Tier 02.03
Tier 02.03
Introdução
General policy
Data policy
Data policies can be applied to files classified with a data category or files that
meet criteria of multiple data categories. The easiest use case is applying a
DLP policy to files that belong to a single data category (Context, Content,
Third-party, or File properties).
In addition, each data DLP policy can be associated with one context data
category and multiple content, third-party, and file properties data categories.
This way, you can create combinations of data categories that define sensitive
data accurately. For example, you can apply restrictions specifically to
documents saved in a certain folder (tagged with context data category) that
contain sensitive content (defined in a sensitive data category). Another use
case is imposing restrictions on files exported from an application (tagged with
context data category) that have a specific file extension (defined in file
properties data category).
Application policy
Please note that the set of rules available in each DLP policy type is slightly
different. The sets of rules within individual data DLP policies differ also based
on what type of data category the policy is associated with.
Política de dados
Além disso, cada política de DLP de dados pode ser associada a uma
categoria de dados de contexto e a várias categorias de dados de conteúdo, de
terceiros e de propriedades de arquivo. Dessa forma, você pode criar
combinações de categorias de dados que definem dados confidenciais com
precisão. Por exemplo, você pode aplicar restrições especificamente a
documentos salvos em uma determinada pasta (marcada com categoria de
dados de contexto) que contenham conteúdo confidencial (definido em uma
categoria de dados confidenciais). Outro caso de uso é impor restrições a
arquivos exportados de um aplicativo (marcado com categoria de dados de
contexto) que possuem uma extensão de arquivo específica (definida na
categoria de dados de propriedades do arquivo).
Política de aplicativos
Disabled – in this mode, the policy is disabled. You can use this
mode to temporarily turn off the restrictions.
Log only – the action is logged, however, the user is not notified,
nor are any other restrictions applied.
Log and notify – the action is logged and the user is notified
about violating the DLP policy via a pop-up window shown on
their computer. The user can decide whether they want to
continue with the action, or cancel it.
Log and block – the action is logged and subsequently blocked.
The user is informed about that in a pop-up window that
appears in the lower right corner of their screen. For blocking
policies, you can also enable the Override feature – which will
be explained in the next chapter.
For any policy in the Log only, Log and notify, and Log and block modes,
you can enable the Shadow copy feature – which will be described in a
forthcoming chapter too.
After choosing the DLP policy mode, you can set up restrictions for each
supported channel. Settings of previously created DLP policies will be
available as templates that you can easily load. The video below explains
all available channels and the behavior on endpoints:
Additional resources
Assignment
Task
Create a general DLP policy that logs and notify users when
performing exactly the following operations:
Hint:
After uploading your answer you can carry on to the following unit.
Use the drop-down menu or arrow on the top of this page.
Configurações de política de DLP
Recursos adicionais
Tarefa
Tarefa
Crie uma política geral de DLP que registre e notifique os usuários ao
realizar exatamente as seguintes operações:
Dica:
Safetica ONE uses DLP policies for data protection on endpoints and for
controlling application behavior.
Every policy contains one or more rules (e.g. for upload, email, external
devices, etc.).
Each rule is evaluated and applied separately.
First match always applies.
Actions which are not specified in a policy will be managed by other policies
placed lower in the DLP policy list.
Example: When a policy is found with a first-match rule for upload, the assigned action
will be performed, and upload will not be evaluated any further. Evaluation will
continue, however, for other operations (e.g. for email or external devices). These will
be evaluated by policies placed lower in the list until a first match is found.
Policy types
There are three types of DLP policies in Safetica ONE:
We recommend placing general and other less strict DLP policies into the lower
part of the list. More specific and strict policies can be placed into the upper
part.
Policy modes
Every DLP policy can be set to 4 different modes which affect how policy rules
are applied:
Disabled – the policy is defined but does not affect anything. This mode is
useful when you prepare a policy which will only be applied later.
Log only – the policy audits and logs both restricted and allowed actions.
Log and notify – user is notified about performing restricted actions, which are
also logged if performed. Allowed actions are only logged. Safetica ONE
does not log: Delete, Create, Rename, Copy/Move within one physical
storage (exceptions: destination is a cloud folder; DLP rule is applied to the
operation).
Log and block – restricted actions are blocked altogether and
logged. Allowed actions are only logged.
Policy rule overview
File transfer from local
computers to cloud drives via sync
clients or web interface.
Applies only to
File transfer to external devices. devices
External devices connected as
Available for all policies. USB mass
storage.
connections.
User override is
not available for
Other network
Available for application policies and
connection.
data policies of the context type.
These operations
will be blocked,
even when
override is
enabled.
Shadow
copies are not
created for Print
Printing in general, including virtual and Virtual print
print. yet.
Shadow
copies are not
created for
Screen capture
operations.
User override is
not available for
Taking screenshots, screen sharing and Screen capture.
screen recording. These operations
Screen capture will be blocked,
Available for data and application even when
policies. override is
enabled.
