Symantec Data Loss Prevention Administra
Symantec Data Loss Prevention Administra
Prevention Administration
Guide
Version 15.0
Legal Notice
Copyright © 2017 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo and the Checkmark Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to
provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs
are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under those
open source or free software licenses. Please see the Third Party Legal Notice Appendix to
this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Symantec as on premises
or hosted services. Any use, modification, reproduction release, performance, display or
disclosure of the Licensed Software and Documentation by the U.S. Government shall be
solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Contents
Ensure data source has at least one column of unique data ........... 519
Cleanse the data source file of blank columns and duplicate
rows ............................................................................. 520
Remove ambiguous character types from the data source
file ............................................................................... 521
Understand how multi-token cell matching functions .................... 521
Do not use the comma delimiter if the data source has number
fields ............................................................................ 522
Map data source column to system fields to leverage
validation ...................................................................... 522
Ensure that the data source is clean for indexing ......................... 523
Leverage EDM policy templates when possible ........................... 523
Include column headers as the first row of the data source
file ............................................................................... 523
Check the system alerts to tune profile accuracy ......................... 524
Use stopwords to exclude common words from detection .............. 524
Use scheduled indexing to automate profile updates .................... 524
Match on 3 columns in an EDM condition to increase detection
accuracy ....................................................................... 525
Leverage exception tuples to avoid false positives ....................... 526
Use a WHERE clause to detect records that meet specific
criteria .......................................................................... 527
Use the minimum matches field to fine tune EDM rules ................. 527
Combine Data Identifiers with EDM rules to limit the impact of
two-tier detection ............................................................ 527
Include an email address field in the Exact Data Profile for profiled
DGM ............................................................................ 528
Use profiled DGM for Network Prevent for Web identity
detection ....................................................................... 528
■ Quarantine file restoration. Network Protect can easily restore quarantined files
to their original or a new location.
■ Enforce access control and encryption policies. Network Protect proactively
ensures workforce compliance with existing access control and encryption
policies.
See “About Symantec Data Loss Prevention” on page 58.
See “Configuring Network Protect for file shares” on page 1671.
■ IM
■ Network shares
■ Print/Fax
■ USB removable media devices
See “About Endpoint Discover” on page 63.
See “About Symantec Data Loss Prevention” on page 58.
Chapter 2
Getting started
administering Symantec
Data Loss Prevention
This chapter includes the following topics:
Icon Description
Help. Click this icon to access the context-sensitive online help for your
current page.
Select this page as your Home page. If the current screen cannot be
selected as your Home page, this icon is unavailable.
Icon Description
Print the current report. If the current screen contents cannot be sent to
the printer, this icon is unavailable.
Email the current report to one or more recipients. If the current screen
contents cannot be sent as an email, this icon is unavailable.
See “Logging on and off the Enforce Server administration console” on page 67.
■ Add the data profiles that you plan to associate with policies.
Data profiles are not always required. This step is necessary only if you are
licensed for data profiles and if you intend to use them in policies.
3 Click Save.
See “About the administrator account” on page 68.
See “About the Enforce Server administration console” on page 66.
See “About the Overview screen” on page 251.
administration console menus, labels, screens, and Help system are not
translated and remain in English.
See “About locales” on page 79.
■ Translated. The language you choose may not display the notice Translations
not available. In this case, in addition to the number and date format, and sort
order, the administration console menus, labels, screens, and in some cases
the Help system, are translated into the chosen language.
See “About Symantec Data Loss Prevention language packs” on page 78.
2 Click Save.
The new text encoding is applied to CSV exported files. This encoding lets you
select a text encoding that matches the encoding that is expected by CSV
applications.
To select a CSV delimiter
1 Choose one of the delimiters from the pull-down menu.
2 Click Save.
The new delimiter is applied to the next comma-separated values (CSV) list
that you export.
See “About incident reports” on page 1405.
See “Exporting incident reports” on page 1425.
To select XML export details
1 Include Incident Violations in XML Export. If this box is checked, reports
exported to XML include the highlighted matches on each incident snapshot.
2 Include Incident History in XML Export. If this box is checked, reports
exported to XML include the incident history data that is contained in the History
tab of each incident snapshot.
3 Click Save.
Your selections are applied to the next report you export to XML.
Getting started administering Symantec Data Loss Prevention 73
Changing your password
If neither box is checked, the exported XML report contains only the basic incident
information.
See “About incident reports” on page 1405.
See “Exporting incident reports” on page 1425.
■ About locales
■ International character sets. To view and work with international character sets,
the system on which you are viewing the Enforce Server administration console
must have the appropriate capabilities.
See “Working with international characters” on page 77.
■ Locale-based date and number formats, as well as sort orders for lists and
reports.
See “About locales” on page 79.
■ Localized user interface (UI) and Help system. Language packs for Symantec
Data Loss Prevention provide language-specific versions of the Enforce Server
administration console. They may also provide language-specific versions of
the online Help system.
Note: These language packs are added separately following initial product
installation.
Note: A mixed language notification pop-up displays if the user locale language
does not match the language used in the response rule.
For additional information about specific languages, see the Symantec Data Loss
Prevention Release Notes.
A number of capabilities are not implied by this support:
■ Technical support provided in a non-English language. Because Symantec Data
Loss Prevention supports a particular language does not imply that technical
support is delivered in that language.
■ Localized administrative user interface (UI) and documentation. Support for a
language does not imply that the UI or product documentation has been localized
into that language. However, even without a localized UI, user-defined portions
of the UI such as pop-up notification messages on the endpoint can still be
localized into any language by entering the appropriate text in the UI.
■ Localized content. Keywords are used in a number of areas of the product,
including policy templates and data identifiers. Support for a language does not
imply that these keywords have been translated into that language. Users may,
however, add keywords in the new language through the Enforce Server
administration console.
■ New file types, protocols, applications, or encodings. Support for a language
does not imply support for any new file types, protocols, applications, or
encodings that may be prevalent in that language or region other than what is
already supported in the product.
■ Language-specific normalization. An example of normalization is to treat accented
and unaccented versions of a character as the same. The product already
performs a number of normalizations, including standard Unicode normalization
that should cover the vast majority of cases. However, it does not mean that all
potential normalizations are included.
■ Region-specific normalization and validation. An example of this is the awareness
that the product has of the format of North American phone numbers, which
allows it to treat different versions of a number as the same, and to identify
invalid numbers in EDM source files. Support for a language does not imply this
kind of functionality for that language or region.
Items in these excluded categories are tracked as individual product enhancements
on a language- or region-specific basis. Contact Symantec Technical Support for
additional information on language-related enhancements or plans for the languages
not listed.
See “About support for character sets, languages, and locales” on page 74.
■ The operating system-based character set installed on the computer from which
you view the Enforce Server administration console
■ The capabilities of your browser
For example, an incident report on a scan of Russian-language data would contain
Cyrillic characters. To view that report, the computer and browser you use to access
the Enforce Server administration console must be capable of displaying these
characters. Here are some general guidelines:
■ If the computer you use to access the Enforce Server administration console
has an operating system localized for a particular language, you should be able
to view and use a character set that supports that language.
■ If the operating system of the computer you use to access the administration
console is not localized for a particular language, you may need to add
supplemental language support. This supplemental language support is added
to the computer you use to access the administration console, not on the Enforce
Server.
■ On a Windows system, you add supplemental language support using the
Control Panel > Regional and Language Options > Languages (tab) -
Supplemental Language Support to add fonts for some character sets.
Note: The Enforce Server administration console supports UTF-8 encoded data.
Caution: When you install a new version of Symantec Data Loss Prevention, any
language packs you have installed are deleted. For a new, localized version of
Symantec Data Loss Prevention, you must upgrade to a new version of the language
pack.
About locales
A locale provides the following:
■ Displays dates and numbers in formats appropriate for that locale.
■ Sorts lists and reports based on text columns, such as "policy name" or "file
owner," alphabetically according to the rules of the locale.
Locales are installed as part of a language pack.
An administrator can also configure an additional locale for use by individual users.
This additional locale need only be supported by the required version of Java.
For a list of these locales, see
http://www.oracle.com/technetwork/java/javase/javase7locales-334809.html.
The locale can be specified at product installation time, as described in the Symantec
Data Loss Prevention Installation Guide. It can also be configured at a later time
using the Language Pack Utility.
See “Using a non-English language on the Enforce Server administration console”
on page 80.
Working with languages and locales 80
Using a non-English language on the Enforce Server administration console
See “About support for character sets, languages, and locales” on page 74.
Note: The addition of multiple language packs could slightly affect Enforce Server
performance, depending on the number of languages and customizations present.
This results because an additional set of indexes has to be built and maintained
for each language.
See “About Symantec Data Loss Prevention language packs” on page 78.
See “About locales” on page 79.
A Symantec Data Loss Prevention administrator specifies which of the available
languages is the default system-wide language.
To choose the default language for all users
1 On the Enforce Server, go to System > Settings > General and click
Configure.
The Edit General Settings screen is displayed.
2 Scroll to the Language section of the Edit General Settings screen, and click
the button next to the language you want to use as the system-wide default.
3 Click Save.
Individual Symantec Data Loss Prevention users can choose which of the available
languages and locales they want to use by updating their profiles.
See “Editing a user profile” on page 70.
Administrators can use the Language Pack Utility to update the available languages.
Working with languages and locales 81
Using the Language Pack Utility
Note: If the Enforce Server runs on a Linux host, you must install language fonts
on the host machine using the Linux Package Manager application. Language font
packages begin with fonts-<language_name>. For example,
fonts-japanese-0.20061016-4.el5.noarch
To use the Language Pack Utility, you must have Read, Write, and Execute
permissions on all of the \SymantecDLP folders and subfolders.
To display help for the utility, such as the list of valid options and their flags, enter
LanguagePackUtility without any flags.
Note: Running the Language Pack Utility causes the VontuManager and
VontuIncidentPersister services to stop for as long as 20 seconds. Any users
who are logged on to the Enforce Server administration console will be logged out
automatically. When finished making its updates, the utility restarts the services
automatically, and users can log back on to the administration console.
Language packs for Symantec Data Loss Prevention can be obtained from Symantec
File Connect.
Working with languages and locales 82
Using the Language Pack Utility
LanguagePackUtility -a filename
where filename is the fully qualified path and name of the language pack ZIP
file.
For example, if the Japanese language pack ZIP file is stored in c:\temp, add
it by entering:
LanguagePackUtility -a c:\temp\Symantec_DLP_15.0_Japanese.zip
To add multiple language packs during the same session, specify multiple file
names, separated by spaces, for example:
LanguagePackUtility -a
c:\temp\Symantec_DLP_15.0_Japanese.zip
Symantec_DLP_15.0_Chinese.zip
3 Log on to the Enforce Server administration console and confirm that the new
language option is available on the Edit General Settings screen. To do this,
go to System > Settings > General > Configure > Edit General Settings.
To add a language pack (Linux)
1 Advise other users that anyone currently using the Enforce Server administration
console must save their work and log off.
2 Open a terminal session to the Enforce Server host and switch to the
DLP_system_account by running the following command:
su - DLP_system_account
4 Log on to the Enforce Server administration console and confirm that the new
language option is available on the Edit General Settings screen. To do this,
go to System > Settings > General > Configure > Edit General Settings.
Working with languages and locales 83
Using the Language Pack Utility
LanguagePackUtility -r locale
LanguagePackUtility -r fr_FR
To remove multiple language packs during the same session, specify multiple
file names, separated by spaces.
3 Log on to the Enforce Server administration console and confirm that the
language pack is no longer available on the Edit General Settings screen.
To do this, go to System > Settings > General > Configure > Edit General
Settings.
Removing a language pack has the following effects:
■ Users can no longer select the locale of the removed language pack for individual
use.
Note: If the locale of the language pack is supported by the version of Java
required for running Symantec Data Loss Prevention, the administrator can later
specify it as an alternate locale for any users who need it.
LanguagePackUtility -c locale
where locale is a valid locale code recognized by Java, such as pt_PT for
Portuguese.
For example, to change the locale to Brazilian Portuguese enter:
LanguagePackUtility -c pt_BR
3 Log on to the Enforce Server administration console and confirm that the new
alternate locale is now available on the Edit General Settings screen. To do
this, go to System > Settings > General > Configure > Edit General Settings.
If you specify a locale for which there is no language pack, "Translations
not available" appears next to the locale name. This means that formatting
and sort order are appropriate for the locale, but the Enforce Server
administration console screens and online Help are not translated.
Note: Administrators can only make one additional locale available for users that
is not based on a previously installed Symantec Data Loss Prevention language
pack.
See “About support for character sets, languages, and locales” on page 74.
Section 2
Managing the Enforce Server
platform
Vontu Update Installs the Symantec Data Loss Prevention system updates.
Managing Enforce Server services and settings 87
About starting and stopping services on Windows
■ VontuManager
■ VontuIncidentPersister
Note: Start the VontuNotifier service first before starting other services.
■ VontuIncidentPersister
■ VontuManager
■ VontuNotifier
■ VontuUpdate
To stop the Symantec Data Loss Prevention Services on a Windows detection server
1 On the computer that hosts the detection server, navigate to Start > All
Programs > Administrative Tools > Services to open the Windows Services
menu.
2 From the Services menu, stop all running Symantec Data Loss Prevention
services, which might include the following services:
■ VontuUpdate
■ VontuMonitor
■ VontuManager
■ VontuIncidentPersister
■ VontuMonitor
■ VontuIncidentPersister
■ VontuManager
■ VontuNotifier
3 Before starting other Symantec Data Loss Prevention services, to start the
Vontu Notifier service, enter:
./VontuNotifier.sh start
./VontuManager.sh start
./VontuIncidentPersister.sh start
./VontuUpdate.sh start
./VontuMonitorController.sh start
./VontuUpdate.sh stop
./VontuIncidentPersister.sh stop
./VontuManager.sh stop
./VontuMonitorController.sh stop
./VontuNotifier.sh stop
To start the Symantec Data Loss Prevention services on a Linux detection server
1 On the computer that hosts the detection server, log on as root.
2 Change directory to /opt/SymantecDLP/Protect/bin.
3 To start the Symantec Data Loss Prevention services, enter:
./VontuMonitor.sh start
./VontuUpdate.sh start
./SyamantecDLPUpdate.sh stop
./VontuMonitor.sh stop
3 Before starting other Symantec Data Loss Prevention services, to start the
Vontu Notifier service, enter:
./VontuNotifier.sh start
./VontuManager.sh start
./VontuMonitor.sh start
./VontuIncidentPersister.sh start
./VontuUpdate.sh start
./VontuMonitorController.sh start
./VontuUpdate.sh stop
./VontuIncidentPersister.sh stop
./VontuManager.sh stop
./VontuMonitor.sh stop
./VontuMonitorController.sh stop
./VontuNotifier.sh stop
■ Configuring roles
Roles determine what a user can see and do in the Enforce Server administration
console. For example, the Report role is a specific role that is included in most
Symantec Data Loss Prevention solution packs. Users in the Report role can view
incidents and create policies, and configure Discover targets (if you are running a
Discover Server). However, users in the Report role cannot create Exact Data or
Document Profiles. Also, users in the Report role cannot perform system
administration tasks. When a user logs on to the system in the Report role, the
Manage > Data Profiles and the System > Login Management modules in the
Enforce Server administration console are not visible to this user.
You can assign a user to more than one role. Membership in multiple roles allows
a user to perform different kinds of work in the system. For example, you grant the
information security manager user (InfoSec Manager) membership in two roles:
ISR (information security first responder) and ISM (information security manager).
The InfoSec Manager can log on to the system as either a first responder (ISR) or
a manager (ISM), depending on the task(s) to perform. The InfoSec Manager only
sees the Enforce Server components appropriate for those tasks.
You can also combine roles and policy groups to limit the policies and detection
servers that a user can configure. For example, you associate a role with the
European Office policy group. This role grants access to the policies that are
designed only for the European office.
See “Policy deployment” on page 345.
Users who are assigned to multiple roles must specify the desired role at log on.
Consider an example where you assign the user named "User01" to two roles,
"Report" and "System Admin." If "User01" wanted to log on to the system to
administer the system, the user would log on with the following syntax: Login:
System Admin\User01
See “Logging on and off the Enforce Server administration console” on page 67.
The Administrator user (created during installation) has access to every part of the
system and therefore is not a member of any access-control role.
See “About the administrator account” on page 68.
■ Understand the roles necessary for your business users and for the information
security requirements and procedures of your organization.
See “About recommended roles for your organization” on page 96.
■ Review the roles that created when you installed a solution pack. You can likely
use several of them (or modified versions of them) for users in your organization.
See “Roles included with solution packs” on page 97.
■ If necessary, modify the solution-pack roles and create any required new roles.
See “Configuring roles” on page 99.
■ Create users and assign each of them to one or more roles.
See “Configuring user accounts” on page 107.
■ Manage roles and users and remove those not being used.
See “Manage and add roles” on page 113.
See “Manage and add users” on page 113.
This role provides access to the Policies module and associated menu options
in the Enforce Server administration console. This role is suited for information
security managers who track incidents and respond to risk trends. An information
security manager can author new policies or modifying existing policies to prevent
data loss. All solution packs create an "InfoSec Manager" (ISM) role that has
policy authoring privileges.
■ Incident Responder
This role provides access to the Incidents module and associated menu options
in the Enforce Server administration console. Users in this role can track and
remediate incidents. Businesses often have at least two incident responder roles
that provide two levels of privileges for viewing and responding to incidents.
A first-level responder may view generic incident information, but cannot access
incident details (such as sender or recipient identity). In addition, a first-level
responder may also perform some incident remediation, such as escalating an
incident or informing the violator of corporate security policies. A second-level
responder might be escalation responder who has the ability to view incident
details and edit custom attributes. A third-level responder might be an
investigation responder who can create response rules, author policies, and
create policy groups.
All solution packs create an "InfoSec Responder" (ISR) role. This role serves
as a first-level responder. You can use the ISM (InfoSec Manager) role to provide
second-level responder access.
Your business probably requires variations on these roles, as well as other roles.
For more ideas about these and other possible roles, see the descriptions of the
roles that are imported with solution packs.
See “Roles included with solution packs” on page 97.
Exec Executive:
■ Users in this role can view, remediate, and delete incidents; look
up attributes; and view all custom attributes.
■ This role provides users with access privileges to prevent data
loss risk at the macro level. Users in this role can review the risk
trends and performance metrics, as well as incident dashboards.
HRM HR Manager:
■ Users in this role can view, remediate, and delete incidents; look
up attributes; and edit all custom attributes.
■ This role provides users with access privileges to respond to the
security incidents that are related to employee breaches.
■ Users in this role can view, remediate, and delete incidents; look
up attributes; and edit all custom attributes.
■ This role provides users with access privileges to research details
of incidents, including forwarding incidents to forensics. Users in
this role may also investigate specific employees.
■ Users in this role can view, remediate, and delete incidents. They
can look up attributes, edit all custom attributes, author policies
and response rules.
■ This role provides users with second-level incident response
privileges. Users can manage escalated incidents within
information security team.
Managing roles and users 99
Configuring roles
■ Users in this role can view and remediate incidents, and author
policies. They have no access to incident details.
■ This role provides a single role for policy authoring and data loss
risk management.
■ Users in this role can administer the system and the system users,
and can view incidents. They have no access to incident details.
Configuring roles
Each Symantec Data Loss Prevention user is assigned to one or more roles that
define the privileges and rights that user has within the system. A user’s role
determines system administration privileges, policy authoring rights, incident access,
and more. If a user is a member of multiple roles, the user must specify the role
when logging on, for example: Login: Sys Admin/sysadmin01.
See “About role-based access control” on page 94.
See “About configuring roles and users” on page 95.
To configure a role
1 Navigate to the System > Login Management > Roles screen.
2 Click Add Role.
The Configure Role screen appears, displaying the following tabs: General,
Incident Access, Policy Management, and Users.
3 In the General tab:
■ Enter a unique Name for the role. The name field is case-sensitive and is
limited to 30 characters. The name you enter should be short and
Managing roles and users 100
Configuring roles
self-describing. Use the Description field to annotate the role name and
explain its purpose in more details. The role name and description appear
in the Role List screen.
■ In the User Privileges section, you grant user privileges for the role.
System privileges(s):
People privilege:
Managing roles and users 101
Configuring roles
User Select the User Reporting option to enable users to view the user
Reporting risk summary.
(Risk
Note: The Incident > View privilege is automatically enabled for all
Summary,
incident types for users with the User Reporting privilege.
User
Snapshot) See “About user risk” on page 1476.
■ In the Incidents section, you grant users in this role the following incident
privilege(s). These settings apply to all incident reports in the system,
including the Executive Summary, Incident Summary, Incident List, and
Incident Snapshots.
View Select the View option to enable users in this role to view policy
violation incidents.
You can customize incident viewing access by selecting various
Actions and Display Attribute options as follows:
■ By default the View option is enabled (selected) for all types
of incidents: Network Incidents, Discover Incidents, and
Endpoint Incidents.
■ To restrict viewing access to only certain incident types,
select (highlight) the type of incident you want to authorize
this role to view. (Hold down the Ctrl key to make multiple
selections.) If a role does not allow a user to view part of an
incident report, the option is replaced with "Not Authorized"
or is blank.
Note: If you revoke an incident-viewing privilege for a role, the
system deletes any saved reports for that role that rely on the
revoked privilege. For example, if you revoke (deselect) the
privilege to view network incidents, the system deletes any
saved network incident reports associated with the role.
Managing roles and users 102
Configuring roles
Custom The Custom Attributes list includes all of the custom attributes
Attributes configured by your system administrator, if any.
■ Select View All if you want users to be able to view all
custom attribute values.
■ Select Edit All if you want users to edit all custom attribute
values.
■ To restrict the users to certain custom attributes, clear the
View All and Edit All check boxes and individually select
the View and/or Edit check box for each custom attribute
you want viewable or editable.
Note: If you select Edit for any custom attribute, the View check
box is automatically selected (indicated by being grayed out).
If you want the users in this role to be able to view all custom
attribute values, select View All.
■ In the Discover section, you grant users in this role the following privileges:
Folder Risk This privilege lets users view Folder Risk Reports. Refer to the
Reporting Symantec Data Loss Prevention Data Insight Implementation
Guide.
