Endpoint DLP Policy Deployment

After creating a data rule, the next crucial step is deploying it. Deploying a policy ensures that the data rules are enforced on endpoints, providing real-time protection for sensitive information across your network.

  1. To deploy a policy Go to Policy Deployment -> Associate Policy.
  2. In the Select Custom Group option, Select the Computer groups to associate with the policy.

Data Discovery

Select the relevant data rules from the data classification set up earlier to apply within the policy.

Password-protected files can be classified as sensitive, with support for formats including 7z, zip, tar, Bzip2, xz, Gzip, RAR, RAR4, RAR5, WIM, ISO, ARG, and ISOUDF.

Policy deployment

Data Leakage Prevention

To manage the various access control for sensitive files, navigate to Policy Deployment -> Data Loss Prevention.

Application Access Settings

File Access

The File Access feature enables admins to specify which applications are permitted to access and open sensitive files.

  • Not Configured: No restrictions or monitoring are applied. All applications can access sensitive files, and no file access activity will be audited.
  • Audit Only: All applications can access and read the data, but all activity is tracked and recorded, with detailed insights available for review.
  • Allow Within Trusted Applications: Enables admins to designate a list of trusted applications, ensuring that only the approved apps can access and open files classified as sensitive.
  • For enhanced security, the preview pane in Windows File Explorer can be disabled.

    Policy deployment

Email Client

The Email Client feature allows admins to define how Outlook handles sensitive files, ensuring secure file management during email communication.

  1. Not Configured: File sharing is allowed without any restrictions, and no email activity will be audited.
  2. Audit Only: All files can be shared, but any transfer of sensitive files is tracked and audited
  3. Allow Within Trusted Domains: Restricts the sharing of sensitive files to configured email domains only. Any attempt to transfer sensitive files outside these domains is blocked, ensuring files remain secure while enabling seamless internal collaboration.
  4. Block Emails with Sensitive Content/Attachments: Completely prevents the sharing of sensitive files through the email client, ensuring that sensitive data cannot be transmitted via email.

    Policy deployment

Consent Settings

Navigate to Policy Deployment -> Configure Consent Settings.
By enabling this consent, Endpoint DLP will be able to monitor the transfer of sensitive emails through the installation of Outlook add-ins. Without this consent, the add-ins will not be installed, and sensitive email transfers will go unmonitored.

Policy deployment

Peripheral Device Settings

Removable Storage Devices

Admins can control how sensitive files are managed when using removable storage devices, ensuring secure handling and preventing unauthorized data transfers.

  1. Not Configured: No restrictions are applied. Sensitive files can be transferred to removable storage devices without any limitations, and no transfer activity will be audited.
  2. Audit Only: Files containing sensitive data can be transferred, but all such transfers are tracked and audited.
  3. Allow Within Trusted Devices: Lets admins define a list of trusted devices. Transfer of sensitive files is permitted only between these approved devices, while transfers to all other devices are blocked.
  4. Block Sensitive File Transfers: Completely restricts the transfer of files containing sensitive data to removable storage devices, ensuring that sensitive data cannot be moved or copied.

    Policy deployment

Printers

Admins can manage the handling of sensitive files during printing, ensuring secure processing and preventing unauthorized access or distribution.

  1. Not Configured: No restrictions are applied. Sensitive files can be printed without any limitations, and no print activity will be audited.
  2. Audit Only: Printing of sensitive documents is allowed, but all print activities are tracked and audited.
  3. Allow Within Trusted Devices: Printing of sensitive files is permitted only on trusted printers, while printing on all other devices is blocked to ensure security.
  4. Block Sensitive File Prints: Printing of sensitive files is completely restricted, preventing any unauthorized printing.

    Policy deployment

Note: Printing restrictions are currently not supported for classifications based on context, such as file extension-based classification.

  • Custom watermarks can be configured to print on documents from trusted sources (application included File Access and Outlook), adding an extra layer of identification and security.
  • An option is available to allow users to override restrictions with business reasons, allowing the printing of sensitive content on other printers.

    Policy deployment

Web Application Settings

File Upload

Configure settings to prevent the upload of sensitive files to the web, ensuring that critical data remains secure.

  1. Not Configured: No restrictions are applied. Sensitive files can be uploaded without any limitations, and no file upload activity will be audited.
  2. Audit Only: There are no restrictions on data uploads. However, when sensitive data is uploaded to non-trusted domains, the activity is audited.
  3. Allow Within Trusted Domains: Permits the upload of sensitive data only through trusted domains, while uploads to untrusted domains are restricted.
  4. Block sensitive File Uploads: Completely restricts the upload of sensitive files to any domain or destination.

    Policy deployment

  5. Choose the web browsers to monitor for file uploads.
  6. Add a list of trusted domains where sensitive file uploads should not be tracked.

    Policy deployment

Note: File uploads are restricted using a browser extensions, so monitoring does not occur in Private Browsing or Guest Mode. It is recommended to disable these modes in managed browsers to ensure full tracking of file uploads.

Consent Settings

  1. Navigate to Policy Deployment -> Configure Consent Settings.
  2. Providing consent installs the browser plugin, allowing Endpoint DLP to block sensitive file uploads to the web. Without consent, the plugin will not be installed, and sensitive file uploads cannot be restricted.

    Policy deployment

File Download

Under the settings option, you can enable the feature to automatically mark files created from enterprise apps or downloaded from corporate web domains or emails as sensitive by default.

Policy deployment

Clipboard settings

Screen Capture

The Screen Capture feature allows admins to enable or restrict screen capture.

  1. The Allow option permits all users to take screenshots of sensitive data without restrictions.
  2. Block Within Trusted Applications restricts screenshots of sensitive data within any trusted application listed under the File Access settings, ensuring enhanced data security.

Policy deployment

Note: The trusted applications are the taken from the application list of File Access.

Clipboard Restrictions

The Clipboard Restriction option prevents copying information from trusted applications to untrusted ones, while still allowing file copying within the trusted applications listed.

Policy deployment

False Positives and Overrides

False Positives

The Automatically Override if False-Positive feature allows users to bypass a block if they believe a non-sensitive file has been incorrectly flagged as sensitive. All overrides are logged in the audit for review. This option can be enabled temporarily until the DLP policy is fine-tuned, ensuring employee productivity remains unaffected.

Policy deployment

Configuring Email Alerts

The Mail Configuration feature allows you to configure email notifications that are sent to admins whenever a user raises a business override or reports a false positive. This ensures that administrators are alerted in real time and can take immediate action to review and address the incident.

Policy deployment

Mail Notification Settings

  1. Navigate to Settings -> Configure Mail Notification.
  2. Add the list of email addresses that need to be notified when an override is reported.

    Policy deployment