These operations
are not logged. If
you create a Log
only policy, it will
not perform any
action.
This is an expert
setting, which
Application whitelisting or blacklisting
might negatively
for accessing sensitive data. Allows you
affect user
to determine which applications can or
workflow.
cannot work with sensitive data.
Shadow
Warning: By choosing the Log and
copies are not
block mode, it is possible to completely
created for
cut off certain applications from the data
Exclusive access.
they might need to work correctly.
Extreme care should be taken not to set
User override is
Exclusive access this rule incorrectly.
not available for
Exclusive access.
To enable exclusive access for one
These operations
specific application, create a new
will be blocked,
application category for it.
even when
override is
Available for data policies of the context
enabled.
type.
Can only be set
This rule is available in Safetica
for whole
Enterprise only.
application
categories.
Safetica ONE uses DLP policies for data protection on endpoints and for
controlling application behavior.
Every policy contains one or more rules (e.g. for upload, email, external
devices, etc.).
Each rule is evaluated and applied separately.
First match always applies.
Actions which are not specified in a policy will be managed by other policies
placed lower in the DLP policy list.
Example: When a policy is found with a first-match rule for upload, the assigned action
will be performed, and upload will not be evaluated any further. Evaluation will
continue, however, for other operations (e.g. for email or external devices). These will
be evaluated by policies placed lower in the list until a first match is found.
Policy types
There are three types of DLP policies in Safetica ONE:
We recommend placing general and other less strict DLP policies into the lower
part of the list. More specific and strict policies can be placed into the upper
part.
Policy modes
Every DLP policy can be set to 4 different modes which affect how policy rules
are applied:
Disabled – the policy is defined but does not affect anything. This mode is
useful when you prepare a policy which will only be applied later.
Log only – the policy audits and logs both restricted and allowed actions.
Log and notify – user is notified about performing restricted actions, which are
also logged if performed. Allowed actions are only logged. Safetica ONE
does not log: Delete, Create, Rename, Copy/Move within one physical
storage (exceptions: destination is a cloud folder; DLP rule is applied to the
operation).
Log and block – restricted actions are blocked altogether and
logged. Allowed actions are only logged.
Policy rule overview
File transfer from local
computers to cloud drives via sync
clients or web interface.
Applies only to
File transfer to external devices. devices
External devices connected as
Available for all policies. USB mass
storage.
Policy rule Description Limitations
yet.
User override is
not available for
rule Virtual print which applies only to
Print and Virtual
virtual printing into files.
print. These
operations will be
Available for all policies.
blocked, even
when override is
enabled.
Shadow
copies are not
created for
Clipboard
operations.
Copying text and images from restricted
User override is
applications via clipboard. In the Log
not available for
and block mode, clipboard operations
Clipboard. These
are allowed within the application that
Clipboard operations will be
owns the data, but transfers to other
blocked, even
applications are blocked.
when override is
enabled.
Available for data and application
policies.
These operations
are not logged. If
you create a Log
only policy, it will
not perform any
action.
Screen capture Taking screenshots, screen sharing and Shadow
screen recording. copies are not
created for
Available for data and application Screen capture
policies. operations.
User override is
not available for
Screen capture.
These operations
will be blocked,
even when
override is
enabled.
These operations
Policy rule Description Limitations
This is an expert
setting, which
Application whitelisting or blacklisting
might negatively
for accessing sensitive data. Allows you
affect user
to determine which applications can or
workflow.
cannot work with sensitive data.
Shadow
Warning: By choosing the Log and
copies are not
block mode, it is possible to completely
created for
cut off certain applications from the data
Exclusive access.
they might need to work correctly.
Extreme care should be taken not to set
User override is
Exclusive access this rule incorrectly.
not available for
Exclusive access.
To enable exclusive access for one
These operations
specific application, create a new
will be blocked,
application category for it.
even when
override is
Available for data policies of the context
enabled.
type.
Can only be set
This rule is available in Safetica
for whole
Enterprise only.
application
categories.
DLP policies in Safetica ONE
This article explains how DLP policies and related rules work in
Safetica ONE for controlling various communication channels.
Safetica ONE uses DLP policies for data protection on endpoints and for
controlling application behavior.
Every policy contains one or more rules (e.g. for upload, email, external
devices, etc.).
Each rule is evaluated and applied separately.
First match always applies.
Actions which are not specified in a policy will be managed by other policies
placed lower in the DLP policy list.
Example: When a policy is found with a first-match rule for upload, the assigned action
will be performed, and upload will not be evaluated any further. Evaluation will
continue, however, for other operations (e.g. for email or external devices). These will
be evaluated by policies placed lower in the list until a first match is found.
Policy types
There are three types of DLP policies in Safetica ONE:
We recommend placing general and other less strict DLP policies into the lower
part of the list. More specific and strict policies can be placed into the upper
part.
