- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
- About File Auditing
Setting up File Audit
- About Endpoint DLP
Setting up Endpoint DLP
- About File Analysis
Setting up File Analysis
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
- Technician configuration
- Email configuration
- Notification filters
- Manage agent
- SIEM integration
- Business hours configuration
About DataSecurity Plus
DataSecurity Plus uses predefined policies to identify endpoint security vulnerabilities in real time.
You can monitor the following security policies using the Endpoint DLP solution:
Data Leak Prevention
Block files containing business-critical data from leaving the network via USBs and email.
File Activity Monitoring
Audit accesses and changes made to files in workstations.
File Copy Auditing
Audit file copy actions by users both within workstations as well as to external storage devices.
File Integrity Monitoring
Detect and respond to unauthorized changes made to sensitive files by users.
Potential Malware Intrusion
Detect potential malware by receiving alerts when safe threshold limits are breached.
Removable Device Auditing
Audit the use of USBs and other removable storage devices.
Sensitive File Activity Monitoring and Response
Receive reports on user activities in files containing sensitive data such as PII and ePHI.
Follow the steps below to modify the predefined policies:
- Click the Endpoint tab. Go to Configuration > Settings > Policy.
- Select the edit icon next to a predefined policy to modify it.
- Add or remove rules configured under Audit Profiles and Alert Profiles.
- Click Save.
To create new audit or alert policies, follow the below steps:
- Click the Endpoint tab. Go to Configuration > Settings > Policy Configuration.
- Click + Add Policy at the top-right corner.
- Name the policy and include an appropriate description.
- Choose the endpoints that it applies to.
- Choose the Audit Profiles and Alert Profiles that you want to add.
Example: If you want to block sensitive file movements to USB devices, choose the Data Leak Prevention - USB alert profile.
- Click Save.
Don't see what you're looking for? Ask the Community