Note: This privilege is only available for Symantec Data Loss
Prevention Data Insight licenses.
Content Root This privilege lets users configure and run Content Root
Enumeration Enumeration scans. For more information about Content Root
Enumeration scans, See “Working with Content Root Enumeration
scans” on page 1654.
4 In the Incident Access tab, configure any conditions (filters) on the types of
incidents that users in this role can view.
Note: You must select the View option on the General tab for settings on the
Incident Access tab to have any effect.
For example, select Policy Group from the first drop-down list, select Is
Any Of from the second list, and then select Default Policy Group from
the final listbox. These settings would limit users to viewing only those
incidents that the default policy group detected.
5 In the Policy Management tab, select one of the following policy privileges
for the role:
■ Import Policies
This privilege lets users import policy files that have been exported from
an Enforce Server.
To enable this privilege, the role must also have the Server Administration,
Author Policies, Author Response Rules, and All Policy Groups
privileges.
■ Author Policies
This privilege lets users add, edit, and delete policies within the policy
groups that are selected.
It also lets users modify system data identifiers, and create custom data
identifiers.
It also lets users create and modify User Groups.
This privilege does not let users create or manage Data Profiles. This activity
requires Enforce Server administrator privileges.
■ Discover Scan Control
Lets the users in this role create Discover targets, run scans, and view
Discover Servers.
■ Credential Management
Lets users create and modify the credentials that the system requires to
access target systems and perform Discover scans.
■ Policy Groups
Select All Policy Groups only if users in this role need access to all existing
policy groups and any that will be created in the future.
Otherwise you can select individual policy groups or the Default Policy
Group.
Note: These options do not grant the right to create, modify, or delete policy
groups. Only the users whose role includes the Server Administration
privilege can work with policy groups.
Note: Users cannot edit or author response rules for policy remediation
unless you select the Author Response Rules option.
Note: Preventing users from authoring response rules does not prevent them
from executing response rules. For example, a user with no response-rule
authoring privileges can still execute smart response rules from an incident list
or incident snapshot.
6 In the Users tab, select any users to which to assign this role. If you have not
yet configured any users, you can assign users to roles after you create the
users.
7 Click Save to save your newly created role to the Enforce Server database.
though Active Directory user names are not. Active Directory users will
need to enter the case-sensitive account name when logging onto the
Enforce Server administration console.
See “Integrating Active Directory for user authentication” on page 124.
Managing roles and users 109
Configuring user accounts
4 Configure the Authentication section of the Configure User page. Only options
that are configured are available on this page.
Option Instructions
Use Single Sign Select this option to use SAML authentication and allow the user sign on using Single Sign On
On Mapping Mapping on the Configure User page.
Use Password Select this option to use password authentication and allow the user to sign on using the Enforce
authentication Server administration console log on page. This option is required if the user account will be used
for a Reporting API Web Service client.
If you select this option, also enter the user password in the Password and the Re-enter
Password fields. The password must be at least eight characters long and is case-sensitive. For
security purposes, the password is obfuscated and each character appears as an asterisk.
If you configure advanced password settings, the user must specify a strong password. In addition,
the password may expire at a certain date and the user has to define a new one periodically.
You can choose password authentication even if you also use certificate authentication. If you
use certificate authentication, you can optionally disable sign on from the Enforce Server
administration console log on page.
Symantec Data Loss Prevention authenticates all Reporting API clients using password
authentication. If you configure Symantec Data Loss Prevention to use certificate authentication,
any user account that is used to access the Reporting API Web Service must have a valid
password. See the Symantec Data Loss Prevention Reporting API Developers Guide.
Note: If you configure Active Directory integration with the Enforce Server, users authenticate
using their Active Directory passwords. In this case the password field does not appear on the
Users screen.
Option Instructions
Use Certificate Select this option to use certificate authentication and allow the user to automatically single
authentication sign-on with a certificate that is generated by a separate Private Key Infrastructure (PKI). This
option is available only if you have manually configured support for certificate authentication.
If you select this option, you must specify the common name (CN) value for the user in the
Common Name (CN) field. The CN value appears in the Subject field of the user's certificate,
which is generated by the PKI. Common names generally use the format, first_name
last_name identification_number.
The Enforce Server uses the CN value to map the certificate to this user account. If an
authenticated certificate contains the specified CN value, all other attributes of this user account,
such as the default role and reporting preferences, are applied when the user logs on.
Note: You cannot specify the same Common Name (CN) value in multiple Enforce Server user
accounts.
Account Disabled Select this option to lock the user out of the Enforce Server administration console. This option
disables access for the user account regardless of which authentication mechanism you use.
For security, after a certain number of consecutive failed logon attempts, the system automatically
disables the account and locks out the user. In this case the Account Disabled option is checked.
To reinstate the user account and allow the user to log on to the system, clear this option by
unchecking it.
5 Optionally enter an Email Address and select a Language for the user in the
General section of the page. The Language selection depends on the language
pack(s) you have installed.
6 In the Report Preferences section of the Users screen you specify the
preferences for how this user is to receive incident reports, including Text File
Encoding and CSV Delimiter.
If the role grants the privilege for XML Export, you can select to include incident
violations and incident history in the XML export.
7 In the Roles section, select the roles that are available to this user to assign
data and incident access privileges.
You must assign the user at least one role to access the Enforce Server
administration console.
See “Configuring roles” on page 99.
Managing roles and users 111
Configuring password enforcement settings
Note: Individual users can change their default role by clicking Profile and
selecting a different option from the Default Role menu. The new default role
is applied at the next logon.
Note: Once you have saved a new user, you cannot edit the user name.
■ User Name – The name the user enters to log on to the Enforce Server
■ Email – The email address of the user
■ Access – The role(s) in which the user is a member
Assuming that you have the appropriate privileges, you can add, edit, or delete
user accounts as follows:
■ Add a new user account, or modify an existing one.
Click Add to begin adding a new user to the system.
Click anywhere in a row or the pencil icon (far right) to view and edit that user
account.
See “Configuring user accounts” on page 107.
■ Click the red X icon (far right) to delete the user account; a dialog box confirms
the deletion.
Note: When you delete a user account, you also delete all private saved reports
that are associated with that user.
SAML Single sign-on With SAML authentication, the Enforce Server administration console
authentication authenticates each user by validating the supplied email, user name,
or other user attributes that map to attributes used by the IdP.
When SAML is enabled, users access the Enforce Server Admin console
URL and are redirected to the IdP login page, where they enter their
credentials. After they are authenticated with the IdP, their user attributes
are sent to the Enforce Server. The Enforce Server attempts to find a
user with matching attributes. If found, the user is logged on to the
Enforce Server administration console.
Password Forms-based sign-on With password authentication, the Enforce Server administration console
authentication authenticates each user by determining if the supplied user name and
password combination matches an active user account in the Enforce
Server configuration. An active user account is authenticated if it has
been assigned a valid role.
With password authentication, you must configure the user name and
password of each user account directly in the Enforce Server
administration console. You must also ensure that each user account
has at least one assigned role.
Active Directory Forms-based sign-on With Microsoft Active Directory authentication, the Enforce Server
authentication administration console first evaluates a supplied user name to determine
if the name exists in a configured Active Directory server. If the user
name exists in Active Directory, the supplied password for the user is
evaluated against the Active Directory password. Any password
configured in the Enforce Server configuration is ignored.
Certificate Single sign-on from Certificate authentication enables a user to automatically log on to the
authentication Public Key Infrastructure Enforce Server administration console using an X.509 client certificate
(PKI) that is generated by your public key infrastructure (PKI). To use
certificate-based single sign-on, you must first enable certificate
authentication as described in this section.
If the certificate is valid and has not been revoked, then the Enforce
Server uses the common name (CN) in the certificate to determine if
that CN is mapped to an active user account with a role in the Enforce
Server configuration. For each user that will access the Enforce Server
administration console using certificate-based single sign-on, you must
create a user account in the Enforce Server that defines the
corresponding user's CN value. You must also assign one or more valid
roles to the user account.
Here are some important things to note when you set up SAML authentication.
Managing roles and users 118
Configuring user authentication
■ You must restart the manager when you change the way you authenticate users
in SAML. For example, if you change the mapping criteria from user name to
email address. Changing the authentication mechanism without restarting the
manager results in out of sync users, as the system continues to use the previous
mechanism.
■ You must restart the manager when you change the way you authenticate users
in SAML. Changing this mapping criteria in the springSecurityContext file for
SAML without restarting the manager results in users that are out of sync, as
the system continues to use previous version of the file. For example, if you
change the mapping criteria from user name to email address, you must restart
the manager.
■ You must remap each user when you change the way you map users in SAML.
Changing mapping criteria invalidates the the existing user's mapping.
■ You must validate the XML syntax before you restart the manager. Some
characters such as '&' that can be part of a user attribute make the XML invalid.
You need to replace these characters with their XML escape string. For example,
instead of "&" use "&".
■ Do not delete any XML nodes in the XML files.
■ Attribute names in XML must exactly match (including case) attribute names in
the IdP.
■ When switching from forms-based to SAML authentication, you must go through
each user and disable password access for non-Web Services users.
■ When switching from Certificate authentication to SAML authentication, make
sure that the ClientAuth value in server.xml is set to false.
If you upgrade from an earlier version of Symantec Data Loss Prevention, you can
enable certificate authentication by copying the corresponding
springSecuirtyContext.xml file into the tomcat WEB-INF folder.
Three types of mapping are available: by email, by user name, and by custom user
attributes. When you use SAML, the ROLE\USERNAME logon for local users is
not supported.
Symantec supports the following identity providers, both on-premises and cloud
based:
■ SAM (Symantec Access Manager)
■ Okta
■ SSOCircle
See the Symantec Data Loss Prevention System Requirements Guide for updates
on supported IdPs.
Setting up Authentication
Table 5-3 shows a summary of the tasks for the setup with links to more information
on each step.
Step 1 Edit the Spring context file for See “Set up the Spring
the authentication method. authentication method”
on page 121.
For Forms-based:
For Certificate:
Step 6 For SAML, download the IPD See “Export the IdP metadata
metadata. to DLP” on page 124.
Note: The Enforce Server administration console (the service provider in SAML)
and the IdP exchange messages using the settings in the configuration. Ensure
that your settings match with your IdP's configuration and capabilities. Unmatched
settings break the system.
You must restart the Enforce Server twice: once after you set up the authentication
configuration in the springSecurityContext.xml file, and once after you download
the IdP metadata file and replace the contents of idp-metadata.xml in the Enforce
install directory with the IdP metadata.
Note: Only one active logon is available with the Bypass URL.
Note: The files that you must modify are commented with details that help you
through the update process.
Note: You can no longer perform the initial setup of Active Directory through
the Enforce Server administration console.
If your users in the IdP cannot be uniquely identified by a simple nameID, and you
want to use a combination of user attributes returned from the IdP to identify an
Data Loss Prevention user, you can set the userAttributes property. For example:
Note: The host name cannot be localhost unless you only want to access the
Enforce Server administration console from the host machine.
Prevention. However, users still have to use the case-sensitive Symantec Data
Loss Prevention user name when they log on.
To use Active Directory authentication
1 Verify that the Enforce Server host is time-synchronized with the Active Directory
server.
Note: Ensure that the clock on the Active Directory host is synched to within
five minutes of the clock on the Enforce Server host.
2 (Linux only) Make sure that the following Red Hat RPMs are installed on the
Enforce Server host:
■ krb5-workstation
■ krb5-libs
■ pam_krb5
3 Create the krb5.ini (or krb5.conf for Linux) configuration file that gives the
Enforce Server information about your Active Directory domain structure and
Active Directory server addresses.
See “Creating the configuration file for Active Directory integration” on page 125.
4 Confirm that the Enforce Server can communicate with the Active Directory
server.
See “Verifying the Active Directory connection” on page 127.
5 Configure Symantec Data Loss Prevention to use Active Directory
authentication.
Note: If you are running Symantec Data Loss Prevention on Linux, verify the Active
Directory connection using the kinit utility. You must rename the krb5.ini file as
krb5.conf. The kinit utility requires the file to be named krb5.conf on Linux.
Symantec Data Loss Prevention assumes that you use kinit to verify the Active
Directory connection, and directs you to rename the file as krb5.conf.
Symantec Data Loss Prevention provides a sample krb5.ini file that you can
modify for use with your own system. The sample file is stored in
SymantecDLP\Protect\config (for example, \SymantecDLP\Protect\config on
Windows or /opt/SymantecDLP/Protect/config on Linux). If you are running
Symantec Data Loss Prevention on Linux, Symantec recommends renaming the
file to krb5.conf. The sample file, which is divided into two sections, looks like this:
[libdefaults]
default_realm = TEST.LAB
[realms]
ENG.COMPANY.COM = {
kdc = engAD.eng.company.com
}
MARK.COMPANY.COM = {
kdc = markAD.eng.company.com
}
QA.COMPANY.COM = {
kdc = qaAD.eng.company.com
}
The [libdefaults] section identifies the default domain. (Note that Kerberos
realms correspond to Active Directory domains.) The [realms] section defines an
Active Directory server for each domain. In the previous example, the Active
Directory server for ENG.COMPANY.COM is engAD.eng.company.com.
To create the krb5.ini or krb5.conf file
1 Go to SymantecDLP\Protect\config and locate the sample krb5.ini file.
For example, locate the file in \SymantecDLP\Protect\config (on Windows)
or /opt/SymantecDLP/Protect/config (on Linux).
2 Copy the sample krb5.ini file to the c:\windows directory (on Windows) or
the /etc directory (on Linux). If you are running Symantec Data Loss Prevention
on Linux, plan to verify the Active Directory connection using the kinit
command-line tool. Rename the file as krb5.conf.
See “Verifying the Active Directory connection” on page 127.
3 Open the krb5.ini or krb5.conf file in a text editor.
Managing roles and users 127
Integrating Active Directory for user authentication
4 Replace the sample default_realm value with the fully qualified name of your
default domain. (The value for default_realm must be all capital letters.) For
example, modify the value to look like the following:
default_realm = MYDOMAIN.LAB
5 Replace the other sample domain names with the names of your actual
domains. (Domain names must be all capital letters.) For example, replace
ENG.COMPANY.COM with ADOMAIN.COMPANY.COM.
6 Replace the sample kdc values with the host names or IP addresses of your
Active Directory servers. (Be sure to follow the specified format, in which
opening brackets are followed immediately by line breaks.) For example, replace
engAD.eng.company.com with ADserver.eng.company.com, and so on.
7 Remove any unused kdc entries from the configuration file. For example, if
you have only two domains besides the default domain, delete the unused kdc
entry.
8 Save the file.
The first time you contact Active Directory you may receive an error that it
cannot find the krb5.ini or krb5.conf file in the expected location. On
Windows, the error looks similar to the following:
In this case, copy the krb5.ini or krb5.conf file to the expected location and
then rerun the kinit command that is previously shown.
3 Depending on how the Active Directory server responds to the command, take
one of the following actions:
■ If the Active Directory server indicates it has successfully created a Kerberos
ticket, continue configuring Symantec Data Loss Prevention.
■ If you receive an error message, consult with your Active Directory
administrator.
If the certificate is valid, the Enforce Server administration console may also
determine if the certificate was revoked.
See “About certificate revocation checks” on page 136.
If the certificate is valid, then the Enforce Server uses the common name (CN) in
the certificate to determine if that CN is mapped to an active user account with a
role.
Note: Some browsers cache a user's client certificate, and automatically log the
user on to the Administration Console after the user has chosen to sign out. In this
case, users must close the browser window to complete the log out process.
The following table describes the steps necessary to use certificate authentication
with Symantec Data Loss Prevention.
1 Enable certificate authentication on the Enforce You can configure an existing Enforce Server
Server computer. to enable authentication. Enforce Servers have
form-based authentication by default.
2 Add certificate authority (CA) certificates to You can add CA certificates to the Tomcat trust
establish the trust chain. store with the Java keytool utility to manually
add certificates to an existing Enforce Server.
3 (Optional) Change the Tomcat trust store The Symantec Data Loss Prevention installer
password. configures each new Enforce Server installation
with a default Tomcat trust store password.
Follow these instructions to configure a secure
password.
See “Changing the Tomcat trust store password”
on page 134.
4 Map certificate common name (CN) values to See “Mapping Common Name (CN) values to
Enforce Server user accounts. Symantec Data Loss Prevention user accounts”
on page 135.
Managing roles and users 130
About certificate authentication configuration
5 Configure the Enforce Server to check for See “About certificate revocation checks”
certificate revocation. on page 136.
7 Add the CA certificates to the Tomcat trust store using the Java keytool utility.
See “Adding certificate authority (CA) certificates to the Tomcat trust store”
on page 132.
Ensure that you have installed all necessary certificates and that users can log
on with certificate authentication.
8 For client authentication only, copy the
springSecurityContext-Certificate.xml file from
C:\SymantecDLP\Protect\tomcat\webapps\ProtectManager\security\template
(Windows) or
opt/SymantecDLP/Protect/tomcat/webapps/ProtectManager/WEB-INF
(Linux) and rename it to springSecurityContext.xml.
9 Edit the C:\SymantecDLP\Protect\tomcat\conf\server.xml (Windows) or
/opt/SymantecDLP/Protect/tomcat/conf/server.xml file and change the
ClientAuth value from want totrue.
In these commands, replace CA_CERT_1 with a unique alias for the certificate
that you import. Replace certificate_1.cer with the name of the certificate file
you copied to the Enforce Server computer.
5 Enter the password to the keystore at the keytool utility prompt. The default
keystore password is protect.
6 Repeat these steps to install all the certificate files that are necessary to
complete the certificate chain.
7 Stop and then restart the Vontu Manager service to apply your changes.
8 If you have not yet changed the default Tomcat keystore password, do so now.
See “Changing the Tomcat trust store password” on page 134.
Managing roles and users 134
About certificate authentication configuration
Replace protect with the new password that you defined in the keytool
command.
8 Save your changes and exit the text editor.
9 Change directory to the /opt/SymantecDLP/Protect/config (Linux) or
c:\SymantecDLP\Protect\config (Windows) directory. If you installed
Symantec Data Loss Prevention into a different directory, substitute the correct
path.
10 Open the Manager.properties file with a text editor.
Add the following line in the file to specify the new password:
com.vontu.manager.tomcat.truststore.password = password
Replace password with the new password. Do not enclose the password in
quotation marks.
11 Save your changes and exit the text editor.
12 Open the Protect.properties file with a text editor.
13 Edit (or if not present, add) the following line in the file to specify the new
password:
com.vontu.manager.tomcat.truststore.password = password
Replace password with the new password. Do not enclose the password in
quotation marks.
14 Save your changes and exit the text editor.
15 Stop and then restart the Vontu Manager service to apply your changes.
Server configuration. The user account associates the common name (CN) value
from the user's client certificate to one or more roles in the Enforce Server
administration console. You can map a CN value to only one Enforce Server user
account.
The user account that you create does not require a separate Enforce Server
administration console password. You can optionally configure a password if you
want to allow the user to also log on from the Enforce Server administration console
log-on page. If you enable password authentication and the user does not provide
a certificate when the browser asks for one, then the Enforce Server displays the
log-on page. A log-on failure is displayed if password authentication is disabled and
the user does not provide a certificate.
An active user account must identify a user's CN value and have a valid role
assigned in the Enforce Server to log on using single sign-on with certificate
authentication. You can disable or delete the associated Enforce Server user account
to prevent a user from accessing the Enforce Server administration console without
revoking their client certificate.
See “Configuring user accounts” on page 107.
Note: Certificate revocation checking is disabled by default. You must enable it and
configure it. See “Configuring certificate revocation checks” on page 138.
OCSP is the first mechanism that Symantec Data Loss Prevention uses to perform
certificate revocation checks. After the Tomcat container has determined that a
client certificate is valid, the Enforce Server sends an OCSP request to a designated
OCSP responder to determine if the certificate was revoked. The information that
is used to contact the OCSP responder can be provided in one of two ways:
■ The Authority Information Access (AIA) field in a client certificate. The client
certificate itself can include the URL of the OCSP responder in an AIA field. The
following shows an example AIA field that defines an OCSP responder:
Managing roles and users 137
About certificate authentication configuration
Note: If the OCSP responder that you configure in this file does not use the CA
certificate to sign its responses, then you must add the OCSP responder's
certificate to the Tomcat trust store.
See “Adding certificate authority (CA) certificates to the Tomcat trust store”
on page 132.
Note: Symantec Data Loss Prevention does not support specifying the CRLDP
using an LDAP URL.
If the CRL distribution point is defined in each certificate and the Enforce Server
can directly access the server, then no additional configuration is required to perform
revocation checks. If the CRL distribution point is accessible only by a proxy server,
Managing roles and users 138
About certificate authentication configuration
then you must configure the proxy server settings in the Symantec Data Loss
Prevention configuration.
See “Accessing the OCSP responder or CRLDP with a proxy” on page 140.
Regardless of which revocation checking method you use, you must enable
certificate revocation checks on the Enforce Server computer. Certificate revocation
checks are enabled by default if you select certificate installation during the Enforce
Server installation. If you upgraded an existing Symantec Data Loss Prevention
installation, certificate revocation is not enabled by default.
See “Configuring certificate revocation checks” on page 138.
If the Enforce Server computer must use a proxy to access either the OCSP
responder service or CRLDP, then you must configure the proxy settings on the
Enforce Server computer.
See “Accessing the OCSP responder or CRLDP with a proxy” on page 140.
If you are using OCSP for revocation checks but certificate client certificate AIA
fields do not specify a valid OCSP responder, then you must manually configure
OCSP responder properties in the manager-certauth.security configuration file.
See “Manually configuring OCSP responder properties” on page 141.
wrapper.java.additional.19=-Dcom.sun.net.ssl.checkRevocation=true
wrapper.java.additional.20=-Djava.security.properties=../config/manager-certauth.security
Also enable this line in the file if you want to disable OCSP revocation checking.
Then you can configure a property in manager-certauth.security to disable
OCSP checks.
Ensure that the configuration parameter points to the indicated OCSP
configuration file. Always edit the existing manager-certauth.security file,
rather than creating a new file.
See “Manually configuring OCSP responder properties” on page 141.
8 To enable revocation checking using a CRLDP, add or uncomment the following
line in the file:
wrapper.java.additional.22=-Dcom.sun.security.enableCRLDP=true
This option is enabled by default for new Symantec Data Loss Prevention
installations.
9 If you use CRLDP revocation checks, optionally configure the cache lifetime
using the property:
wrapper.java.additional.22=-Dsun.security.certpath.ldap.cache.lifetime=30
This parameter specifies the length of time, in seconds, to cache the revocation
lists that are obtained from a CRL distribution point. After this time is reached,
a lookup is performed to refresh the cache the next time there is an
authentication request. 30 seconds is the default cache lifetime. Specify 0 to
disable the cache, or -1 to store cache results indefinitely.
10 Stop and then restart the Vontu Manager service to apply your changes.
Managing roles and users 140
About certificate authentication configuration
wrapper.java.additional.22=-Dhttp.proxyHost=myproxy.mydomain.com
wrapper.java.additional.23=-Dhttp.proxyPort=8080
wrapper.java.additional.24=-Dhttp.nonProxyHosts=hosts
Replace myproxy.mydomain.com and 8080 with the host name and port of
your proxy server. Replace hosts with one or more accessible OCSP responders
to use if the proxy is unavailable. You can include server host names, fully
qualified domain names, or IP addresses separated with a pipe character. For
example:
wrapper.java.additional.24=-Dhttp.nonProxyHosts=ocsp-server|
127.0.0.1|DataInsight_Server_Host
Note: If the OCSP responder that you configure in this file does not use the CA
certificate to sign its responses, then you must add the OCSP responder's certificate
to the Tomcat trust store.
See “Adding certificate authority (CA) certificates to the Tomcat trust store”
on page 132.
You can optionally log additional information about certificate revocation checks by
adding or uncommenting the following system property in the VontuManager.conf
file:
wrapper.java.additional.90=-Djava.security.debug=certpath
Note: When you disable forms-based logon you disable the feature for all users,
including those with Administrator privileges. As an alternative, you can disable
forms-based logon or certificate authentication for an individual user by configuring
that user's account.
See “Configuring user accounts” on page 107.
Managing roles and users 144
About certificate authentication configuration
If you later turn on forms-based logon but the Administrator user account does not
have a password configured, you can reset the Administrator password. Reset the
password using the AdminPasswordReset utility.
See “Resetting the Administrator password” on page 112.
Chapter 6
Connecting to group
directories
This chapter includes the following topics:
1 Navigate to the Directory Connections This page is available at System > Settings > Directory
page (if not already there). Connections.
2 Click Create New Connection. This action takes you to the Configure Directory
Connection page.
3 Enter a Name for the directory server The Connection Name is the user-defined name for the
connection. connection. It appears at the Directory Connections home
page once the connection is configured.
4 Specify the Network Parameters for the Table 6-2 provides details on these parameters.
directory server connection. Enter or specify the following parameters:
5 Specify the Authentication mode for Table 6-3 provides details on configuring the authentication
connecting to the directory server. parameters.
6 Click Test Connection to verify the If there is anything wrong with the connection, the system
connection. displays an error message describing the problem.
Connecting to group directories 147
Configuring directory server connections
7 Click Save to save the direction connection The system automatically indexes the directory server after
configuration. you successfully create, test, and save the directory server
connection.
8 Select the Index and Replication Status Verify that the directory server was indexed. After some time
tab. (depending on the size of the directory server query), you
should see that the Replication Status is "Completed
<date> <time>". If you do not see that the status is
completed, verify that you have configured and tested the
directory connection properly. Contact your directory server
administrator for assistance.
9 Select the Index Settings tab. You can adjust the directory server indexing schedule as
necessary at the Index Settings tab.
You must enter the Fully Qualified Name (FQN) of the directory server. Do not use
the IP address.
Base DN Enter the Base DN for the directory server. This field only accepts one directory
server entry.
Encryption Method Select the Secure option if you want the communication between the directory server
and the Enforce Server to be encrypted using SSL.
Note: If you choose to use a secure connection, you may need to import the SSL
certificate for the directory server to the Enforce Server keystore. See “Importing SSL
certificates to Enforce or Discover servers” on page 248.
Authentication Description
Authentication Select the Authentication option to connect to the directory server using
authentication mode. Check Connect with Credentials to add your username and
password to authenticate to the directory server.
Username To authenticate with Active Directory, use one of the following methods:
Password Enter the password for the user name that was specified in the preceding field.
Table 6-4 Schedule group directory server indexing and view status
Index the directory The Once setting is selected by default and automatically indexes
server once. the director server at 12:00 AM the day after you create the initial
connection.
Index the directory Select the Daily option to schedule the index daily.
server daily.
Specify the time of day and, optionally, the Until duration for this
schedule.
Index the directory Select the Weekly option to schedule the index to occur once a
server weekly. week.
Index the directory Specify the day of the month to index the directory and the time.
server monthly.
Optionally, specify the Until duration for this schedule.
View the indexing and Select the Index and Replication Status tab to view the status of the
replication status. indexing process.
■ Indexing Status
Displays the next scheduled index, date and time.
■ Detection Server Name
Displays the detection server where the User Group profile is
deployed.
■ Replication Status
■ Displays the data and time of the most recent synchronization
with the directory group server.
Chapter 7
Managing stored
credentials
This chapter includes the following topics:
3 Click Save.
4 You can later edit or delete credentials from the credential store.
See “Managing credentials in the credential store” on page 152.
See “Configuring endpoint credentials” on page 151.
4 Click Save.
5 Go to: System > Settings > Credentials.
6 Click Add Credential.
7 Under the General section, enter the details of the credential you want to add.
8 Under Usage Permission, select Servers and Endpoint agents.
9 Click Save.
See “About the credential store” on page 150.
See “Configuring the Endpoint Discover: Quarantine File action” on page 1315.
3 Click Save.
To delete a stored credential
1 In System > Settings > Credentials, locate the name of the stored credential
that you want to remove.
2 Click the delete icon to the right of the name. A credential can be deleted only
if it is not currently referenced in a Discover target or indexed document profile.
To edit a stored credential
1 In System > Settings > Credentials, locate the name of the stored credential
that you want to edit.
2 Click the edit icon (pencil) to the right of the name.
3 Update the user name or password.
4 Click Save.
5 If you change the password for a given credential, the new password is used
for all subsequent Discover scans that use that credential.
See “Providing the password authentication for Network Discover scanned content”
on page 1592.
Chapter 8
Managing system events
and messages
This chapter includes the following topics:
■ The five most recent system events of severity Warning or Severe are listed on
the Overview screen (System > Servers and Detectors > Overview).
See “About the Overview screen” on page 251.
■ Reports on all system events of any severity can be viewed by going to System
> Servers and Detectors > Events.
See “System events reports” on page 155.
■ Recent system events for a particular detection server or cloud service are listed
on the Server/Detector Detail screen for that server or detector.
See “Server/Detector Detail screen” on page 255.
■ Click on any event in an event list to go to the Event Details screen for that
event. The Event Details screen provides additional information about the event.
See “Server and Detectors event detail” on page 159.
There are three ways that system events can be brought to your attention:
■ System event reports displayed on the administration console
■ System alert email messages
See “About system alerts” on page 166.
■ Syslog functionality
See “Enabling a syslog server” on page 164.
Some system events require a response.
See “About system event responses” on page 162.
To narrow the focus of system event management you can:
■ Use the filters in the various system event notification methods.
See “System events reports” on page 155.
■ Configure the system event thresholds for individual servers.
See “Configuring event thresholds and triggers” on page 160.
Table 8-1
Events Description
Type The type (severity) of the event. Type may be any one of those listed in
Table 8-2.
Host The IP address or host name of the server on which the event occurred.
See the Symantec Data Loss Prevention Administration Guide for information
on event code numbers.
Summary A brief description of the event. Click on the summary for more detail about
the event.
Event Description
System information
Warning
Severe
Note: You can use the Cloud Operations filter value to view events from Cloud
Operations for your detectors.
For each advanced filter you can specify a filter-operator Is Any Of or Is None
Of.
5 Enter the filter value, or values, in the right-hand text box, or click a value in
the list to select it.
■ To select multiple values from a list, hold down the Control key and click
each one.
■ To select a range of values from a list, click the first one, then hold down
the Shift key and click the last value in the range you want.
Filter Description
Note: A small subset of the parameters that trigger system events have thresholds
that can be configured. These parameters should only be adjusted with advice from
Symantec Support. Before changing these settings, you should have a thorough
understanding of the implications that are involved. The default values are
appropriate for most installations.
See “Configuring event thresholds and triggers” on page 160.
Item Description
Item Description
To view and change the configurable parameters that trigger system events
1 Go to the Overview screen (System > Servers and Detectors > Overview).
2 Click on the name of a detection server or detector to display that server's
Server/Detector Detail screen.
3 Click Server/Detector Settings.
The Advanced Server/Detector Settings screen for that server is displayed.
4 Change the configurable parameters, as needed.
BoxMonitor.DiskUsageError Indicates the amount of filled disk space Low disk space
(as a percentage) that triggers a severe
system event. For example, a Severe
event occurs if a detection server is
installed on the C drive and the disk
space error value is 90. The detection
server creates a Severe system event
when the C drive usage is 90% or
greater. The default is 90.
BoxMonitor.DiskUsageWarning Indicates the amount of filled disk space Low disk space
(as a percentage) that triggers a
Warning system event. For example, a
Warning event occurs if the detection
server is installed on the C drive and the
disk space warning value is 80. Then
the detection server generates a
Warning system event when the C drive
usage is 80% or greater. The default is
80.
BoxMonitor.MaxRestartCount Indicates the number of times that a process name restarts excessively
system process can be restarted in one
hour before a Severe system event is
generated. The default is 3.
In most cases, the system event summary and detail information should provide
enough information to direct investigation and remediation steps. The following
table provides some general guidelines for responding to system events.
Tablespace is almost full Add additional data files to the database. When the
hard disk is at 80% of capacity, obtain a bigger disk
instead of adding additional data files.
Monitor not responding Restart the Symantec Monitor service. If the event
persists, check the network connections. Make sure
the computer that hosts the detections server is
turned on by connecting to it. You can connect with
terminal services or another remote desktop
connection method. If necessary, contact Symantec
Support.
Alert or scheduled report sending Go to System > Settings > General and ensure that
failed the settings in the Reports and Alerts and SMTP
sections are configured correctly. Check network
connectivity between the Enforce Server and the
SMTP server. Contact Symantec Support.
Long message wait time Increase detection server capacity by adding more
CPUs or replacing the computer with a more powerful
one.
process_name restarts excessively Check the process by going to System > Servers
> Overview. To see individual processes on this
screen, Process Control must be enabled by going
to System > Settings > General > Configure.
N incidents in queue Investigate the reason for the incidents filling up the
queue.
The most likely reasons are as follows:
their systems may prefer to use syslog instead of alerts. Syslog may be preferred
if the volume of alerts seems unwieldy for email.
Syslog functionality is an on or off option. If syslog is turned on, all Severe events
are sent to the syslog server.
To enable syslog functionality
1 Go to the \SymantecDLP\Protect\config directory on Windows or the
/opt/SymantecDLP/Protect/config directory on Linux.
systemevent.syslog.host=server1
systemevent.syslog.port=600
systemevent.syslog.format= [{0}] {1} - {2}
Using this example, a low disk space event notification from an Enforce Server on
a host named dlp-1 would look like:
Note: Reports with incident data cannot be distributed if this option is set.
■ Send report data with emails. Symantec Data Loss Prevention sends
email messages and attaches the report data.
Managing system events and messages 167
Configuring system alerts
3 Enter the Enforce Server domain name or IP address in the Fully Qualified
Manager Name field.
If you send reports as links, Symantec Data Loss Prevention uses the domain
name as the basis of the URL in the report email.
Do not specify a port number unless you have modified the Enforce Server to
run on a port other than the default of 443.
4 If you want alert recipients to see any correlated incidents, check the
Correlations Enabled box.
When correlations are enabled, users see them on the Incident Snapshot
screen.
5 In the SMTP section, identify the SMTP server to use for sending out alerts
and reports.
Enter the relevant information in the following fields:
■ Server: The fully qualified hostname or IP address of the SMTP server that
Symantec Data Loss Prevention uses to deliver system events and
scheduled reports.
■ System email: The email address for the alert sender. Symantec Data Loss
Prevention specifies this email address as the sender of all outgoing email
messages. Your IT department may require the system email to be a valid
email address on your SMTP server.
■ User ID: If your SMTP server requires it, type a valid user name for
accessing the server. For example, enter DOMAIN\bsmith.
■ Password: If your SMTP server requires it, enter the password for the User
ID.
6 Click Save.
See “About system alerts” on page 166.
See “Configuring system alerts” on page 167.
See “About system events” on page 154.
Note that the Enforce Server must first be configured to send alerts and reports.
See “Configuring the Enforce Server to send email alerts” on page 166.
Alerts are specified and edited on the Configure Alert screen, which is reached
by System > Servers > Alerts and then choosing Add Alert to create a new alert,
or clicking on the name of an existing alert to modify it.
To create or modify an alert
1 Go the Alerts screen (System > Servers and Detectors > Alerts).
2 Click the Add Alert tab to create a new alert, or click on the name of an alert
to modify it.
The Configure Alert screen is displayed.
3 Fill in (or modify) the name of the alert. The alert name is displayed in the
subject line of the email alert message.
4 Fill in (or modify) a description of the alert.
5 Click Add Condition to specify a condition that will trigger the alert.
Each time you click Add Condition you can add another condition. If you
specify multiple conditions, every one of the conditions must be met to trigger
the alert.
Click on the red X next to a condition to remove it from an existing alert.
6 Enter the email address that the alert is to be sent to. Separate multiple
addresses by commas.
7 Limit the maximum number of times this alert can be sent in one hour by
entering a number in the Max Per Hour box.
If no number is entered in this box, there is no limit on the number of times this
alert can be sent out. The recommended practice is to limit alerts to one or two
per hour, and to substitute a larger number later if necessary. If you specify a
large number, or no number at all, recipient mailboxes may be overloaded with
continual alerts.
8 Click Save to finish.
The Alerts list is displayed.
There are three kinds of conditions that you can specify to trigger an alert:
■ Event type - the severity of the event.
■ Server - the server associated with the event.
■ Event code - a code number that identifies a particular kind of event.
For each kind of condition, you can choose one of two operators:
Managing system events and messages 169
About log review
■ Is any of.
■ Is none of.
For each kind of condition, you can specify appropriate parameters:
■ Event type. You can select one, or a combination of, Information, Warning,
Severe. Click on an event type to specify it. To specify multiple types, hold down
the Control key while clicking on event types. You can specify one, two, or all
three types.
■ Server. You can select one or more servers from the list of available servers.
Click on the name of server to specify it. To specify multiple servers, hold down
the Control key while clicking on server names. You can specify as many different
servers as necessary.
■ Event code. Enter the code number. To enter multiple code numbers, separate
them with commas or use the Return key to enter each code on a separate line.
See “System event codes and messages” on page 170.
By combining multiple conditions, you can define alerts that cover a wide variety
of system conditions.
Note: If you define more than one condition, the conditions are treated as if they
were connected by the Boolean "AND" operator. This means that the Enforce Server
only sends the alert if all conditions are met. For example, if you define an event
type condition and a server condition, the Enforce Server only sends the alert if the
specified event occurs on the designated server.
See also the Symantec Data Loss Prevention System Maintenance Guide for
additional information about working with logs.
Note: Numbers enclosed in braces, such as {0}, indicate text strings that are
dynamically inserted into the actual event name or description message.
1001 Local monitor started All monitor processes have been started.
1002 Monitor started Some monitor processes are disabled and haven't been
started.
1003 Local monitor started Some monitor processes are disabled and haven't been
started.
1005 Local monitor stopped All monitor processes have been stopped.
1006 {0} failed to start Process {0} can't be started. See log files for more detail.
1007 {0} restarts excessively Process {0} has restarted {1} times during last {2} minutes.
1008 {0} is down {0} process went down before it had fully started.
1010 Restarted {0} {0} process was restarted because it went down unexpectedly.
1011 Restarted {0} {0} was restarted because it was not responding.
1012 Unable to start {0} Cannot bind to the shutdown datagram socket. Will retry.
1014 Low disk space Hard disk space is low. Symantec Data Loss Prevention
server disk usage is over {0}%.
1101 Aggregator failed to start Error starting Aggregator. {0} No incidents will be detected.
1102 Communications with non-legacy SSL keystore and truststore are not configured for this
agents are disabled endpoint server. Please go to configure server page to
configure SSL keystore and truststore.
1200 Loaded policy "{0}" Policy "{0}" v{1} ({2}) has been successfully loaded.
1202 No policies loaded No relevant policies are found. No incidents will be detected.
1203 Unloaded policy "{0}" Policy "{0}" has been unloaded.
1204 Updated policy "{0}" Policy "{0}" has been successfully updated. The current policy
version is {1}. Active channels: {2}.
1205 Incident limit reached for Policy The policy "{0}" has found incidents in more than {1}
"{0}" messages within the last {2} hours. The policy will not be
enforced until the policy is changed, or the reset period of {2}
hours is reached.
1206 Long message wait time Message wait time was {0}:{1}:{2}:{3}.
1207 Failed to load Vector Machine Failed to load [{0}] Vector Machine Learning profile. See
Learning profile server logs for more details.
1208 Failed to unload Vector Machine Failed to unload [{0}] Vector Machine Learning profile. See
Learning profile server logs for more details.
1209 Loaded Vector Machine Learning Loaded [{0}] Vector Machine Learning profile.
profile
Managing system events and messages 172
System event codes and messages
1210 Unloaded Vector Machine Unloaded [{0}] Vector Machine Learning profile.
Learning profile
1211 Vector Machine Learning training Training succeeded for [{0}] Vector Machine Learning profile.
successful
1212 Vector Machine Learning training Training failed for [{0}] Vector Machine Learning profile.
failed
1213 {0} messages timed out in {0} messages timed out in Detection in the last {1} minutes.
Detection recently Enable Detection execution trace logs for details.
1214 Detected regular expression rules Policy set contains regular expression rule(s) with invalid
with invalid patterns patterns. See FileReader.log for details.
1302 File Reader failed to start Error starting File Reader. {0} No incidents will be detected.
1303 Unable to delete folder File Reader was unable to delete folder "{0}" in the file system.
Please investigate, as this will cause system malfunction.
1305 Channel disabled Monitor channel "{0}" has been disabled. 1306 License
received. {0}.
1401 Invalid license The ICAP channel is not licensed or the license has expired.
No incidents will be detected or prevented by the ICAP
channel.
Managing system events and messages 173
System event codes and messages
1402 Content Removal Incorrect Configuration rule in line {0} is outdated or not written in
proper grammar format. Either remove it from the config file
or update the rule.
1403 Out of memory Error (Web While processing request on connection ID{0}, out of memory
Prevent) while processing error occurred. Please tune your setup for traffic load.
message
1404 Host restriction Any host (ICAP client) can connect to ICAP Server.
1405 Host restriction error Unable to get the IP address of host {0}.
1406 Host restriction error Unable to get the IP address of any host in Icap.AllowHosts.
1500 Invalid license The SMTP Prevent channel is not licensed or the license has
expired. No incidents will be detected or prevented by the
SMTP Prevent channel.
1501 Bind address error Unable to bind {0}. Please check the configured address or
the RequestProcessor log for more information. 1502 MTA
restriction error Unable to resolve host {0}.
1503 All MTAs restricted Client MTAs are restricted, but no hosts were resolved.
Please check the RequestProcessor log for more information
and correct the RequestProcessor.AllowHosts setting for this
Prevent server.
1504 Downstream TLS Handshake TLS handshake with downstream MTA {0} failed. Please
failed check SmtpPrevent and RequestProcessor logs for more
information.
1505 Downstream TLS Handshake TLS handshake with downstream MTA {0} was successfully
successful completed.
Managing system events and messages 174
System event codes and messages
1600 Override folder invalid Monitor channel {0} has invalid source folder: {1} Using folder:
{2}.
1601 Source folder invalid Monitor channel {0} has invalid source folder: {1} The channel
is disabled.
1700 Scan start failed Discover target with ID {0} does not exist. 1701 Scan
terminated {0}
1705 Scheduled scan failed Failed to start a scheduled scan of Discover target {0}. {1}
1708 Scheduled scan suspension Scheduled suspension failed for scan of Discover target {0}.
failed {1}
1709 Scheduled scan resume failed Scheduled suspension failed for scan of Discover target {0}.
{1}
1710 Maximum Scan Duration Timeout Discover target "{0}" timed out because of Maximum Scan
Occurred Duration.
1711 Maximum Scan Duration Timeout Maximum scan time duration timed out for scan: {0}. However,
Failed an error occurred while trying to abort the scan.
1712 Scan Idle Timeout Occurred Discover target "{0}" timed out because of Scan Idle Timeout.
1713 Scan Idle Timeout Failed Maximum idle time duration timed out for scan: {0}. However,
an error occurred while trying to abort the scan.
1714 Scan terminated - Invalid Server Scan of discover target "{0}" has been terminated from the
State state of "{1}" because the associated discover server {2}
entered an unexpected state of "{3}".
Managing system events and messages 175
System event codes and messages
1715 Scan terminated - Server Scan of discover target "{0}" has been terminated because
Removed the associated discover server {1} is no longer available.
1716 Scan terminated - Server Scan of discover target "{0}" has been terminated because
Reassigned the associated discover server {1} is already scanning
discover target(s) "{2}".
1717 Scan terminated - Transition Failed to handle the state change of discover server {1} while
Failed scanning discover target "{0}". See log files for details.
1718 Scan start failed Scan of discover target "{0}" has failed to start. See log files
for detailed error description.
1719 Scan start failed due to Scan of discover target "{0}" has failed, as its target type is
unsupported target type no longer supported.
1750 Incident attachment migration Migration of incident attachments from database to external
started storage directory has started.
1751 Incident attachment migration Completed migrating incident attachments from database to
completed external storage directory.
1752 Incident attachment migration One or more incident attachments could not be migrated from
failed database to external storage directory. Check the incident
persister log for more details. Once the error is resolved,
restart the VontuIncidentPersister service to resume
the migration.
1753 Incident attachment migration One or more incident attachments migration from database
error. to external storage directory has encountered error. Check
the incident persister log for more details. Migration will
continue and will retry erred attachment later.
1754 Failed to update incident Failed to update the schedule to delete incident attachments
attachment deletion schedule in the external directory. Check the incident persister log for
more details.
1755 Incident attachment deletion Deletion of obsolete incident attachments from the external
started storage directory has started.
1756 Incident attachment deletion Deletion of obsolete incident attachments from the external
completed storage directory has completed.
Managing system events and messages 176
System event codes and messages
1757 Incident attachment deletion One or more incident attachments could not be deleted from
failed the external storage directory. Check the incident persister
log for more details.
1758 Incident attachment external Incident attachment external storage directory is not
storage directory is not accessible. Check the incident persister log for more details.
accessible
1800 Incident Persister is unable to Persister ran out of memory processing incident {0}.
process incident Incident
1802 Corrupted incident received A corrupted incident was received, and renamed to {0}.
1804 Incident Persister is unable to Incident Persister cannot start because it failed to access the
start incident folder {0}. Check folder permissions.
1805 Incident Persister is unable to Incidents folder The Incident Persister is unable to access
access the incident folder {0}. Check folder permissions.
1806 Response rule processing failed Response rule processing failed to start: {0}.
to start
1807 Response rule processing Response rule command runtime execution failed from error:
execution failed {0}.
1808 Unable to write incident Failed to delete old temporary file {0}.
1809 Unable to write incident Failed to rename temporary incident file {0}.
1810 Unable to list incidents Failed to list incident files in folder {0}. Check folder
permissions.
1811 Error sending incident Unexpected error occurred while sending an incident. {0}
Look in the incident writer log for more information.
Managing system events and messages 177
System event codes and messages
1812 Incident writer stopped Failed to delete incident file {0} after it was sent. Delete the
file manually, correct the problem and restart the incident
writer.
1813 Failed to list incidents Failed to list incident files in folder {0}. Check folder
permissions.
1814 Incident queue backlogged There are {0} incidents in this server's queue.
1815 Low disk space on incident server Hard disk space for the incident data storage server is low.
Disk usage is over {0}%.
1816 Failed to update policy statistics Failed to update policy statistics for policy {0}.
1817 Daily incident maximum The daily incident maximum for policy {0} has been
exceeded exceeded.\n No further incidents will be generated.
1818 Incident is oversized, has been Incident is oversized, has been partially persisted with
persisted with a limited number messageID {0}, Incident File Name {1}.
of components and/or violations
1821 Failure to process an incident Unexpected error occurred while sending an incident {0}
received from the cloud gateway
1900 Failed to load update package Database connection error occurred while loading the
software update package {0}.
1901 Software update failed Failed to apply software update from package {0}. Check the
update service log.
2000 Key ignition error Failed to ignite keys with the new ignition password. Detection
against Exact Data Profiles will be disabled.
2001 Unable to update key ignition The key ignition password won't be updated, because the
password. cryptographic keys aren't ignited. Exact Data Matching will
be disabled.
Managing system events and messages 178
System event codes and messages
2099 Administrator password reset The Administrator password has been reset by the password
reset tool.
2101 Data source removed The data source with ID {0} was removed by {1}.
2102 Data source saved The {0} data source was saved by {1}.
2103 Document source removed The document source with ID {0} was removed by {1}.
2104 Document source saved The {0} document source was saved by {1}.
2105 New protocol created The new protocol {0} was created by {1}.
2106 Protocol order changed The protocol {0} was moved {1} by {2}.
2109 User removed The user with ID {0} was removed by {1}.
2111 Runaway lookup detected One of the attribute lookup plug-ins did not complete
gracefully and left a running thread in the system. Manager
restart may be required for cleanup.
2112 Loaded Custom Attribute Lookup Plug-ins The following Custom Attribute
Lookup Plug-ins were loaded: {0}.
2113 No Custom Attribute Lookup No Custom Attribute Lookup Plug-in was found.
Plug-in was loaded
2114 Custom attribute lookup failed Lookup plug-in {0} timed out. It was unloaded.
2115 Custom attribute lookup failed Failed to instantiate lookup plug-in {0}. It was unloaded. Error
message: {1}
2118 Alert or scheduled report sending configured by {1} contains the following unreachable email
failed. {0} addresses: {2}. Either the addresses are bad or your email
server does not allow relay to those addresses.
2119 System settings changed The system settings were changed by {0}.
2120 Endpoint Location settings The endpoint location settings were changed by {0}.
changed
2121 The account ''{1}'' has been The maximum consecutive failed logon number of {0}
locked out attempts has been exceeded for account ''{1}'', consequently
it has been locked out.
2122 Loaded FlexResponse Actions The following FlexResponse Actions were loaded: {0}.
2124 A runaway FlexResponse action One of the FlexResponse plug-ins did not complete gracefully
was detected. and left a running thread in the system. Manager restart may
be required for cleanup.
2125 Data Insight settings changed. The Data Insight settings were changed by {0}.
2126 Agent configuration created Agent configuration {0} was created by {1}.
2127 Agent configuration modified Agent configuration {0} was modified by {1}.
2128 Agent configuration removed Agent configuration {0} was removed by {1}.
2129 Agent configuration applied Agent configuration {0} was applied to endpoint server {1} by
{2}.
2130 Directory Connection source The directory connection source with ID {0} was removed by
removed {1}.
2131 Directory Connection source The {0} directory connection source was saved by {1}.
saved
2132 Agent Troubleshooting Task Agent Troubleshooting task of type {0} created by user {1}.
2134 Certificate authority file is corrupt. Certificate authority file {0} is corrupt.
Managing system events and messages 180
System event codes and messages
2135 Password changed for certificate Password changed for certificate authority file {0}. New
authority file. certificate authority file is {1}.
2136 Server keystore generated. Server keystore {0} generated for endpoint server {1}.
2137 Server keystore is missing or Server keystore {0} for endpoint server {1} is missing or
corrupt. corrupt.
2138 Server truststore generated. Server truststore {0} generated for endpoint server {1}.
2139 Server truststore is missing or Server truststore {0} for endpoint server {1} is missing or
corrupt. corrupt.
2140 Client certificates and key Client certificates and key generated.
generated.
2141 Agent installer package Agent installer package generated for platforms {0}.
generated.
2200 End User License Agreement The Symantec Data Loss Prevention End User License
accepted Agreement was accepted by {0}, {1}, {2}.
2202 License has expired One or more of your product licenses has expired. Some
system feature may be disabled. Check the status of your
licenses on the system settings page.
2203 License about to expire One or more of your product licenses will expire soon. Check
the status of your licenses on the system settings page.
2204 No license The license does not exist, is expired or invalid. No incidents
will be detected.
2205 Keys ignited The cryptographic keys were ignited by administrator logon.
2206 Key ignition failed Failed to ignite the cryptographic keys manually. Please look
in the Enforce Server logs for more information. It will be
impossible to create new exact data profiles.
2207 Auto key ignition The cryptographic keys were automatically ignited.
Managing system events and messages 181
System event codes and messages
2208 Manual key ignition required The automatic ignition of the cryptographic keys is not
configured. Administrator logon is required to ignite the
cryptographic keys. No new exact data profiles can be created
until the administrator logs on.
2300 Low disk space Hard disk space is low. Symantec Data Loss Prevention
Enforce Server disk usage is over {0}%.
2301 Tablespace is almost full Oracle tablespace {0} is over {1}% full.
2302 {0} not responding Detection Server {0} did not update its heartbeat for at least
20 minutes.
2303 Monitor configuration changed The {0} monitor configuration was changed by {1}.
2304 System update uploaded A system update was uploaded that affected the following
components: {0}.
2305 SMTP server is not reachable. SMTP server is not reachable. Cannot send out alerts or
schedule reports.
2308 Monitor status updater exception The monitor status updater encountered a general exception.
Please look at the Enforce Server logs for more information.
2309 System statistics update failed Unable to update the Enforce Server disk usage and database
usage statistics. Please look at the Enforce Server logs for
more information.
2310 Statistics aggregation failure The statistics summarization task encountered a general
exception. Refer to the Enforce Server logs for more
information.
2311 Version mismatch Enforce version is {0}, but this monitor's version is {1}.
2313 Incident deletion completed Incident deletion ran for {0} and deleted {1} incident(s).
2315 Low disk space on incident server Hard disk space for the incident data storage server is low.
Disk usage is over {0}%.
2316 Over {0} incidents currently Persisting over {0} incidents can decrease database
contained in the database performance.
2320 Version obsolete Detection server is not supported when two major versions
older than Enforce server version. Enforce version is {0}, and
this detection server's version is {1}. This detection server
must be upgraded.
2321 Version older than Enforce Enforce will not have visibility for this detection server and
version will not be able to send updates to it. Detection server
incidents will be received and processed normally. Enforce
version is {0}, and this detection server's version is {1}.
2322 Version older than Enforce Functionality introduced with recent versions of Enforce
version relevant to this type of detection server will not be supported
by this detection server. Enforce version is {0}, and this
detection server's version is {1}.
2323 Minor version older than Enforce Functionality introduced with recent versions of Enforce
minor version relevant to this type of detection server will not be supported
by this detection server and might be incompatible with this
detection server. Enforce version is {0}, and this detection
server's version is {1}. This detection server should be
upgraded.
2324 Version newer than Enforce Detection server is not supported when its version is newer
version than the Enforce server version. Enforce version is {0}, and
this detection server's version is {1}. Enforce must be
upgraded or detection server must be downgraded.
2400 Export web archive finished Archive "{0}" for user {1} was created successfully.
2401 Export web archive canceled Archive "{0}" for user {1} was canceled.
Managing system events and messages 183
System event codes and messages
2402 Export web archive failed Failed to create archive "{0}" for user {1}. The report specified
had over {2} incidents.
2403 Export web archive failed Failed to create archive "{0}" for user {1}. Failure occurred at
incident {2}.
2404 Unable to run scheduled report The scheduled report job {0} was invalid and has been
removed.
2405 Unable to run scheduled report The scheduled report {0} owned by {1} encountered an error:
{2}.
2406 Report scheduling is disabled The scheduled report {0} owned by {1} cannot be run because
report scheduling is disabled.
2407 Report scheduling is disabled The scheduled report cannot be run because report
scheduling is disabled.
2408 Unable to run scheduled report Unable to connect to mail server when delivery scheduled
report {0}{1}.
2409 Unable to run scheduled report User {0} is no longer in role {1} which scheduled report {2}
belongs to. The schedule has been deleted.
2410 Unable to run scheduled report Unable to run scheduled report {0} for user {1} because the
account is currently locked.
2411 Scheduled report sent The schedule report {0} owned by {1} was successfully sent.
2412 Export XML report failed XML Export of report by user [{0}] failed XML Export of report
by user [{0}] failed.
2420 Unable to run scheduled data Unable to distribute report {0} (id={1}) by data owner because
owner report distribution sending of report data has been disabled.
2421 Report distribution by data owner Report distribution by data owner for report {0} (id={1}) failed.
failed
2422 Report distribution by data owner Report distribution by data owner for report {0} (id={1})
finished finished with {2} incidents for {3} data owners. {4} incidents
for {5} data owners failed to be exported.
2423 Report distribution to data owner The report distribution {1} (id={2}) for the data owner "{0}"
truncated exceeded the maximum allowed size. Only the first {3}
incidents were sent to "{0}".
Managing system events and messages 184
System event codes and messages
2500 Unexpected Error Processing {0} encountered an unexpected error processing a message.
Message See the log file for details.
2501 Memory Throttler disabled {0} x {1} bytes need to be available for memory throttling.
Only {2} bytes were available. Memory Throttler has been
disabled.
2600 Communication error Unexpected error occurred while sending {1} updates to {0}.
{2} Please look at the monitor controller logs for more
information.
2650 Communication error(VML) Unexpected error occurred while sending profile updates
config set {0} to {1} {2}. Please look at the monitor controller
logs for more information.
2702 Update transferred to {0} Successfully transferred update package {1} to detection
server {0}.
2703 Update transfer complete Successfully transferred update package {0} to all detection
servers.
2704 Update of {0} failed Failed to transfer update package to detection server {0}.
2705 Configuration file delivery Successfully transferred config file {0} to detection server.
complete
2706 Log upload request sent. Successfully sent log upload request {0}.
2707 Unable to send log upload Encountered a recoverable error while attempting to deliver
request log upload request {0}.
2708 Unable to send log upload Encountered an unrecoverable error while attempting to
request deliver log upload request {0}.
Managing system events and messages 185
System event codes and messages
2709 Using built-in certificate Using built-in certificate to secure the communication between
Enforce and Detection Servers.
2710 Using user generated certificate Using user generated certificate to secure the communication
between Enforce and Detection Servers.
2711 Time mismatch between Enforce Time mismatch between Enforce and Monitor. It is
and Monitor. This may affect recommended to fix the time on the monitor through automatic
certain functionalities in the time synchronization.
system.
2713 Cloud connector disconnected Error {0} - check your network settings.
2800 Bad spool directory configured Packet Capture has been configured with a spool directory:
for Packet Capture {0}. This directory does not have write privileges. Please
check the directory permissions and monitor configuration
file. Then restart the monitor.
2901 Keys are not ignited Exact Data Matching will be disabled until the cryptographic
keys are ignited.
2902 Index folder inaccessible Failed to list files in the index folder {0}. Check the
configuration and the folder permissions.
2903 Created index folder The local index folder {0} specified in the configuration had
not existed. It was created.
2904 Invalid index folder The index folder {0} specified in the configuration does not
exist.
2905 Exact data profile creation failed Data file for exact data profile "{0}" was not created. Please
look in the enforce server logs for more information.
Managing system events and messages 186
System event codes and messages
2907 Replication canceled Canceled replication of database profile "{0}" version {1} to
server {2}.
2908 Replication failed Connection to database was lost while replicating database
profile {0} to server {1}.
2909 Replication failed Database error occurred while replicating database profile
{0} to server {1}.
2910 Failed to remove index file Failed to delete index file {1} of database profile {0}.
2911 Failed to remove index files Failed to delete index files {1} of database profile {0}.
2912 Failed to remove orphaned file Failed to remove orphaned database profile index file {0}.
2913 Replication failed Replication of database profile {0} to server {2} failed.{1}
Check the monitor controller log for more details.
2914 Replication completed Completed replication of database profile {0} to server {2}.
File {1} was transferred successfully.
2915 Replication completed Completed replication of database profile {0} to the server
{2}. Files {1} were transferred successfully.
2916 Database profile removed Database profile {0} was removed. File {1} was deleted
successfully.
2917 Database profile removed Database profile {0} was removed. Files {1} were deleted
successfully.
2918 Loaded database profile Loaded database profile {0} from {1}.
2920 Failed to load database profile {2} No incidents will be detected against database profile "{0}"
version {1}.
2921 Failed to unload database profile {2} It may not be possible to reload the database profile "{0}"
version {1} in the future without detection server restart.
2922 Couldn't find registered content Registered content with ID {0} wasn't found in database during
indexing.
2924 Process shutdown during The process has been shutdown during indexing. Some
indexing registered content may have failed to create.
2925 Policy is inaccurate Policy "{0}" has one or more rules with unsatisfactory
detection accuracy against {1}.{2}
2926 Created exact data profile Created {0} from file "{1}".\nRows processed: {2}\nInvalid
rows: {3}\nThe exact data profile will now be replicated to all
Symantec Data Loss Prevention Servers.
2927 User Group "{0}" synchronization The following User Group directories have been
failed removed/renamed in the Directory Server and could not be
synchronized: {1}.Please update the "{2}" User Group page
to reflect such changes.
2928 One or more EDM profiles are out Check the "Manage > Data Profiles > Exact Data" page for
of date and must be reindexed more details. The following EDM profiles are out of date: {0}.
3002 Replication canceled Canceled replication of document profile "{0}" version {1} to
server {2}.
3003 Replication failed Connection to database was lost while replicating document
profile "{0}" version {1} to server {2}.
3004 Replication failed Database error occurred while replicating document profile
"{0}" version {1} to server {2}.
3005 Failed to remove index file Failed to delete index file {2} of document profile "{0}" version
{1}.
3006 Failed to remove index files Failed to delete index files {2} of document profile "{0}" version
{1}.
3008 Replication failed Replication of document profile "{0}" version {1} to server {3}
failed. {2}\nCheck the monitor controller log for more details.
Managing system events and messages 188
System event codes and messages
3009 Replication completed Completed replication of document profile "{0}" version {1}
to server {3}. File {2} was transferred successfully.
3010 Replication completed Completed replication of document profile "{0}" version {1}
to server {3}.\nFiles {2} were transferred successfully.
3011 Document profile removed Document profile "{0}" version {1} was removed. File {2} was
deleted successfully.
3012 Document profile removed Document profile "{0}" version {1} was removed. Files {2}
were deleted successfully.
3013 Loaded document profile Loaded document profile "{0}" version {1} from {2}.
3014 Unloaded document profile Unloaded document profile "{0}" version {1}.
3015 Failed to load document profile {2}No incidents will be detected against document profile "{0}"
version {1}.
3016 Failed to unload document profile {2} It may not be possible to reload the document profile "{0}"
version {1} in the future without monitor restart.
3017 Created document profile Created "{0}" from "{1}". There are {2} accessible files in the
content root. {3} The profile contains index for {4}
document(s). {5} The document profile will now be replicated
to all Symantec Data Loss Prevention Servers.
3018 Document profile {0} has reached maximum size. Only {1} out of {2} documents
are indexed.
3020 Created document profile Created "{0}" from "{1}". There are {2} accessible files in the
content root. {3} The profile contains index for {4}
document(s). Comparing to last indexing run: {5} new
document(s) were added, {6} document(s) were updated, {7}
documents were unchanged, and {8} documents were
removed. The document profile will now be replicated to all
Symantec Data Loss Prevention servers.
3021 Nothing to index The new remote IDM profile for source "{0}" was identical to
the previous imported version.
3022 Profile conversion IDM profile {0} has been converted to {1} on the endpoint.
Managing system events and messages 189
System event codes and messages
3023 Endpoint IDM profiles memory IDM profile {0} size plus already deployed profiles size are
usage too large to fit on the endpoint, only exact matching will be
available.
3100 Invalid Attributes detected with Invalid or unsafe Attributes passed from Standard In were
Script Lookup Plugin removed during script execution. Please check the logs for
more details.
3101 Invalid Attributes detected with Invalid or unsafe Attributes passed to Standard Out were
Script Lookup Plugin removed during script execution. Please check the logs for
more details.
3301 Capture failed to start on device Device {0} is configured for capture, but could not be
{0} initialized. Please see PacketCapture.log for more information.
3302 PacketCapture could not elevate PacketCapture could not elevate its privileges. Some
its privilege level initialization tasks are likely to fail. Please check ownership
and permissions of the PacketCapture executable.
3303 PacketCapture failed to drop its Root privileges are still attainable after attempting to drop
privilege level them. PacketCapture will not continue
3304 Packet Capture started again as Packet capture started processing again because some disk
more disk space is available space was freed on the monitor hard drives.
3305 Packet Capture stopped due to Packet capture stopped processing packets because there
disk space limit is too little space on the monitor hard drives.
3306 Endace DAG driver is not Packet Capture was unable to activate Endace device
available support. Please see PacketCapture.log for more information.
3307 PF_RING driver is not available Packet Capture was unable to activate devices using the
PF_RING interface. Please check PacketCapture.log and
your system logs for more information.
3308 PACKET_MMAP driver is not Packet Capture was unable to activate devices using the
available PACKET_MMAP interface. Please check PacketCapture.log
and your system logs for more information.
3309 {0} is not available Packet Capture was unable to load {0} . No native capture
interface is available. Please see PacketCapture.log for more
information.
3310 No {0} Traffic Captured {0} traffic has not been captured in the last {1} seconds.
Please check Protocol filters and the traffic sent to the
monitoring NIC.
3311 Could not create directory Could not create directory {0} : {1}.
Managing system events and messages 191
System event codes and messages
3400 Couldn't add files to zip The files requested for collection could not be written to an
archive file.
3401 Couldn't send log collection The files requested for collection could not be sent.
3402 Couldn't read logging properties A properties file could not be read. Logging configuration
changes were not applied.
3403 Couldn't unzip log configuration The zip file containing logging configuration changes could
package not be unpacked. Configuration changes will not be applied.
3404 Couldn't find files to collect There were no files found for the last log collection request
sent to server.
3405 File creation failed Could not create file to collect endpoint logs.
3406 Disk usage exceeded File creation failed due to insufficient disk space.
3407 Max open file limit exceeded File creation failed as max allowed number of files are already
open.
3500 SPC Server successfully SPC Server successfully registered. Product Instance Id [{0}].
registered.
3501 SPC Server successfully SPC Server successfully unregistered. Product Instance Id
unregistered. [{0}].
3502 A self-signed certificate was A self-signed certificate was generated. Certificate alias [{0}].
generated.
3600 User import completed User import from source {0} completed successfully.
successfully.
3601 User import failed. User import from data source {0} has failed.
3602 Updated user data linked to Updated user data linked to {0} existing incident events.
incidents.
Managing system events and messages 192
System event codes and messages
3700 Unable to write catalog item Failed to delete old temporary file {0}.
3701 Unable to rename catalog item Failed to rename temporary catalog item file {0}.
3702 Unable to list catalog items Failed to list catalog item files in folder {0}.Check folder
permissions.
3703 Error sending catalog items Unexpected error occurred while sending an catalog
item.{0}Look in the file reader log for more information.
3704 File Reader failed to delete files. Failed to delete catalog file {0} after it was sent.\nDelete the
file manually, correct the problem and restart the File Reader.
3705 Failed to list catalog item files Failed to list catalog item files in folder {0}.Check folder
permissions.
3706 The configuration is not valid. The property {0} was configured with invalid value {1}. Please
make sure that this has correct value provided.
3707 Scan failed: Remediation Remediation detection catalog update timed out after {0}
detection catalog could not be seconds for target {1}.
updated
3802 Invalid Port for Could not retrieve the port for DetectionServerDatabase
DetectionServerDatabase process to listen to connection. Reason: {0}. Check if the
property file setting has the valid port number.
3803 Telemetry transmission failed. Telemetry transmission failed. Transmission status : {0}
Managing system events and messages 193
System event codes and messages
3900 Internal communications error. Internal communications error. Please see {0} for errors.
Search for the string {1}.