Policy modes
Every DLP policy can be set to 4 different modes which affect how policy rules
are applied:
Disabled – the policy is defined but does not affect anything. This mode is
useful when you prepare a policy which will only be applied later.
Log only – the policy audits and logs both restricted and allowed actions.
Log and notify – user is notified about performing restricted actions, which are
also logged if performed. Allowed actions are only logged. Safetica ONE
does not log: Delete, Create, Rename, Copy/Move within one physical
storage (exceptions: destination is a cloud folder; DLP rule is applied to the
operation).
Log and block – restricted actions are blocked altogether and
logged. Allowed actions are only logged.
Policy rule overview
File transfer from local
computers to cloud drives via sync
clients or web interface.
Applies only to
File transfer to external devices.
devices connected
External devices
as USB mass
Available for all policies.
storage.
User override is
not available for
Other network
Available for application policies and connection. These
data policies of the context type. operations will be
blocked, even
when override is
enabled.
Shadow
copies are not
created for Print
Printing in general, including virtual and Virtual print
print. yet.
capture operations.
User override is
not available for
Screen capture.
These operations
will be blocked,
even when
Available for data and application override is
policies. enabled.
These operations
are not logged. If
you create a Log
only policy, it will
not perform any
action.
Access to specified paths on local
drives.
Esta é uma
Atenção: Ao escolher o modo Log e configuração de
bloqueio , é possível cortar especialista, que
completamente um destino de todos pode afetar
os acessos. Extremo cuidado deve ser negativamente o
tomado para não definir esta regra fluxo de trabalho
Local paths
incorretamente. do usuário.
A substituição do
usuário não está
disponível para
Para habilitar o acesso exclusivo a um acesso
aplicativo específico, crie uma nova exclusivo. Essas
categoria de aplicativo para ele. operações serão
bloqueadas,
Disponível para políticas de dados do mesmo quando a
tipo de contexto. substituição estiver
habilitada.
Esta regra está disponível apenas no
Safetica Enterprise. Só pode ser
definido para
categorias inteiras
de aplicativos.
Genera
Existing
Available l Sensitiv Contex Applicatio
Policy rule classificatio
settings policies e data t rules n policy
n
Restricted
| Safe zones
Upload x x x x
allowed/Custo
m | Allowed
Restricted
| Safe zones
E-mail x x x x
allowed/Custo
m | Allowed
Restricted
| Safe zones
External devices x x x x x
allowed/Custo
m | Allowed
Cloud drives
Box Sync
Dropbox
Google
Restricted |
Drive
Custom |
OneDrive x x x x x
Allowed
Busines
s
OneDrive
Persona
l
SharePoint
Restricted |
Virtual print x x x x x
Allowed
Restricted |
Safe zones
Print x x x x x
allowed/Custo
m | Allowed
Restricted |
Remote transfer x
Allowed
Restricted |
Burning x
Allowed
Restricted
| Safe zones
Network (expert) x x
allowed/Custo
m | Allowed
Polític
as de
dados
Políti
Regra Política
cas Dados Classific
Regra de Configurações s de de
gerai sensív ação
política disponíveis conte aplicati
s eis existente
xto vos
Carregar para
compartilham Restrito
x x x x
ento de | Permitido
arquivos
Carregar para Restrito
x x x x
o webmail | Permitido
Restrito | Zonas
seguras
Carregar permitidas/Person x x x x
alizadas
| Permitido
Restrito | Zonas
seguras
E-mail permitidas/Person x x x x
alizadas
| Permitido
Mensagem Restrito
x x x x
instantânea | Permitido
Restrito | Zonas
seguras
Dispositivos
permitidas/Person x x x x x
externos
alizadas
| Permitido
Unidades de Restrito x x x x x
nuvem | Personalizado
| Permitido
Sincron
izaçã
o de
caixa
Dropbo
x
Google
Drive
Negóci
os
do
One
Drive
OneDri
ve
Pess
oal
ShareP
oint
Impressão Restrito
x x x x x
virtual | Permitido
Restrito | Zonas
seguras
Imprimir permitidas/Person x x x x x
alizadas
| Permitido
Área de
Restrito
transferência x x x x
| Permitido
(sem registro)
Captura de
Restrito
tela (sem x x x x
| Permitido
registro)
Transferência Restrito
x
remota | Permitido
Restrito
Queimando x
| Permitido
Restrito | Zonas
seguras
Rede
permitidas/Person x x
(especialista)
alizadas
| Permitido
Caminhos (precisa de
locais configuração x x
(especialista) personalizada)
Acesso (precisa de x
exclusivo configuração
(especialista) personalizada)
Assignment
Task
Create a general DLP policy that logs and notify users when
performing exactly the following operations:
Hint:
After uploading your answer you can carry on to the following unit.
Use the drop-down menu or arrow on the top of this page.
Tarefa
Crie uma política geral de DLP que registre e notifique os usuários ao
realizar exatamente as seguintes operações:
Dica: