental group.
Logging settings
At the top of the settings page is logging settings with 3 easy options: Disabled – Inherit – Enabled.
You can find the log in the Visualization mode in the top menu.
Paths
There are four categories, which you can apply the settings on. At any location, the settings are
always Inherit – Deny – Read only – Allow.
Always keep in mind that all the settings you do here is only valid for group of users/computers that
you have selected in Users tree on the left side. Read more details in Help -> DLP -> Disk guard.