3901 System events have been System event throttle limit exceeded. {0} events have been
suppressed. suppressed. Internal error code = {1}.
4000 Agent Handshaker error Agent Handshaker error. Please see {0} for errors. Search
for the string {1}.
4050 Agent data batch persist error Unexpected error occurred while agent data being persisted
: {0}. Please look at the monitor controller logs for more
information.
4051 Agent status attribute batch Status attribute data for {0} agent(s) could not be persisted.
persist error Please look at the monitor controller logs for more information.
4052 Agent event batch persist Event data for {0} agent(s) could not be persisted. Please
look at the monitor controller logs for more information.
4101 Response Rule Execution Request fetch failed even after {0} retries. Database
Service Database failure on connection still down. The service will be stopped.
request fetch
4200 Cloud Service enrollment: Cloud Service enrollment: successfully received client
successfully received client certificate from Symantec Managed PKI Service.
certificate from Symantec
Managed PKI Service
Managing system events and messages 194
System event codes and messages
4205 Symantec Managed PKI Symantec Managed PKI certificate expires in {0} days.
certificate expires in {0} days
4206 Symantec Managed PKI Service Symantec Managed PKI Service certificate has expired.
certificate has expired
4211 Cloud Service enrollment bundle Enrollment file missing from ZIP bundle.
error
4212 Invalid Cloud Detector enrollment Detector info doesn't match the existing configuration.
bundle
4400 One or more User Group profiles Check the "Manage > Policies > User Groups" page for
are out of date and must be more details. The following User Group profiles are out of
reindexed. date: {0}.
4701 Cloud operations events or Cloud operations issued an event or notification about the
notifications cloud service.
Chapter 9
Managing the Symantec
Data Loss Prevention
database
This chapter includes the following topics:
can view table-level allocations for incident data tables, other tables, indexes, and
locator object (LOB) tables.
You can generate a full database report in HTML format to share with Symantec
Technical Support at any time by clicking Get full report. The data in the report
can help Symantec Technical Support troubleshoot issues in your database.
See “Generating a database report” on page 197.
com.vontu.manager.tablespaceThreshold.warning=85
com.vontu.manager.tablespaceThreshold.severe=95
Symantec Technical Support may request this report to help troubleshoot database
issues.
To generate a database report
1 Navigate to System > Database > Tablespaces Summary.
2 Click Get full report.
3 The report takes several minutes to generate. Refresh your screen after several
minutes to view the link to the report.
4 To open or save the report, click the link above the Tablespaces Allocation
table. The link includes the timestamp of the report for your convenience.
5 In the Open File dialog box, chose whether to open the file or save it.
6 To view the report, open it in a web browser or text editor.
7 To update the report, click Update full report.
■ Other Tables: This tab lists all other tables in the schema. The tab displays the
following information:
■ Table Name: The name of the table.
■ In Tablespace: The name of the tablespace that contains the table.
■ Size (MB): The size of the table, in megabytes.
■ % Full: The percentage of the table currently in use.
Managing the Symantec Data Loss Prevention database 199
Checking the database update readiness
■ Indices: This table lists all of the indexes in the schema. The tab displays the
following information:
■ Index Name: The name of the index.
■ Table Name: The name of the table that contains the index.
■ In Tablespace: The name of the tablespace that contains the table.
■ Size (MB): The size of the table, in megabytes.
■ % Full: The percentage of the table currently in use.
■ LOB Segments: This table lists all of the locator object (LOB) tables in the
schema. The tab displays the following information:
■ Table Name: The name of the table.
■ Column Name: The name of the table column containing the LOB data.
■ In Tablespace: The name of the tablespace that contains the table.
■ LOB Segment Size (MB): The size of the LOB segment, in megabytes.
■ LOB Index Size: The size of the LOB index, in megabytes.
■ % Full: The percentage of the table currently in use.
Note: The percentage used value for each table displays the percentage of the
table currently in use as reported by the Oracle database in dark blue. It also includes
an additional estimated percentage used range in light blue. Symantec Data Loss
Prevention calculates this range based on tablespace utilization.
1 Locate the latest version of the See “Locating the Update Readiness tool”
tool. on page 200.
2 Create the Update Readiness tool See “Creating the Update Readiness tool
database account. database account” on page 200.
3 Run the tool. See “Running the Update Readiness tool for
Symantec Data Loss Prevention version 14.x”
on page 202.
Note: Review the Readme file packaged with the tool for a list of Symantec Data
Loss Prevention versions the tool is capable of testing.
sqlplus /nolog
SQL> @oracle_create_user.sql
4 At the Please enter the password for sys user prompt, enter the password
for the SYS user.
5 At the Please enter sid prompt, enter a user name.
6 At the Please enter required username to be created prompt, enter a name
for the new upgrade readiness database account.
7 At the Please enter a password for the new username prompt, enter a
password for the new upgrade readiness database account.
Use the following guidelines to create an acceptable password:
■ Passwords cannot contain more than 30 characters.
■ Passwords cannot contain double quotation marks, commas, or
backslashes.
■ Avoid using the & character.
■ Passwords are case-sensitive by default. You can change the case
sensitivity through an Oracle configuration setting.
■ If your password uses special characters other than _, #, or $, or if your
password begins with a number, you must enclose the password in double
quotes when you configure it.
Store the user name and password in a secure location for future use. You
use this user name and password to run the Update Readiness tool.
8 As the database sysdba user, grant permission to the "protect" user for the
following database objects:
java UpdateReadinessTool
--username <username>
--password <password>
--sid <database_system_id>
--readiness_username <readiness_username>
--readiness_password <readiness_password>
[--quick]
[--quick] The optional command only runs the database object check
and skips the update readiness test.
After the test completes, you can locate the results in a log file in the /output
directory. This directory is located where you extracted the Update Readiness
tool. If you do not include [--quick] when you run the tool, the test may take
up to an hour to complete. You can verify the status of the test by reviewing
log files in the /output directory.
See “Locating the Update Readiness tool” on page 200.
See “Reviewing update readiness results” on page 204.
Managing the Symantec Data Loss Prevention database 204
Checking the database update readiness
Status Description
Pass Items that display under this section are confirmed and ready for update.
Warning If not fixed, items that display under this section may prevent the database
from upgrading properly.
Error These items prevent the upgrade from completing and must be fixed.
accessed those files, from where those files are accessed, and how those files are
used. You can also use the ICE Cloud Console to set specific group permissions.
You can set permissions for the saving, sharing, and editing of files for user groups,
as well as revoke access to individual files or rights to access files for specific user
groups.
When ICE is combined with the power of Symantec Data Loss Prevention or
Symantec CloudSOC (a separate ICE license is required), you can scan for and
encrypt confidential and sensitive files that are located in these locations:
■ Enterprise File Shares - File System servers or Microsoft SharePoint
You can use built-in ICE capabilities to encrypt sensitive files on File System
server locations and Microsoft SharePoint.
Symantec Data Loss Prevention Network Discover has the built-in ability to
apply Information Centric Encryption to sensitive files that are stored in:
■ File System server locations. You configure a response rule to use the
Network Protect: Encrypt File action.
■ Microsoft SharePoint. You configure a response rule to use the SharePoint
Encrypt Server FlexResponse action. The encryption functionality is enabled
using a new Server FlexResponse plug-in that is deployed automatically
when you install or upgrade to Symantec Data Loss Prevention 15.0 (the
appropriate Network Discover license is required). No additional customization
or configuration is required to deploy this Server FlexResponse plug-in.
Symantec CloudSOC. However, using Symantec Data Loss Prevention lets you
leverage robust policy authoring and remediation capabilities.
Note: On mobile devices, the ICE Utility is called the ICE Workspace.
The ICE Utility is context aware, meaning that it recognizes a user's environment.
The ICE Utility can be deployed in two types of environments: managed
environments and unmanaged environments.
■ In managed environments, your organization provides and maintains the devices
on which users access protected files.
In managed environments, the ICE Utility leverages the policies and security
controls that your organization puts in place over user devices. In this
environment, the ICE Utility gives the user greater flexibility with decrypting and
working with protected files. Files are opened in their native app, and the user
has full access to the file to edit, share, save, save as, and print the file. Users
are required to authenticate at least once every 180 days.
The managed version of the ICE Utility works the same across Windows and
macOS platforms.
Note: Your organization can install the ICE Utility on managed device at
initialization.
■ If you use the ICE Utility with Data Loss Prevention, and you want to use it
with Network Discover and Endpoint Discover, you can download it from
FileConnect with your other Data Loss Prevention components.
■ If you use the ICE Utility with CloudSOC only, or with Data Loss Prevention
for cloud storage content protection only, then you can download it from the
Information Centric Encryption Cloud Console. Download the managed
version of the ICE Utility from the Settings > Downloads page of the ICE
Cloud Console.
Working with Symantec Information Centric Encryption 208
About the Symantec ICE Utility
In all environments, when the user finishes with the file, the ICE Utility encrypts it
again, maintaining the file's security throughout its lifetime.
Note: If a user is allowed to save the file with a new name, the new file is not
encrypted.
Users whose devices you do not manage, such as partners, external customers,
and employees that bring their own devices, can obtain the ICE Utility in the following
ways:
■ When they attempt to open a protected file on a device without the ICE Utility,
they are prompted to download the ICE Utility.
■ They can download the ICE Utility directly from Symantec at:
https://sice.enc.protect.symantec.com/auth/client/download.html.
Note: A user must use a cloud storage provider's mobile app to open ICE-encrypted
files. A mobile browser cannot be used to access ICE-encrypted files.
Working with Symantec Information Centric Encryption 210
Overview of implementing Information Centric Encryption capabilities
After a user attempts to open an ICE-protected file with VIP Access, the VIP Access
app prompts the user for authentication credentials. If a user has more than one
account, they can use an option to log in with another account. If multi-factor
authentication is required, the user must also provide additional authentication such
as by using their Touch ID or by providing a passcode.
A user can authenticate in one of the following ways:
■ For internal users, the user may need to use corporate credentials if you have
set them up.
■ For partners, the user may need to register with Symantec Identity. The user
must use the email address that is associated with the file that is shared with
them.
After the user successfully authenticates, provided that the user is authorized to
view the file, VIP Access uses ICE to decrypt the file and display it to the user in a
view-only mode.
2 Configure the Enforce See “Configuring the Enforce Server to connect to the
Server to connect to the Symantec ICE Cloud” on page 212.
Symantec ICE Cloud.
5 Configure DLP Agents See “Information Centric Encryption settings for DLP
to enable them to Agents” on page 1868.
encrypt sensitive files
on endpoints, or on
removable devices that
are connected to
endpoints.
6 Download and then The ICE Utility is available for download from Symantec
install the ICE Utility on FileConnect.
all managed devices
See “About the Symantec ICE Utility” on page 207.
within your
organization. The ICE
Utility is required for
users to be able to
access ICE-encrypted
files.
Unmanaged device
users will be prompted
to download and install
the ICE Utility when
they attempt to access
an ICE-encrypted file
for the first time on a
particular device.
Working with Symantec Information Centric Encryption 212
Configuring the Enforce Server to connect to the Symantec ICE Cloud
Note: Obtain this information from the Settings > Advanced Configuration
> External Services page of the ICE Cloud Console. Note that the Service
Password is only visible when you first authorize an external service. If you
have lost your Service Password, the only way to see your Service Password
is to obtain a new one.
4 Click Save.
See “Installing a new license file” on page 213.
Chapter 11
Adding a new product
module
This chapter includes the following topics:
4 In the Install License field, browse for the new Symantec Data Loss Prevention
license file you downloaded, then click Save to agree to the terms and
conditions of the end user license agreement (EULA) for the software and to
install the license.
Note: If you do not agree to the terms and conditions of the EULA, you cannot
install the software.
■ Chapter 12. Installing and managing detection servers and cloud detectors
■ Server controls
■ Server configuration—basic
■ Editing a detector
■ Removing a server
File Reader The File Reader process The FileReader Status is available for all
detects incidents. detection servers.
Incident Writer The Incident Writer process The IncidentWriter Status is available for
sends incidents to the Enforce all detection servers, unless they are part
Server. of a single-tier installation, in which case
there is only one Incident Writer process.
Packet Capture The Packet Capture process The PacketCapture Status is available
captures network streams. for Network Monitor.
Server controls
Servers and their processes are controlled from the Server/Detector Detail screen.
■ To reach the Server/Detector Detail screen for a particular server, go to the
System > Servers and Detectors > Overview screen and click a server name,
detector name, or appliance name in the list.
See “Server/Detector Detail screen” on page 255.
The status of the server and its processes appears in the General section of the
Server/Detector Detail screen. The Start, Recycle and Stop buttons control server
and process operations.
Current status of the server is displayed in the General section of the
Server/Detector Detail screen. The possible values are:
Icon Status
Note: Status and controls for individual server processes are only displayed if
Advanced Process Control is enabled for the Enforce Server. To enable Advanced
Process Control, go to System > Settings > General > Configure, check the
Advanced Process Control box, and click Save.
■ To update the status, click the refresh icon in the upper-right portion of the
screen, as needed.
See “About Symantec Data Loss Prevention administration” on page 65.
See “About the Overview screen” on page 251.
See “Server/Detector Detail screen” on page 255.
See “Server configuration—basic” on page 220.
See “System events reports” on page 155.
See “Server and Detectors event detail” on page 159.
Server configuration—basic
Enforce Servers are configured from the System > Settings > General menu.
Detection servers are configured from each server's individual Configure Server
screen.
To configure a server
1 Go to the System > Servers and Detectors > Overview screen.
2 Click on the name of the server in the list.
That server's Server/Detector Detail screen is displayed. In the upper-left
portion of a Server/Detector Detail screen are the following buttons:
■ Done. Click Done to return to the previous screen.
■ Configure. Click Configure to specify a basic configuration for this server.
■ Server Settings. Click Server Settings to specify advanced configuration
parameters for this server. Use caution when modifying advanced server
settings. It is recommended that you check with Symantec Support before
changing any of the advanced settings.
See “Server and detector configuration—advanced” on page 243.
See Symantec Data Loss Prevention online Help for information about
advanced server configuration.
Installing and managing detection servers and cloud detectors 221
Server configuration—basic
Field Description
Th Protocol section of the Packet Capture specifies the types of network traffic
(by protocol) to capture. It also specifies any custom parameters to apply. This
section lists the standard protocols that you have licensed with Symantec, and any
custom TCP protocols you have added.
To monitor a particular protocol, check its box. When you initially configure a server,
the settings for each selected protocol are inherited from the system-wide protocol
Installing and managing detection servers and cloud detectors 223
Server configuration—basic
settings. You configure these settings by going to System > Settings > Protocol.
System-wide default settings are listed as Standard.
Consult Symantec Data Loss Prevention online Help for information about working
with system-wide settings.
To override the inherited filtering settings for a protocol, click the name of the
protocol. The following custom settings are available (some settings may not be
available for some protocols):
■ IP filter
■ L7 sender filter
■ L7 recipient filter
■ Content filter
■ Search Depth (packets)
■ Sampling rate
■ Maximum wait until written
■ Maximum wait until dropped
■ Maximum stream packets
■ Minimum stream size
■ Maximum stream size
■ Segment Interval
■ No traffic notification timeout (The maximum value for this setting is 360000
seconds.)
Use the SMTP Copy Rule to modify the source folder where this server retrieves
SMTP message files. You can modify the Source Folder by entering the full path
to a folder.
See “About Symantec Data Loss Prevention administration” on page 65.
See “About the Overview screen” on page 251.
See “Server/Detector Detail screen” on page 255.
See “Server configuration—basic” on page 220.
See “Server controls” on page 219.
In addition to the settings available through the Configure Server screen, you can
specify advanced settings for this server. To specify advanced configuration
parameters, click Server Settings on the server's Server/Detector Detail screen.
Installing and managing detection servers and cloud detectors 224
Server configuration—basic
Use caution when modifying advanced server settings. Check with Symantec
Support before you change any advanced setting.
See “Advanced server settings” on page 257.
See the Symantec Data Loss Prevention online Help for information about advanced
server settings.
Field Description
Field Description
companyname.com
Field Description
smtp1.companyname.com
smtp2.companyname.com
smtp3.companyname.com
See the Symantec Data Loss Prevention MTA Integration Guide for Network Prevent
for Email for additional information about configuring Network Prevent for Email
Server options.
See “About Symantec Data Loss Prevention administration” on page 65.
See “About the Overview screen” on page 251.
See “Server/Detector Detail screen” on page 255.
See “Server configuration—basic” on page 220.
See “Server controls” on page 219.
In addition to the settings available through the Configure Server screen, you can
specify advanced settings for this server. To specify advanced configuration
parameters, click Server Settings on the server's Server/Detector Detail screen.
Installing and managing detection servers and cloud detectors 227
Server configuration—basic
Use caution when modifying advanced server settings. Check with Symantec
Support before you change any advanced setting.
See “Advanced server settings” on page 257.
See the Symantec Data Loss Prevention online Help for information about advanced
server settings.
Field Description
Field Description
Ignore Requests from User Agents Enter the names of user agents
whose requests should be
filtered out (ignored). Enter one
agent per line.
■ The Response Filtering section configures the filtering criteria to manage HTTP
responses:
Field Description
Field Description
■ The Connection section configures settings for the ICAP connection between
an HTTP proxy server and the Network Prevent for Web Server:
Field Description
In addition to the settings available through the Configure Server screen, you can
specify advanced settings for this server. To specify advanced configuration
parameters, click Server Settings on the server's Server/Detector Detail screen.
Use caution when modifying advanced server settings. Check with Symantec
Support before you change any advanced setting.
See “Advanced server settings” on page 257.
See the Symantec Data Loss Prevention online Help for information about advanced
server settings.
Field Description
Bind address Enter the IP address on which the Endpoint Server listens for
communications from the Symantec DLP Agents. The default IP address
is 0.0.0.0 which allows the Endpoint Server to listen on all host IP
addresses.
Port Enter the port over which the Endpoint Server listens for communications
from the Symantec DLP Agents.
Note: Many Linux systems restrict ports below 1024 to root access.
The Endpoint Server cannot by configured to listen for connections
from Symantec DLP Agents to these restricted ports on Linux systems.
Installing and managing detection servers and cloud detectors 232
Server configuration—basic
Note: If you are using FIPS 140-2 mode for communication between the Endpoint
Server and DLP Agents, do not use Diffie-Hellman (DH) cipher suites. Mixing cipher
suites prevents the agent and Endpoint Server from communicating. You can confirm
the current cipher suit setting by referring to the
EndpointCommunications.SSLCipherSuites setting on the Server Settings
page. See “Advanced server settings” on page 257.
When you initially configure a server, the settings for each selected protocol
are inherited from the system-wide protocol settings. You configure these
settings by going to System > Settings > Protocol. System-wide default
settings are listed as Standard. To override the inherited filtering settings for
a protocol, click the name of the protocol. The following custom settings are
available (some settings may not be available for some protocols):
■ IP filter
■ L7 sender filter
■ L7 recipient filter
■ Content filter
■ Search Depth (packets)
■ Sampling rate
■ Maximum wait until written
■ Maximum wait until dropped
■ Maximum stream packets
■ Minimum stream size
■ Maximum stream size
■ Segment Interval
■ No traffic notification timeout (The maximum value for this setting is 360000
seconds.)
4 Optional: On the SMTP Copy Rule tab, specify the Source Folder Override
to modify the source folder where this server retrieves SMTP message files.
You can modify the source folder by entering the full path to a folder. Leave
this field blank to use the default source folder.
Note: If you plan to use the grid scanning feature to distribute the scanning workload
across multiple detection servers, retain the default value (1).
Installing and managing detection servers and cloud detectors 234
Server configuration—basic
The maximum count can be increased at any time. After it is increased, any queued
scans that are eligible to run on the Network Discover Server are started. The count
can be decreased only if the Network Discover Server has no running scans. Before
you reduce the count, pause, or stop, all scans running on the server.
Ignore Requests Smaller Than Specifies the minimum body size of HTTP
requests to inspect. (The default is 4096
bytes.) For example, search-strings typed
in to search engines such as Yahoo or
Google are usually short. By adjusting this
value, you can exclude those searches
from inspection.
Ignore Requests without Attachments Causes the server to inspect only the
requests that contain attachments. This
option can be useful if you are mainly
concerned with requests intended to post
sensitive files.
Ignore Requests from User Agents Causes the server to ignore requests from
user agents (HTTP clients) you specify.
This option can be useful if your
organization uses a program or language
(such as Java) that makes frequent HTTP
requests. You can type one or more user
agent values, each on its own line.
Installing and managing detection servers and cloud detectors 236
Server configuration—basic
3 Verify or modify the filter options for responses from web servers. The options
in the Response Filtering section are as follows:
Ignore Responses Smaller Than Specifies the minimum size of the body of
HTTP responses that are inspected by this
server. (Default is 4096 bytes.)
4 Verify or modify settings for the ICAP connection between the HTTP proxy
server and the Web Prevent Server. The Connection options are as follows:
Field Description
companyname.com
Field Description
smtp1.companyname.com
smtp2.companyname.com
smtp3.companyname.com
Field Description
Bind address Enter the IP address on which the Endpoint Server listens for
communications from the Symantec DLP Agents. The default IP
address is 0.0.0.0 which allows the Endpoint Server to listen on
all host IP addresses.
Port Enter the port over which the Endpoint Server listens for
communications from the Symantec DLP Agents.
Setting Value
MessageChain.NumChains 32
MessageChain.CacheSize 32
PacketCapture.NUMBER_BUFFER_POOL_PACKETS 1,200,000
PacketCapture.NUMBER_SMALL_POOL_PACKETS 1,000,000
6 Click Save.
See “About Symantec Data Loss Prevention administration” on page 65.
Installing and managing detection servers and cloud detectors 242
Server configuration—basic
Note: The Classification Server is used only with the Symantec Enterprise Vault
Data Classification solution, which is licensed separately from Symantec Data Loss
Prevention. You must configure the Enterprise Vault Data Classification Services
filter and Classification Server to communicate with one another. See the Symantec
Enterprise Vault Data Classification Services Implementation Guide for more
information.
Editing a detector
You can change the name of your detector on the Server/Detector Detail screen.
Editing the name of a detector
1 Go to System > Servers and Detectors > Overview and click on the name
of the detector.
The Server/Detector Detail screen appears.
2 Click Edit.
The Edit Detector page appears.
3 Enter a new name for the detector in the Detector Name field.
4 Click Save.
Note: Check with Symantec Support before changing any advanced settings. If you
make a mistake when changing advanced settings, you can severely degrade
performance or even disable the server entirely.
Installing and managing detection servers and cloud detectors 244
Adding a detection server
The grid scanning feature for File System server scan targets uses SSL certificates
to authenticate detection servers. When you set up a new detection server, a
keystore and truststore are generated for the detection server. The keystore and
truststore each contain an grid communication certificate which enables the server
to communicate with the grid leader during a grid scan. The certificates have a
validity period of five years.
When a detection server's keystore and truststore certificates expire, that detection
server will be unable to participate in a grid scan until the certificates are renewed.
See “Renewing grid communication certificates for detection servers” on page 249.
Note: Symantec recommends that you apply the same hardware and software
configuration to all of the detections servers that you intend to use for grid scans.
Symantec Data Loss Prevention supports grid scans that have up to 11 participating
detection servers.
c:\Users\username\downloads
/home/username/
See the documentation for your cloud detector for more detailed information about
the enrollment process.
After you have saved the enrollment bundle, register your cloud detector to enable
communication between it and your on-premises Enforce Server.
Installing and managing detection servers and cloud detectors 247
Removing a server
Removing a server
See the appropriate Symantec Data Loss Prevention Installation Guide for
information about uninstalling Symantec Data Loss Prevention from a server.
An Enforce Server administration console lists the detection servers registered with
it on the System > Servers and Detectors > Overview screen. If Symantec Data
Loss Prevention is uninstalled from a detection server, or that server is stopped or
disconnected from the network, its status is shown as Unknown on the console.
A detection server can be removed (de-registered) from an Enforce Server
administration console. When a detection server is removed from an Enforce Server,
its Symantec Data Loss Prevention services continue to operate. This means that
even though a detection server is de-registered from Enforce, it continues to function
unless some action is taken to halt it. In other words, even though it is removed
from an Enforce Server administration console, a detection server continues to
operate. Incidents it detects are stored on the detection server. If a detection server
Installing and managing detection servers and cloud detectors 248
Importing SSL certificates to Enforce or Discover servers
is re-registered with an Enforce Server, incidents detected and stored are then
forwarded to Enforce.
To remove (de-register) a detection server from Enforce
1 Go to System > Servers and Detectors > Overview.
See “About the Overview screen” on page 251.
2 In the Servers and Detectors section of the screen, click the red X on a server's
status line to remove it from this Enforce Server administration console.
See “Server controls” on page 219.
3 Click OK to confirm.
The server's status line is removed from the System Overview list.
Step Description
1 Copy the certificate file you want to import to the Enforce Server or Discover Server
computer.
3 Execute the keytool utility with the -importcert option to import the public key
certificate to the Enforce Server or Discover Server keystore:
Step Description
4 When you are prompted, enter the password for the keystore.
By default, the password is changeit. If you want you can change the password
when prompted.
5 Answer Yes when you are asked if you trust this certificate.
5 Click Apply.
6 When the filter takes effect, open the most recently created record of event
2136.
7 On the Event Detail screen, take note of keystore file name that is displayed
in the Detail field.
For example, monitor11_keystore_v1.jks.
To identify the truststore file for a detection server
1 In the Enforce Server console, navigate to System > Servers and Detectors
> Events.
2 In the Filter area, expand the Advanced Filters & Summarization section.
3 Click Add filter, and then do the following:
■ In the first list box, select Server or Detector.
■ In the second list box, select Is Any Of.
■ In the third list box, select the detection server whose grid communication
certificate has expired.
5 Click Apply.
6 When the filter takes effect, open the most recently created record of event
2136.
7 On the Event Detail screen, take note of keystore file name that is displayed
in the Detail field.
For example, monitor11_truststore_v1.jks.
Installing and managing detection servers and cloud detectors 251
About the Overview screen
■ The Upgrade button is for upgrading Symantec Data Loss Prevention to a newer
version.
Installing and managing detection servers and cloud detectors 252
Configuring the Enforce Server to use a proxy to connect to cloud services
3 If you choose Manual proxy, fields for a URL, Port, and Proxy is
Authenticated appear.
■ Enter the the HTTP Proxy URL for the cloud service that you obtained from
Symantec.
■ Enter a port number.
■ a user ID
■ a password
5 Click Save.
6 Restart the Vontu Monitor Controller.
For each server, the following additional information appears. You can also click
on any server name to display the Server/Detector Detail screen for that server.
Messages (Last 10 sec) The number of messages processed in the last 10 seconds
Incident Queue For the Enforce Server, this is the number of incidents that
are in the database, but do not yet have an assigned status.
This number is updated whenever this screen is generated.
Message Wait Time The amount of time it takes to process a message after it
enters the system. This data applies to the last message
processed. If the server that processed the last message is
disconnected, this is N/A.
Type
Host The IP address or name of the machine where the server resides. The
server and host names may be the same.
Code The system event code. The Messagecolumn provides the code text.
Event lists can be filtered by code number.
Message A summary of the error or warning message that is associated with this
event code.
■ To display a list of all error and warning events, click Show all.
■ To display the Event Detail screen for additional information about that particular
event, click an event.
See “About the Overview screen” on page 251.
See “System events reports” on page 155.
See “Server and Detectors event detail” on page 159.
General The General section identifies the server, displays system status and
statistics, and provides controls for starting and stopping the server
and its processes.
All Agents The All Agents section displays a summary of all agents that are
assigned to an Endpoint Server.
Click the number next to an agent status to view agent details on the
System > Agents > Overview > Summary Reports screen.
Note: The system only displays the Agent Summary section for an
Endpoint Server.
Recent Error and The Recent Error and Warning Events section displays the five
Warning Events most recent Warning or Severe events that have occurred on this
server.
Click on an event to show event details. Click show all to display all
error and warning events.
All Recent Events The All Recent Events section displays all events of all severities
that have occurred on this server during the past 24 hours.
Click on an event to show event details. Click show all to display all
detection server events.
Installing and managing detection servers and cloud detectors 257
Advanced server settings
Deployed Exact The Deployed Exact Data Profile section lists any Exact Data or
Data Profiles Document Profiles you have deployed to the detection server. The
system displays the version of the index in the profile.
BoxMonitor.InitialRestartWaitTime 5000
Installing and managing detection servers and cloud detectors 260
Advanced server settings
Default is disabled.
Default is disabled.
EndpointMessageStatistics.
MaxFileDetectionCount,
EndpointMessageStatistics.
MaxFolderDetectionCount,
or EndpointMessageStatistics.
MaxMessageCount is generated,
Symantec Data Loss Prevention
lists the host machines where these
system events were generated. This
setting limits the number of hosts
displayed in the list.
■ EndpointServer.Discover.
ScanStatusBatchInterval
■ EndpointServer.Discover.
ScanStatusBatchSize
■ 0 - SKIP_ALL_PHOTOS: No
photographs will be processed
by the form recognition detection
process.
■ 1 - SKIP_DARK_PHOTOS:
Colorful photographs such as
vacations pictures will be
skipped, but photographs of
forms will be processed.
■ 2- SKIP_NONE: All photographs
will be processed.
Installing and managing detection servers and cloud detectors 277
Advanced server settings
IncidentDetection.
MaxIncidentsPerPolicy
IncidentDetection.
IncidentTimeLimitResetTime.
IncidentDetection.
patternConditionMaxViolations
http://tools.ietf.org/html/
draft-levine-mass-batv-02
See http://tools.ietf.org/html/
RequestProcessor.AllowExtensions 8BITMIME VRFY DSN This setting lists the SMTP protocol
HELP PIPELINING extensions that Network Prevent for
SIZE Email can use when it
ENHANCEDSTATUSCODES communicates with other MTAs.
STARTTLS
DDM.MaxBinMatchSize 30,000,000 The maximum size (in bytes) used to generate the
MD5 hash for an exact binary match in an IDM. This
setting should not be changed. The following
conditions must be matched for IDM to work
correctly:
Note: Contact Symantec Support before changing default advanced agent and
advanced server settings.
Installing and managing detection servers and cloud detectors 304
About using load balancers in an endpoint deployment
Description Resolution
Starting with version 12.5, Symantec Data Consider how the agent idle timeout coincides with the load balancer
Loss Prevention uses non-persistent close idle connection setting. If the load balancer is configured to close
connections by default. Using non-persitent idle connections after less than 30 seconds, agents are prematurely
connections means that Endpoint Servers disconnected from Endpoint Servers.
close connections to agents after agents are
To resolve the issue, complete one of the following:
idle for 30 seconds.
■ Change the agent idle timeout setting (EndpointCommunications.
IDLE_TIMEOUT_IN_SECONDS.int) to less than the close idle
connection setting on the load balancer.
■ Increase the agent heartbeat setting
(EndpointCommunications.HEARTBEAT_INTERVAL_IN_SECONDS.int)
to be less than the load balancer close idle connections setting.
The user must also increase the no traffic timeout setting
(CommLayer.NO_TRAFFIC_TIMEOUT_IN_SECONDS.int) to a
value greater than the agent heartbeat setting.
Description Resolution
Consider how changes to default Symantec To resolve the issue, complete one of the following:
Data Loss Prevention settings affect how the
■ Change the agent heartbeat
load balancer handles idle and persistent
(EndpointCommunications.HEARTBEAT_INTERVAL_IN_SECONDS.int)
agent connections. For example, if you change
and no traffic timeout settings
the idle timeout setting to 0 to create a
(CommLayer.NO_TRAFFIC_TIMEOUT_IN_SECONDS.int) to less
persistent connection and you leave the default
than the load balancer idle connection setting.
agent heartbeat setting (270 seconds), you
■ Verify that the no traffic timeout setting is greater than the heartbeat
must consider the idle connection setting on
setting.
the load balancer. If the idle connection setting
on the load balancer is less than 270 seconds,
then agents are prematurely disconnected
from Endpoint Servers.
provide debug log files for further analysis when you report a problem. Some
debug log files are not created by default. Symantec Support can explain how
to configure the software to create the file if necessary.
See “Debug log files” on page 309.
■ Installation log files record information about the Symantec Data Loss Prevention
installation tasks that are performed on a particular computer. You can use these
log files to verify an installation or troubleshoot installation errors. Installation
log files reside in the following locations:
■ installdir\SymantecDLP\.install4j\installation.log stores the
installation log for Symantec Data Loss Prevention.
■ installdir\oracle_home\admin\protect\ stores the installation log for
Oracle.
See the Symantec Data Loss Prevention Installation Guide for more information.
detection_operational_trace_0.log The detection trace log file provides All detection servers
details about each message that
the detection server processes. The
log file includes information such
as:
See “Network Prevent for Web operational log files and event codes” on page 323.
See “Network Prevent for Web access log files and fields” on page 324.
See “Network Prevent for Email log levels” on page 327.
See “Network Prevent for Email operational log codes” on page 327.
See “Network Prevent for Email originated responses and codes” on page 331.
BoxMonitor0.log This file is typically very small, and it shows how the All
application processes are running. The BoxMonitor detection
process oversees the detection server processes that servers
pertain to that particular server type.
ContentExtractionAPI_FileReader.log Logs the behavior of the Content Extraction API file Detection
reader that sends requests to the plug-in host. The Server
default logging level is "info" which is configurable
using \Protect\config\log4cxx_config_filereader.xml.
FileReader0.log This log file pertains to the file reader process and All
contains application-specific logging, which may be detection
helpful in resolving issues in detection and incident servers
creation. One symptom that shows up is content
extractor timeouts.
flash_client_0.log Logs messages from the Adobe Flex client used for Enforce
folder risk reports by Network Discover. Server
IncidentPersister0.log This log file pertains to the Incident Persister process. Enforce
This process reads incidents from the incidents folder Server
on the Enforce Server, and writes them to the
database. Look at this log if the incident queue on
the Enforce Server (manager) grows too large. This
situation can be observed also by checking the
incidents folder on the Enforce Server to see if
incidents have backed up.
Indexer0.log This log file contains information when an EDM profile Enforce
or IDM profile is indexed. It also includes the Server
information that is collected when the external indexer (or
is used. If indexing fails then this log should be computer
consulted. where
the
external
indexer
is
running)
jdbc.log This log file is a trace of JDBC calls to the database. Enforce
By default, writing to this log is turned off. Server
Managing log files 312
About log files
machinelearning_native_filereader.log This log file records the runtime category classification Detection
(positive and negative) and associated confidence Server
levels for each message detected by a VML profile.
The default logging level is "info" which is configurable
using \Protect\config\log4cxx_config_filereader.xml.
machinelearning_training_0_0.log This log file records the design-time base accuracy Enforce
percentages for the k-fold evaluations for all VML Server
profiles.
machinelearning_training_native_manager.log This log file records the total number of features Enforce
modeled at design-time for each VML profile training Server
run. The default logging level is "info" which is
configurable using
\Protect\config\log4cxx_config_manager.xml.
PacketCapture.log This log file pertains to the packet capture process Network
that reassembles packets into messages and writes Monitor
to the drop_pcap directory. Look at this log if there
is a problem with dropped packets or traffic is lower
than expected. PacketCapture is not a Java
process, so it does not follow the same logging rules
as the other Symantec Data Loss Prevention system
processes.
RequestProcessor0.log This log file pertains to SMTP Prevent only. The log SMTP
file is primarily for use in cases where Prevent
SmtpPrevent0.log is not sufficient. detection
servers
Managing log files 313
About log files
ScanDetail-target-0.log Where target is the name of the scan target. All white Discover
spaces in the target's name are replaced with detection
hyphens. This log file pertains to Discover server servers
scanning. It is a file by file record of what happened
in the scan. If the scan of the file is successful, it
reads success, and then the path, size, time, owner,
and ACL information of the file scanned. If it failed,
a warning appears followed by the file name.
tomcat\localhost.date.log These Tomcat log files contain information for any Enforce
action that involves the user interface. The logs Server
include the user interface errors from red error
message box, password failures when logging on,
and Oracle errors (ORA –#).
VontuNotifier.log This log file pertains to the Notifier service and its Enforce
communications with the Enforce Server and the Server
MonitorController service. Look at this file to
see if the MonitorController service registered
a policy change.
VontuUpdate.log This log file is populated when you update Symantec Enforce
Data Loss Prevention. Server
See “Network Prevent for Web protocol debug log files” on page 326.
See “Network Prevent for Email log levels” on page 327.
Managing log files 314
Log collection and configuration screen
Make sure that the configuration file that you upload contains valid property
definitions that are applicable to the type of server you want to configure. If you
make a mistake when uploading a log configuration file, use the preconfigured
Restore Defaults setting to revert the log configuration to its original installed state.
The Enforce Server administration console performs only minimal validation of the
log configuration files that you upload. It ensures that:
■ Configuration file names correspond to actual logging configuration file names.
■ Root level logging is enabled in the configuration file. This configuration ensures
that some basic logging functionality is always available for a server.
■ Properties in the file that define logging levels contain only valid values (such
as INFO, FINE, or WARNING).
If the server detects a problem with any of these items, it displays an error message
and cancels the file upload.
If the Enforce Server successfully uploads a log configuration file change to a
detection server, the administration console reports that the configuration change
was submitted. If the detection server then encounters any problems when tries to
apply the configuration change, it logs a system event warning to indicate the
problem.
Incident Reporting API SOAP Logging Logs the entire SOAP request and response message for
most requests to the Incident Reporting API Web Service.
The logged messages are stored in the
webservices_soap.log file. To begin logging to this
file, edit the
c:\SymantecDLP\Protect\config\ManagerLogging.properties
file to set the com.vontu.enforce.
reportingapi.webservice.log.
Table 13-3 Preconfigured log settings for the Enforce Server (continued)
Custom Attribute Lookup Logging Logs diagnostic information each time the Enforce Server
uses a lookup plug-in to populate custom attributes for an
incident. Lookup plug-ins populate custom attribute data
using LDAP, CSV files, or other data repositories. The
diagnostic information is recorded in the Tomcat log file
(\SymantecDLP\logs\tomcat\localhost.date.log)
and the IncidentPersister_0.log file.
Restore Defaults All detection servers Restores log file parameters to their
default values.
Discover Trace Logging Network Discover Servers Enables informational logging for
Network Discover scans. These log
messages are stored in
FileReader0.log.
Managing log files 317
Configuring server logging behavior
Detection Trace Logging All detection servers Logs information about each message
that the detection server processes.
This includes information such as:
Packet Capture Debug Logging Network Monitor Servers Enables basic debug logging for
packet capture with Network Monitor.
This setting logs information in the
PacketCapture.log file.
Email Prevent Logging Network Prevent for Email servers Enables full message logging for
Network Prevent for Email servers.
This setting logs the complete
message content and includes
execution and error tracing
information. Logged information is
stored in the SmtpPrevent0.log file.
Note: Trace logging can produce a
large amount of data, and the data is
stored in clear text format. Use trace
logging only when you need to debug
a specific problem.
ICAP Prevent Message Processing Network Prevent for Web servers Enables operational and access
Logging logging for Network Prevent for Web.
This setting logs information in the
FileReader0.log file.
Follow this procedure to change the log configuration for a Symantec Data Loss
Prevention server.
To configure logging properties for a server
1 Click the Configuration tab if it is not already selected.
2 If you want to configure logging properties for a detection server, select the
server name from the Select a Detection Server menu.
Managing log files 319
Collecting server logs and configuration files
Note: The following debug log files are configured manually outside of the logging
framework available through the Enforce Server administration console:
ContentExtractionAPI_FileReader.log, ContentExtractionAPI_Manager.log,
ContentExtractionHost_FileReader.log, ContentExtractionHost_Manager.log,
machinelearning_native_filereader.log, and
machinelearning_training_native_manager.log. Refer to the entry for each of
these log files in debug log file list for configuration details. See “Debug log files”
on page 309.
Checkboxes on the Collection tab enable you to collect different types of files from
the selected servers. Table 13-5 describes each type of file.
Operational Operational log files record detailed information about the tasks the software performs and any errors
Logs that occur while the software performs those tasks. You can use the contents of operational log files
to verify that the software functions as you expect it to. You can also use these files to troubleshoot
any problems in the way the software integrates with other components of your system.
For example, you can use operational log files to verify that a Network Prevent for Email Server
communicates with a specific MTA on your network.
Debug and Debug log files record fine-grained technical details about the individual processes or software
Trace Logs components that comprise Symantec Data Loss Prevention. The contents of debug log files are not
intended for use in diagnosing system configuration errors or in verifying expected software
functionality. You do not need to examine debug log files to administer or maintain an Symantec
Data Loss Prevention installation. However, Symantec Support may ask you to provide debug log
files for further analysis when you report a problem. Some debug log files are not created by default.
Symantec Support can explain how to configure the software to create the file if necessary.
Configuration Use the Configuration Files option to retrieve both logging configuration files and server feature
Files configuration files.
Logging configuration files define the overall level of logging detail that is recorded in server log files.
Logging configuration files also determine whether specific features or subsystem events are recorded
to log files.
For example, by default the Enforce console does not log SOAP messages that are generated from
Incident Reporting API Web service clients. The ManagerLogging.properties file contains a
property that enables logging for SOAP messages.
You can modify many common logging configuration properties by using the presets that are available
on the Configuration tab.
If you want to update a logging configuration file by hand, use the Configuration Files checkbox to
download the configuration files for a server. You can modify individual logging properties using a
text editor and then use the Configuration tab to upload the modified file to the server.
The Configuration Files option retrieves the active logging configuration files and also any backup
log configuration files that were created when you used the Configuration tab. This option also
retrieves server feature configuration files. Server feature configuration files affect many different
aspects of server behavior, such as the location of a syslog server or the communication settings of
the server. You can collect these configuration files to help diagnose problems or verify server settings.
However, you cannot use the Configuration tab to change server feature configuration files. You
can only use the tab to change logging configuration files.
Managing log files 321
Collecting server logs and configuration files
Agent Logs Use the Agent Logs option to collect DLP agent service and operational log files from an Endpoint
Prevent detection server. This option is available only for Endpoint Prevent servers. To collect agent
logs using this option, you must have already pulled the log files from individual agents to the Endpoint
Prevent detection server using a Pull Logs action.
Use the Agent List screen to select individual agents and pull selected log files to the Endpoint
Prevent detection server. Then use the Agent Logs option on this page to collect the log files.
When the logs are pulled from the endpoint, they are stored on the Endpoint Server in an unencrypted
format. After you collect the logs from the Endpoint Server, the logs are deleted from the Endpoint
Server and are stored only on the Enforce Server. You can only collect logs from one endpoint at a
time.
3 To collect log files from the Enforce Server, select one or more of the
checkboxes next to the Enforce Server entry to indicate the type of files you
want to collect.
4 To collect log files from one or all detection servers, use the Select a Detection
Server menu to select either the name of a detection server or the Collect
Logs from All Detection Servers option. Then select one or more of the
checkboxes next to the menu to indicate the type of files you want to collect.
5 Click Collect Logs to begin the log collection process.
The administration console adds a new entry for the log collection process in
the Previous Log Collections list at the bottom of the screen. If you are
retrieving many log files, you may need to refresh the screen periodically to
determine when the log collection process has completed.
Note: You can run only one log collection process at a time.
6 To cancel an active log collection process, click Cancel next to the log collection
entry. You may need to cancel log collection if one or more servers are offline
and the collection process cannot complete. When you cancel the log collection,
the ZIP file contains only those files that were successfully collected.
7 To download collected logs to your local computer, click Download next to the
log collection entry.
8 To remove ZIP files stored on the Enforce Server, click Delete next to a log
collection entry.
See “Log collection and configuration screen” on page 314.
See “About log files” on page 305.
■ See “Network Prevent for Web operational log files and event codes” on page 323.
■ See “Network Prevent for Email operational log codes” on page 327.
■ See “Network Prevent for Email originated responses and codes” on page 331.
Managing log files 323
About log event codes
Network Prevent for Web operational log files and event codes
Network Prevent for Web log file names use the format of
WebPrevent_OperationalX.log (where X is a number). The number of files that
are stored and their sizes can be specified by changing the values in the
FileReaderLogging.properties file. This file is in the
SymantecDLP\Protect\config directory. By default, the values are:
■ com.vontu.icap.log.IcapOperationalLogHandler.limit = 5000000
■ com.vontu.icap.log.IcapOperationalLogHandler.count = 5
Table 13-6 lists the Network Prevent for Web-defined operational logging codes by
category. The italicized part of the text contains event parameters.
Table 13-6 Status codes for Network Prevent for Web operational logs
Operational Events
Connectivity Events
Where:
■ icap_bind_address is the Network Prevent for Web bind address to which the
server listens. This address is specified with the Icap.BindAddress Advanced
Setting.
■ icap_bind_port is the port at which the server listens. This port is set in the
Server > Configure page.
Where:
■ conn_id is the connection ID that is allocated to this connection. This ID can be
helpful in doing correlations between multiple logs.
■ icap_client_ip and icap_client_port are the proxy's IP address and port from
which the connect operation to Network Prevent for Web was performed.
Managing log files 324
About log event codes
Table 13-6 Status codes for Network Prevent for Web operational logs
(continued)
Where:
Where N indicates the number of connections in each state, when the message
was logged.
Connectivity Errors
Where:
■ icap_bind_address is the Network Prevent for Web bind address to which the
server listens. This address can be specified with the Icap.BindAddress Advanced
Setting.
■ icap_bind_port is the port at which the server listens. This port is set on the
Server > Configure page.
Where host_ip and port are the proxy system IP and port address from which a
connect attempt to Network Prevent for Web was performed. If the host is not listed
in the Icap.AllowHosts Advanced setting, it is unable to form a connection.
■ com.vontu.icap.log.IcapAccessLogHandler.count = 5
A Network Prevent for Web access log is similar to a proxy server’s web access
log. The “start” log message format is:
Table 13-7 lists the fields. The values of fields that are enclosed in quotes in this
example are quoted in an actual message. If field values cannot be determined,
the message displays - or "" as a default value.
Fields Explanation
time_stamp Time that Network Prevent for Web receives the request.
icap_status_code ICAP response code that Network Prevent for Web sends by for
this request.
referrer Header value from the request that contains the URI from which
this request came.
Table 13-7 Network Prevent for Web access log fields (continued)
Fields Explanation
action_code An integer representing the action that Network Prevent for Web
takes. Where the action code is one of the following:
■ 0 = UNKNOWN
■ 1 = ALLOW
■ 2 = BLOCK
■ 3 = REDACT
■ 4 = ERROR
■ 5 = ALLOW_WITHOUT_INSPECTION
■ 6 = OPTIONS_RESPONSE
■ 7 = REDIRECT
■ -1 = ILLEGAL
■ 0 = OPTIONS
■ 1 = REQMOD
■ 2 = RESPMOD
■ 3 = LOG
traffic_source_code An integer that represents the source of the network traffic. Where
the traffic source code is one of the following:
■ 1 = WEB
■ 2 = UNKNOWN
number_of_bytes_written. The last line should note that the connection has been
closed.
Note: Trace logging produces a large amount of data and therefore requires a large
amount of free disk storage space. Trace logging should be used only for debugging
an issue because the data that is written in the file is in clear text.
Level Guidelines
INFO General events: connect and disconnect notices, information on the messages
that are processed per connection.
FINEST Complete message content, deepest execution tracing, and error tracing.
Table 13-9 Status codes for Network Prevent for Email operational log
Code Description
Core Events
Core Errors
Connectivity Events
Table 13-9 Status codes for Network Prevent for Email operational log
(continued)
Code Description
Connectivity Errors
Table 13-9 Status codes for Network Prevent for Email operational log
(continued)
Code Description
Message Events
Where:
■ Recipient_count is the total number of addressees in the To, CC, and BCC
fields.
■ Response is the Network Prevent for Email response which can be one of:
PASS, BLOCK, BLOCK_AND_REDIRECT, REDIRECT, MODIFY, or ERROR.
■ Thee status is an Enhanced Status code.
See “Network Prevent for Email originated responses and codes” on page 331.
■ The rtime is the time in seconds for Network Prevent for Emailto fully receive
the message from the sending MTA.
■ The dtime is the time in seconds for Network Prevent for Email to perform
detection on the message.
■ The mtime is the total time in seconds for Network Prevent for Email to process
the message Message Errors.
Managing log files 331
About log event codes
Table 13-9 Status codes for Network Prevent for Email operational log
(continued)
Code Description
Message Errors
250 2.0.0 Ok: Carry on. Success code that Network Prevent for Email uses.
221 2.0.0 Service The normal connection termination code that Network
closing. Prevent for Email generates if a QUIT request is
received when no forward MTA connection is active.
Managing log files 332
About log event codes
451 4.3.0 Error: This “general, transient” error response is issued when
Processing a (potentially) recoverable error condition arises. This
error. error response is issued when a more specific error
response is not available. Forward connections are
sometimes closed, and their unexpected termination
is occasionally a cause of a code 451, status 4.3.0.
However sending connections should remain open
when such a condition arises unless the sending MTA
chooses to terminate.
421 4.3.0 Fatal: This “general, terminal” error response is issued when
Processing a fatal, unrecoverable error condition arises. This error
error. results in the immediate termination of any sender or
Closing receiver connections.
connection.
421 4.4.1 Fatal: That an attempt to connect the forward MTA was
Forwarding refused or otherwise failed to establish properly.
agent
unavailable.
451 4.4.2 Error: The forward MTA connection was lost in a state that
Connection may be recoverable if the connection can be
lost to re-established. The sending MTA connection is
forwarding maintained unless it chooses to terminate.
agent.
421 4.4.7 Error: The last command issued did not receive a response
Request within the time window that is defined in the
timeout RequestProcessor.DefaultCommandTimeout. (The
exceeded. time window may be from
RequestProcessor.DotCommandTimeout if the
command issued was the “.”). The connection is closed
immediately.
Managing log files 333
About log event codes
421 4.4.7 Error: The connection was idle (no commands actively
Connection awaiting response) in excess of the time window that
timeout is defined in
exceeded. RequestProcessor.DefaultCommandTimeout.
501 5.5.2 Fatal: A fatal violation of the SMTP protocol (or the constraints
Invalid that are placed on it) occurred. The violation is not
transmission expected to change on a resubmitted message attempt.
request. This message is only issued in response to a single
command or data line that exceeds the boundaries
that are defined in RequestProcessor.MaxLineLength.
550 5.7.1 User This combination of code and status indicates that a
Supplied. Blocking response rule has been engaged. The text
that is returned is supplied as part of the response rule
definition.
Note that a 4xx code and a 4.x.x enhanced status indicate a temporary error. In
such cases the MTA can resubmit the message to the Network Prevent for Email
Server. A 5xx code and a 5.x.x enhanced status indicate a permanent error. In such
cases the MTA should treat the message as undeliverable.
See “About log files” on page 305.
Chapter 14
Using Symantec Data Loss
Prevention utilities
This chapter includes the following topics:
■ About DBPasswordChanger
Name Description
DBPasswordChanger Changes the encrypted password that the Enforce Server uses to connect to the Oracle
database.
Name Description
sslkeytool Generates custom authentication keys to improve the security of the data that is transmitted
between the Enforce Server and detection servers. The custom authentication keys must be
copied to each Symantec Data Loss Prevention server.
See the topic "About the sslkeytool utility and server certificates" in the Symantec Data Loss
Prevention Installation Guide.
SQL Preindexer Indexes an SQL database or runs an SQL query on specific data tables within the database.
This utility is designed to pipe its output directly to the Remote EDM Indexer utility.
Remote EDM Indexer Converts a comma-separated or tab-delimited data file into an exact data matching index.
The utility can be run on a remote machine to provide the same indexing functionality that is
available locally on the Enforce Server.
This utility is often used with the SQL Preindexer. The SQL Preindexer can run an SQL query
and pass the resulting data directly to the Remote EDM Indexer to create an EDM index.
Name Description
Service_Shutdown.exe This utility enables an administrator to turn off both the agent and the watchdog services on
an endpoint. (As a tamper-proofing measure, it is not possible for a user to stop either the
agent or the watchdog service.)
See “Shutting down the agent and the watchdog services on Windows endpoints” on page 1993.
Vontu_sqlite3.exe This utility provides an SQL interface that enables you to view or modify the encrypted
database files that the Symantec DLP Agent uses. Use this tool when you want to investigate
or make changes to the Symantec Data Loss Prevention files.
See “Inspecting the database files accessed by the agent” on page 1994.
Logdump.exe This tool lets you view the Symantec DLP Agent extended log files, which are hidden for
security reasons.
Name Description
Start_agent This utility enables an administrator to start agents running on Mac endpoints that have been
shut down using the shutdown task.
See “Starting DLP Agents that run on Mac endpoints” on page 2001.
About DBPasswordChanger
Symantec Data Loss Prevention stores encrypted passwords to the Oracle database
in a file that is called DatabasePassword.properties, located in
c:\SymantecDLP\Protect\config (Windows)
or/opt/SymantecDLP/Protect/config (Linux). Because the contents of the file
are encrypted, you cannot directly modify the file. The DBPasswordChanger utility
changes the stored Oracle database passwords that the Enforce Server uses.
Before you can use DBPasswordChanger to change the password to the Oracle
database you must:
■ Shut down the Enforce Server.
■ Change the Oracle database password using Oracle utilities.
See “Example of using DBPasswordChanger” on page 337.
DBPasswordChanger syntax
The DBPasswordChanger utility uses the following syntax:
All command-line parameters are required. The following table describes each
command-line parameter.
See “Example of using DBPasswordChanger” on page 337.
Parameter Description
Parameter Description
DBPasswordChanger \SymantecDLP\Protect\bin\DatabasePassword.properties
protect_oracle
■ Policy components
■ Policy templates
■ Solution packs
■ Policy groups
■ Policy deployment
■ Policy severity
■ Data Profiles
■ User Groups
Feature Description
Intuitive policy The policy builder interface supports Boolean logic for detection configuration.
building
You can combine different detection methods and technologies in a single policy.
Decoupled The system stores response rules and policies as separate entities.
response rules
You can manage and update response rules without having to change policies; you can reuse
response rules across policies.
Fine-grained policy The system provides severity levels for policy violations.
reporting
You can report the overall severity of a policy violation by the highest severity.
Centralized data The system stores data and group profiles separate from policies.
and group profiling
This separation enables you to manage and update profiles without changing policies.
Policy sharing The system supports policy template import and export.
Role-based access The system provides role-based access control for various user and administrative functions.
control
You can create roles for policy authoring, policy administration, and response rule authoring.
Policy components
A valid policy has at least one detection or group rule with at least one match
condition. Response rules are optional policy components.
Policy components describes Data Loss Prevention policy components.
Policy name Required The policy name must be unique within the Policy Group
Policy rule Required A valid policy must contain at least one rule that declares at least one
match condition.
Data Profile May be Exact Data Matching (EDM), Indexed Document Matching (IDM), Vector
required Machine Learning (VML), and Form Recognition policies all require data
profiles.
User group May be A policy requires a User Group only if a group method in the policy
required requires it.
Policy description Optional A policy description helps users identify the purpose of the policy.
Policy label Optional A policy label helps Veritas Data Insight business users identify the
purpose of the policy when using the Self-Service Portal.
Response Rule Optional A policy can implement one or more response rules to report and
remediate incidents.
Policy exception Optional A policy can contain one or more exceptions to exclude data from
matching.
Compound match Optional A policy rule or exception can implement multiple match conditions.
conditions
See “Compound conditions” on page 371.
Policy templates
Symantec Data Loss Prevention provides policy templates to help you quickly
deploy detection policies in your enterprise. You can share policies across systems
and environments by importing and exporting policy rules and exceptions as
templates.
Using policy templates saves you time and helps you avoid errors and information
gaps in your policies because the detection methods are predefined. You can edit
a template to create a policy that precisely suits your needs. You can also export
and import your own policy templates.
Some policy templates are based on well-known sets of regulations, such as the
Payment Card Industry Security Standard, Gramm-Leach-Bliley, California SB1386,
and HIPAA. Other policy templates are more generic, such as Customer Data
Protection, Employee Data Protection, and Encrypted Data. Although the
regulation-based templates can help address the requirements of the relevant
regulations, consult with your legal counsel to verify compliance.
See “Creating a policy from a template” on page 374.
Table 15-3 describes the system-defined policy templates provided by Symantec
Data Loss Prevention.
US Regulatory Enforcement See “US Regulatory Enforcement policy templates” on page 377.
General Data Protection Regulation See “General Data Protection Regulation policy templates” on page 379.
International Regulatory Enforcement See “International Regulatory Enforcement policy templates” on page 380.
Customer and Employee Data Protection See “Customer and Employee Data Protection policy templates”
on page 380.
Confidential or Classified Data Protection See “Confidential or Classified Data Protection policy templates”
on page 382.
Network Security Enforcement See “Network Security Enforcement policy templates” on page 383.
Introduction to policies 344
Solution packs
Acceptable Use Enforcement See “Acceptable Use Enforcement policy templates” on page 383.
Imported Templates See “Policy template import and export” on page 349.
Solution packs
Symantec Data Loss Prevention provides solution packs for several industry
verticals. A solution pack contains configured policies, response rules, user roles,
reports, protocols, and the incident statuses that support a particular industry or
organization. For a list of available solution packs and instructions, refer to chapter
4, "Importing a solution pack" in the Symantec Data Loss Prevention Installation
Guide. You can import one solution pack to the Enforce Server.
Once you have imported the solution pack, start by reviewing its policies. By default
the solution pack activates the policies it provides.
See “Manage and add policies” on page 409.
Policy groups
You deploy policies to detection servers using policy groups. Policy groups limit
the policies, incidents, and detection mechanisms that are accessible to specific
users.
Each policy belongs to one policy group. When you configure a policy, you assign
it to a policy group. You can change the policy group assignment, but you cannot
assign a policy to more than one policy group. You deploy policy groups to one or
more detection servers.
The Enforce Server is configured with a single policy group called the Default
Policy Group. The system deploys the default policy group to all detection servers.
If you define a new policy, the system assigns the policy to the default policy group,
unless you create and specify a different policy group. You can change the name
of the default policy group. A solution pack creates several policy groups and assigns
policies to them.
After you create a policy group, you can link policies, Discover targets, and roles
to the policy group. When you create a Discover target, you must associate it with
a single policy group. When you associate a role with particular policy groups, you
can restrict users in that role. Policies in that policy group detect incidents and report
them to users in the role that is assigned to that policy group.
Introduction to policies 345
Policy deployment
The relationship between policy groups and detection servers depends on the
server type. You can deploy a policy group to one or more Network Monitor, Network
Prevent, or Endpoint Servers. Policy groups that you deploy to an Endpoint Server
apply to any DLP Agent that is registered with that server. The Enforce Server
automatically associates all policy groups with all Network Discover Servers.
For Network Monitor and Network Prevent, each policy group is assigned to one
or more Network Monitor Servers, Network Prevent for Email Servers, or Network
Prevent for Web Servers. For Network Discover, policy groups are assigned to
individual Discover targets. A single detection server may handle as many policy
groups as necessary to scan its targets. For Endpoint Monitor, policy groups are
assigned to the Endpoint Server and apply to all registered DLP Agents.
See “Manage and add policy groups” on page 412.
See “Creating and modifying policy groups” on page 413.
Policy deployment
You can use policy groups to organize and deploy your policies in different ways.
For example, consider a situation in which your detection servers are set up across
a system that spans several countries. You can use policy groups to ensure that a
detection server runs only the policies that are valid for a specific location.
You can dedicate some of your detection servers to monitor internal network traffic
and dedicate others to monitor network exit points. You can use policy groups to
deploy less restrictive policies to servers that monitor internal traffic. At the same
time, you can deploy stricter policies to servers that monitor traffic leaving your
network.
You can use policy groups to organize policies and incidents by business units,
departments, geographic regions, or any other organizational unit. For example,
policy groups for specific departments may be appropriate where security
responsibilities are distributed among various groups. In such cases, policy groups
provide for role-based access control over the viewing and editing of incidents. You
deploy policy groups according to the required division of access rights within your
organization (for example, by business unit).
You can use policy groups for detection-server allocation, which may be more
common where security departments are centralized. In these cases, you would
carefully choose the detection server allocation for each role and reflect the server
name in the policy group name. For example, you might name the groups Inbound
and Outbound, United States and International, or Testing and Production.
In more complex environments, you might consider some combination of the
following policy groups for deploying policies:
Introduction to policies 346
Policy severity
Policy severity
When you configure a detection rule, you can select a policy severity level. You
can then use response rules to take action based on a severity level. For example,
you can configure a response rule to take action after a specified number of "High"
severity violations.
See “About response rule conditions” on page 1255.
The default severity level is set to "High," unless you change it. The default severity
level applies to any condition that the detection rule matches. For example, if the
default severity level is set to "High," every detection rule violation is labeled with
this severity level. If you do not want to tag every violation with a specific severity,
you can define the criteria by which a severity level is established. In this case the
default behavior is overridden. For example, you can define the "High" severity
level to be applied only after a specified number of condition matches have occurred.
See “Defining rule severity” on page 397.
In addition, you can define multiple severity levels to layer severity reporting. For
example, you can set the "High" severity level after 100 matches, and the medium
severity level to apply after 50 matches.
Author Response Add, configure, and manage response rules (but do not add them to policies).
Rules
See “About response rule authoring privileges” on page 1260.
Introduction to policies 348
Data Profiles
Data Profiles
Data Profiles are user-defined configurations that you create to implement Exact
Data Matching (EDM), Indexed Document Matching (IDM), Form Recognition, and
Vector Machine Learning (VML) policy conditions.
See “Data Loss Prevention policy detection technologies” on page 361.
Table 15-6 describes the types of Data Profiles that the system supports.
Exact Data Profile An Exact Data Profile is used for Exact Data Matching (EDM) policies. The Exact Data Profile
contains data that has been indexed from a structured data source, such as a database,
directory server, or CSV file. The Exact Data Profile runs on the detection server. If an EDM
policy is deployed to an endpoint, the DLP Agent sends the message to the detection server
for evaluation (two-tier detection).
See “About the Exact Data Profile and index” on page 440.
See “About two-tier detection for EDM on the endpoint” on page 445.
Indexed Document An Indexed Document Profile is used for Indexed Document Matching (IDM) policies. The
Profile Indexed Document Profile contains data that has been indexed from a collection of confidential
documents. The Indexed Document Profile runs on the detection server. If an IDM policy is
deployed to an endpoint, the DLP Agent sends the message to the detection server for
evaluation (two-tier detection).
Vector Machine A Vector Machine Learning Profile is used for Vector Machine Learning (VML) policies. The
Learning Profile Vector Machine Learning Profile contains a statistical model of the features (keywords)
extracted from content that you want to protect. The VML profile is loaded into memory by
the detection server and DLP Agent. VML does not require two-tier detection.
Form Recognition A Form Recognition Profile is used for Form Recognition policies. The Form Recognition
Profile Profile contains blank images of forms you want to detect.
When you configure a profile, yoo specify a numeric value to represent the Fill Threshold.
This number is a value from 1-10. 1 represents a form that has been filled out minimally and
10 a form that is completely filled in. If the Fill Threshold is met or exceeded, an incident is
opened.
User Groups
You define User Groups on the Enforce Server. User Groups contain user identity
information that you populate by synchronizing the Enforce Server with a group
directory server (Microsoft Active Directory).
You must have at least policy authoring or server administrator privileges to define
User Groups. You must define the User Groups before you synchronize users.
Once you define a User Group, you populate it with users, groups, and business
units from your directory server. After the user group is populated, you associate
it with the User/Sender and Recipient detection rules or exceptions. The policy only
applies to members of that User Group.
See “Introducing synchronized Directory Group Matching (DGM)” on page 774.
See “Configuring directory server connections” on page 146.
See “Configuring User Groups” on page 775.
Policy metadata (name, The name of the template has to be less than 60 characters or YES
description, label) it does not appear in the Imported Templates list.
Described Content Matching If the template contains only DCM methods, it imports as YES
(DCM) rules and exceptions exported without changes.
Exact Data Matching (EDM) If the template contains multiple EDM or IDM match conditions, YES
and Indexed Document only one is exported.
Matching (IDM) conditions
If the template contains an EDM and an IDM condition, the
system drops the IDM.
User Group User group methods are maintained on import only if the user NO
groups exist on the target before import.
Policy Group Policy groups do not export. On import you can select a local NO
policy group, otherwise the system assigns the policy to the
Default Policy group.
Response Rules You must define and add response rules to policies from the NO
local Enforce Server instance.
Data Profiles On import you must reference a locally defined Data Profile, NO
otherwise the system drops any methods that require a Data
Profile.
Custom data identifiers Modified and custom data identifiers do not export. NO
Action Description
Familiarize yourself with the different types of detection See “Detecting data loss” on page 353.
technologies and methods that Symantec Data Loss
See “Data Loss Prevention policy detection technologies”
Prevention provides, and considerations for authoring
on page 361.
data loss prevention policies.
See “Policy matching conditions” on page 363.
Develop a policy detection strategy that defines the type See “Develop a policy strategy that supports your data
of data you want to protect from data loss. security objectives” on page 428.
Review the policy templates that ship with Symantec See “Policy templates” on page 343.
Data Loss Prevention, and any templates that you import
See “Solution packs” on page 344.
manually or by solution pack.
Create policy groups to control how your policies are See “Policy groups” on page 344.
accessed, edited, and deployed.
See “Policy deployment” on page 345.
To detect exact data or content or similar unstructured See “Data Profiles” on page 348.
data, create one or more Data Profiles.
To detect exact identities from a synchronized directory See “User Groups” on page 349.
server (Active Directory), configure one or more User
Groups.
Configure conditions for detection and group rules and See “Creating a policy from a template” on page 374.
exceptions.
Test and tune your policies. See “Test and tune policies to improve match accuracy”
on page 430.
Add response rules to the policy to take action when See “About response rules” on page 1243.
the policy is violated.
Manage the policies in your enterprise. See “Manage and add policies” on page 409.
to Symantec Data Loss Prevention. It displays the policy name, description, label,
group, status, version, and last modified date for the policy. It also displays the
detection and the response rules for that policy.
Any user with the Author Policies privilege for a given policy or set of policies can
view and print policy details.
See “Policy authoring privileges” on page 347.
Table 15-9 describes how to work with policy details.
Action Description
View and print details for a single policy. See “Viewing and printing policy details”
on page 422.
Download details for all policies. See “Downloading policy details” on page 422.
Chapter 16
Overview of policy detection
This chapter includes the following topics:
■ Exception conditions
■ Compound conditions
See “Integrating Symantec Information Centric Tagging with Data Loss Prevention”
on page 357.
Actor/Tool/Action Notes
Actor/Tool/Action Notes
3 Action: To detect tags on the server, If you are detecting only watermarks, this
change the system setting on every step is not necessary.
detection server to enable detection of
metadata, where the tags reside. Restart
each changed server.
Actor/Tool/Action Notes
4 Action: To detect tags on the Endpoint If you are detecting only watermarks, this
Agents, change the system setting on each step is not necessary.
Endpoint Agent group to enable detection
of metadata, where the tags reside.
5 Action: Choose the most useful detection Guidance for Keyword matching:
(search) method(s) and enter the tags and
■ For each tag, enter the acronyms
watermarks into detection rules.
concatenated, separated by hyphens.
See “Configuring the Content Matches Example: "SYM-ENG-SECRET"
Keyword condition” on page 717. If you are doing a more generic search,
you do not need to enter all three
See “Configuring the Content Matches
levels.
Regular Expression condition” on page 727.
■ For email watermarks, enter the syntax
as created in Information Centric
Tagging. Example:
"Symantec-Confidential"
Search on either the Subject or Body.
Actor/Tool/Action Notes
7 Action: Run Data Loss Prevention. Supported file formats and email version:
Note: All detection channels are ■ Data Loss Prevention reads tags in
supported, both on-prem and in-cloud. these file formats only:
■ Microsoft Office binary format
(pre-2008, DOC, PPT, XLS)
■ XML format (2008-forward, DOCX,
PPTX, XLSX)
■ PDF files
■ Exception: Files that were
encrypted in Information Centric
Tagging using RMS or Ionic are not
read.
■ Data Loss Prevention detects
watermarks (but not tags) in Office 365
emails.
■ The metadata detection flag is not enabled for the Agent Group.
■ The documents are not tagged.
To confirm that a document is tagged, you can try the instructions in the table.
A tag appears as a name-value pair; a watermark uses a text string format.
Table 16-2 How to view Information Centric Tagging tags and watermarks in
documents
■ Select File->Properties
2 Select
File->Properties->Custom
Technology Description
Exact Data Matching (EDM) Use EDM to detect personally identifiable information.
See “Introducing Exact Data Matching (EDM)” on page 436.
Indexed Document Matching Use IDM to detect exact files and file contents, and derivative content.
(IDM)
See “Introducing Indexed Document Matching (IDM)” on page 529.
Form Recognition Use Form Recognition to detect images of forms that belong to a gallery associated
to a Form Recognition policy.
Directory Group Matching Use DGM to detect exact identities synchronized from a directory server or profiled
(DGM) from a database.
Described Content Matching Use DCM to detect message content and context, including:
(DCM)
■ Data Identifiers to match content using precise patterns and data validators.
See “Introducing data identifiers” on page 635.
■ Keywords to detect content using key words, key phrases, and keyword dictionaries.
See “Introducing keyword matching” on page 710.
■ Regular Expressions to detect characters, patterns, and strings.
See “Introducing regular expression matching” on page 725.
■ File properties to detect files by type, name, size, and custom type.
See “Introducing file property detection” on page 736.
■ User, sender, and recipient patterns to detect described identities.
See “Introducing described identity matching” on page 764.
■ Protocol signatures to detect network traffic.
See “Introducing protocol monitoring for network” on page 749.
■ Destinations, devices, and protocols to detect endpoint events.
See “Introducing endpoint event detection” on page 753.
Overview of policy detection 363
Policy matching conditions
Technology Description
Custom policy detection Data Loss Prevention provides methods for customizing and extending detection,
methods including:
See “Configuring the Content Matches Regular Expression condition” on page 727.
Content Matches Keyword Match described content using keywords, key phrases, and keyword dictionaries
Content Matches Data Match described content using Data Identifier patterns and validators.
Identifier
See “Introducing data identifiers” on page 635.
See “Configuring the Content Matches data identifier condition” on page 651.
Table 16-6 lists the content matching conditions that require a Data Profile and
index.
Overview of policy detection 365
Policy matching conditions
Content Matches Exact Data Match exact data profiled from a structured data source such as a database or CSV
From an Exact Data Profile file.
(EDM)
See “Introducing Exact Data Matching (EDM)” on page 436.
See “Configuring the Content Matches Exact Data policy condition” on page 464.
Note: This condition requires two-tier detection on the endpoint. See “About two-tier
detection for EDM on the endpoint” on page 445.
Content Matches Document Match files and file contents exactly or partially using fingerprinting
Signature From an Indexed
See “Introducing Indexed Document Matching (IDM)” on page 529.
Document Profile (IDM)
See “Configuring the Content Matches Document Signature policy condition”
on page 564.
Note: This condition requires two-tier detection on the endpoint. See “About the
Indexed Document Profile” on page 532.
Detect using Vector Machine Match file contents with features similar to example content you have trained.
Learning profile (VML)
See “Introducing Vector Machine Learning (VML)” on page 586.
See “Configuring the Detect using Vector Machine Learning Profile condition”
on page 602.
Message Attachment or File Match specific file formats and document attachments.
Type Match
See “About file type matching” on page 736.
See “Configuring the Message Attachment or File Type Match condition” on page 740.
Overview of policy detection 366
Policy matching conditions
Message Attachment or File Match files or attachments over or under a specified size.
Size Match
See “About file size matching” on page 738.
See “Configuring the Message Attachment or File Size Match condition” on page 741.
Message Attachment or File Match files or attachments that have a specific name or match wildcards.
Name Match
See “About file name matching” on page 739.
Message/Email Properties and Classify Microsoft Exchange email messages based on specific message attributes
Attributes (MAPI attributes).
Custom File Type Signature Match custom file types based on their binary signature using scripting.
See “Enabling the Custom File Type Signature condition in the policy console”
on page 744.
Protocol Monitoring Match incidents on the network transmitted using a specified protocol, including
SMTP, FTP, HTTP/S, IM, and NNTP.
See “Configuring the Protocol Monitoring condition for network detection” on page 750.
Condition Description
Protocol or Endpoint Match endpoint messages transmitted using a specified transport protocol or when
Monitoring data is moved or copied to a particular destination.
Endpoint Device Class or ID Match endpoint events occurring on specified hardware devices.
Endpoint Location Match endpoint events depending if the DLP Agent is on or off the corporate network.
Sender/User Matches Pattern Match message senders and users by email address, user ID, IM screen name,
and IP address.
Recipient Matches Pattern Match message recipients by email or IP address, or Web domain.
Sender/User based on a Match message senders and users from a synchronized directory server.
Directory Server Group
See “Introducing synchronized Directory Group Matching (DGM)” on page 774.
Sender/User based on a Match message senders and users from a profiled directory server.
Directory from: an Exact Data
See “Introducing profiled Directory Group Matching (DGM)” on page 782.
Profile
See “Configuring the Sender/User based on a Profiled Directory condition”
on page 784.
Note: This condition requires two-tier detection on the endpoint. See “About two-tier
detection for profiled DGM” on page 782.
Recipient based on a Directory Match message recipients from a synchronized directory server.
Server Group
See “Introducing synchronized Directory Group Matching (DGM)” on page 774.
Recipient based on a Directory Match message recipients from a profiled directory server.
from: an Exact Data Profile
See “Configuring Exact Data profiles for DGM” on page 783.
See “Configuring the Recipient based on a Profiled Directory condition” on page 785.
Note: This condition requires two-tier detection on the endpoint. See “About two-tier
detection for profiled DGM” on page 782.
component matching, the system evaluates the entire message against the match
condition.
See “Selecting components to match on” on page 400.
The content-based conditions support cross-component matching. You can configure
the DCM content conditions to match across all message components. The EDM
condition matches on message envelope, body, and attachments. The document
conditions match on the message body and attachments, except File Type and
Name which only match on the attachment. Protocol, endpoint, and identity
conditions match on the entire message, as does any condition evaluated by the
DLP Agent. The subject component only applies to SMTP email or NNTP messages.
Table 16-11 summarizes the component matching supported by each match
condition type.
Exception conditions
Symantec Data Loss Prevention provides policy exceptions to exclude messages
and message components from matching. You can use exception conditions to
refine the scope of your detection and group rules.
See “Use a limited number of exceptions to narrow detection scope” on page 432.
Warning: Do not use multiple compound exceptions in a single policy. Doing so can
cause detection to run out of memory. If you find that the policy needs multiple
compound exceptions to produce matches, you should reconsider the design of
the matching conditions.
Note: Symantec Data Loss Prevention does not support match-level exceptions,
only component or message-level exceptions.
For example, consider a policy that has a detection rule with one condition and an
exception with one condition. The rule matches messages containing Microsoft
Word attachments and generates an incident for each match. The exception
excludes from matching messages from [email protected]. An email from
[email protected] that contains a Word attachment is excepted from matching and
does not trigger an incident. The detection exception condition excluding
[email protected] messages takes precedence over the detection rule match
condition that would otherwise match on the message.
See “Policy detection execution” on page 371.
You can implement any condition as an exception, except the EDM condition
Content Matches Exact Data From. In addition, Network Prevent for Web does
not support synchronized DGM exceptions. You can implement IDM as an exception,
but the exception excludes exact files from matching, not file contents. To exclude
file contents, you "whitelist" it. VML can be used as an exception if the content is
from the same category.
Overview of policy detection 371
Compound conditions
Compound conditions
A valid policy must declare at least one rule that defines at least one match condition.
The condition matches input data to detect data loss. A rule with a single condition
is a simple rule. Optionally, you can declare multiple conditions within a single
detection or group rule. A rule with multiple conditions is a compound condition.
For compound conditions, each condition in the rule must match to trigger a violation.
Thus, for a single policy that declares one rule with two conditions, if one condition
matches but the other does not, detection does not report a match. If both conditions
match, detection reports a match, assuming that the rule is set to count all matches.
In programmatic terms, two or more conditions in the same rule are ANDed together.
Like rules, you can declare multiple conditions within a single exception. In this
case, all conditions in the exception must match for the exception to apply.
See “Policy detection execution” on page 371.
See “Use compound conditions to improve match accuracy” on page 432.
See “Exception conditions” on page 370.
Table 16-12 summarizes the policy condition execution logic for the detection server
for various policy configurations.
Compound conditions AND If a single rule or exception in a policy contains two or more
match conditions, all conditions must match.
Rules or exceptions of same OR If there are two detection rules in a single policy, or two group
type rules in a single policy, or two exceptions of the same type
(detection or group), the rules or exceptions are independent
of each other.
Rules of different type AND If one or more detection rules is combined with one or more
group rules in a single policy, the rules are dependent.
Exceptions of different type OR If one or more detection exceptions is combined with one or
more group exceptions in a single policy, the exceptions are
independent.
See “Author policies to limit the potential effect of two-tier detection” on page 433.
Table 16-13 lists the detection conditions that require two-tier detection on the
endpoint.
Note: You cannot combine an Endpoint Prevent: Notify or Block response rule with
two-tier match conditions, including Exact Data Matching (EDM), Directory Group
Matching (DGM), and Indexed Document Matching (IDM) when two-tier detection
is enabled. If you do, the system displays a warning for both the detection condition
and the response rule.
Exact Data Matching (EDM) Content Matches Exact Data from See “Introducing Exact Data Matching
an Exact Data Profile (EDM)” on page 436.
Profiled Directory Group Matching Sender/User based on a Directory See “Introducing profiled Directory
(DGM) from an Exact Data Profile Group Matching (DGM)” on page 782.
Indexed Document Matching (IDM) Content Matches Document See “Introducing Indexed Document
Signature from an Indexed Document Matching (IDM)” on page 529.
Profile
See “Two-tier IDM detection”
on page 532.
Note: Two-tier detection for IDM only
applies if it is enabled on the Endpoint
Server (two_tier_idm = on). If Endpoint
IDM is enabled (two_tier_idm = off),
two-tier detection is not used.
Chapter 17
Creating policies from
templates
This chapter includes the following topics:
Action Description
Add a policy from a template. See “Adding a new policy or policy template” on page 389.
Choose the template you want to At the Manage > Policies > Policy List > New Policy - Template List screen the
use. system lists all policy templates.
System-provided template categories:
Click Next to configure the policy. For example, select the Webmail policy template and click Next.
Choose a Data Profile (if If the template relies on one or more Data Profiles, the system prompts you to
prompted). select each:
■ Exact Data Profile
See “Choosing an Exact Data Profile” on page 385.
■ Indexed Document Profile
See “Choosing an Indexed Document Profile” on page 387.
If you do not have a Data Profile, you can either:
■ Cancel the policy definition process, define the profile, and resume creating the
policy from the template.
■ Click Next to configure the policy.
On creation of the policy, the system drops any rules or exceptions that rely on
the Data Profile.
Action Description
Edit the policy name or If you intend to modify a system-defined template, you may want to change the
description (optional). name so you can distinguish it from the original.
Note: The Policy Label field is reserved for the Veritas Data Insight Self-Service
Portal.
Select a policy group (if If you have defined a policy group, select it from the Policy Group list.
necessary).
See “Creating and modifying policy groups” on page 413.
If you have not defined a policy group, the system deploys the policy to the Default
Policy Group.
Edit the policy rules or exceptions The Configure Policy screen displays the rules and exceptions (if any) provided
(if necessary). by the policy.
You can modify, add, and remove policy rules and exceptions to meet your
requirements.
Save the policy and export it Click Save to save the policy.
(optional).
You can export policy detection as a template for sharing or archiving.
Test and tune the policy Test and tune the policy using data the policy should and should not detect.
(recommended).
Review the incidents that the policy generates. Refine the policy rules and
exceptions as necessary to reduce false positives and false negatives.
Add response rules (optional). Add response rules to the policy to report and remediate violations.
Export Administration Regulations (EAR) Enforces the U.S. Department of Commerce Export Administration
Regulations (EAR).
FACTA 2003 (Red Flag Rules) Enforces sections 114 and 315 (or Red Flag Rules) of the Fair
and Accurate Credit Transactions Act (FACTA) of 2003.
See “FACTA 2003 (Red Flag Rules) policy template” on page 1140.
HIPAA and HITECH (including PHI) This policy enforces the US Health Insurance Portability and
Accountability Act (HIPAA).
International Traffic in Arms Regulations (ITAR) This policy enforces the US Department of State ITAR provisions.
NASD Rule 2711 and NYSE Rules 351 and 472 This policy protects the name(s) of any companies that are involved
in an upcoming stock offering.
See “NASD Rule 2711 and NYSE Rules 351 and 472 policy
template” on page 1203.
Creating policies from templates 378
US Regulatory Enforcement policy templates
NASD Rule 3010 and NYSE Rule 342 This policy monitors brokers-dealers communications.
See “NASD Rule 3010 and NYSE Rule 342 policy template”
on page 1205.
NERC Security Guidelines for Electric Utilities This policy detects the information that is outlined in the North
American Electric Reliability Council (NERC) security guidelines
for the electricity sector.
Office of Foreign Assets Control (OFAC) This template detects communications involving targeted OFAC
groups.
OMB Memo 06-16 and FIPS 199 Regulations This template detects information that is classified as confidential.
See “OMB Memo 06-16 and FIPS 199 Regulations policy template”
on page 1211.
Payment Card Industry Data Security Standard This template detects credit card number data.
SEC Fair Disclosure Regulation This template detects data disclosure of material financial
information.
US Intelligence Control Markings (CAPCO) and This template detects authorized terms to identify classified
DCID 1/7 information in the US Federal Intelligence community.
Table 17-3
Policy template Description
General Data Protection Regulations (Banking and This policy protects personal identifiable information related
Finance) to banking and finance.
General Data Protection Regulation (Digital Identity) This policy protects personal identifiable information related
to digital identity.
General Data Protection Regulation (Government This policy protects personal identifiable information related
Identification) to government identification.
General Data Protection Regulation (Healthcare and This policy protects personal identifiable information related
Insurance) to healthcare and insurance.
See “General Data Protection Regulation (Healthcare and
Insurance)” on page 1178.
General Data Protection Regulation (Personal Profile) This policy protects personal identifiable information related
to personal profile data.
General Data Protection Regulation (Travel) This policy protects personal identifiable information related
to travel.
Data Protection Act 1998 This policy protects personal identifiable information.
EU Data Protection Directives This policy detects personal data specific to the EU directives.
Human Rights Act 1998 This policy enforces Article 8 of the act for UK citizens.
Canadian Social Insurance Numbers This policy detects patterns indicating Canadian social insurance
numbers.
Credit Card Numbers This policy detects patterns indicating credit card numbers.
Individual Taxpayer Identification Numbers This policy detects IRS-issued tax processing numbers.
(ITIN)
See “Individual Taxpayer Identification Numbers (ITIN) policy template”
on page 1199.
SWIFT Codes This policy detects codes banks use to transfer money across
international borders.
UK National Health Service Number This policy detects personal identification numbers issued by the NHS.
US Social Security Numbers This policy detects patterns indicating social security numbers.
Encrypted Data This policy detects the use of encryption by a variety of methods.
Merger and Acquisition Agreements This policy detects information and communications about upcoming merger
and acquisition activity.
Price Infomation This policy detects specific SKU and pricing information.
Proprietary Media Files This policy detects various types of video and audio files.
Symantec DLP Awareness and Avoidance This policy detects any communications that refer to Symantec DLP or
other data loss prevention systems and possible avoidance of detection.
Common Spyware Upload Sites This policy detects access to common spyware upload Web sites.
Network Security This policy detects evidence of hacking tools and attack planning.
Illegal Drugs This policy detects conversations about illegal drugs and controlled
substances.
Media Files This policy detects various types of video and audio files.
Restricted Files This policy detects various file types that are generally inappropriate to send
out of the company.
Violence and Weapons This policy detects violent language and discussions about weapons.
Yahoo Message Board Activity This policy detects Yahoo message board activity.
Yahoo and MSN Messengers on Port This policy detects Yahoo IM and MSN Messenger activity.
80
See “Yahoo and MSN Messengers on Port 80 policy template” on page 1238.
Columbian Personal Data Protection Law 1581 This policy detects violations of the Columbian Personal
Data Protection Law 1581.
Note: When the system prompts you to select an Exact Data Profile, the display
lists the data columns to include in the profile to provide the highest level of accuracy.
If data fields in your Exact Data Profile are not represented in the selected policy
template, the system displays those fields for content matching when you define
the detection rule
Table 17-10 Policy templates that implement Exact Data Matching (EDM)
Customer Data Protection See “Customer Data Protection policy template” on page 1130.
Data Protection Act 1988 See “Data Protection Act 1998 policy template” on page 1131.
Employee Data Protection See “Employee Data Protection policy template” on page 1137.
EU Data Protection Directives See “Data Protection Directives (EU) policy template” on page 1133.
Export Administration Regulations (EAR) See “Export Administration Regulations (EAR) policy template”
on page 1139.
FACTA 2003 (Red Flag Rules) See “FACTA 2003 (Red Flag Rules) policy template” on page 1140.
General Data Protection Regulations (Banking See “General Data Protection Regulation (Banking and Finance)”
and Finance) on page 1146.
General Data Protection Regulations (Digital See “General Data Protection Regulation (Digital Identity)” on page 1160.
Identity)
General Data Protection Regulations See “General Data Protection Regulation (Government Identification)”
(Government Identification) on page 1161.
General Data Protection Regulations See “General Data Protection Regulation (Healthcare and Insurance)”
(Healthcare and Insurance) on page 1178.
General Data Protection Regulations See “General Data Protection Regulation (Personal Profile)” on page 1187.
(Personal Profile)
Creating policies from templates 387
Choosing an Indexed Document Profile
Table 17-10 Policy templates that implement Exact Data Matching (EDM)
(continued)
General Data Protection Regulations (Travel) See “General Data Protection Regulation (Travel)” on page 1187.
HIPAA and HITECK (including PHI) See “HIPAA and HITECH (including PHI) policy template” on page 1194.
Human Rights Act 1998 See “Human Rights Act 1998 policy template” on page 1198.
International Traffic in Arms Regulations See “International Traffic in Arms Regulations (ITAR) policy template”
(ITAR) on page 1200.
Payment Card Industry Data Security See “Payment Card Industry (PCI) Data Security Standard policy
Standard template” on page 1213.
State Data Privacy See “SEC Fair Disclosure Regulation policy template” on page 1223.
Table 17-11 Policy templates that implement Indexed Document Matching (IDM)
CAN-SPAM Act (IDM exception) See “CAN-SPAM Act policy template” on page 1126.
NASD Rule 2711 and NYSE Rules 351 See “NASD Rule 2711 and NYSE Rules 351 and 472 policy template”
and 472 on page 1203.
NERC Security Guidelines for Electric See “NERC Security Guidelines for Electric Utilities policy template”
Utilities on page 1206.
SEC Fair Disclosure Regulation See “SEC Fair Disclosure Regulation policy template” on page 1223.
Proprietary Media Files See “Proprietary Media Files policy template” on page 1217.
■ Configuring policies
Configuring policies
The Manage > Policies > Policy List > Configure Policy screen is the home page
for configuring policies.
Table 18-1 describes the workflow for configuring policies.
Action Description
Define a new policy, or edit an existing policy. Add a new blank policy.
Enter a policy Name and Description. The policy name must be unique in the policy group you deploy
the policy to.
Action Description
Select the Policy Group from the list where the The Default Policy Group is selected if there is no policy group
policy is to be deployed. configured.
Set the Status for the policy. You can enable (default setting) or disable a policy. A disabled
policy is deployed but is not loaded into memory to detect
incidents.
Add a rule to the policy, or edit an existing rule. Click Add Rule to add a rule.
Configure the rule with one or more conditions. For a valid policy, you must configure at least one rule that
declares at least one condition. Compound conditions and
exceptions are optional.
Optionally, add one or more policy exceptions, or Click Add Exception to add it.
edit an existing exception.
See “Adding an exception to a policy” on page 401.d
Save the policy configuration. Click Save to save the policy configuration to the Enforce Server
database.
Export the policy as a template. Optionally, you can export the policy rules and exceptions as a
template.
Add one or more response rules to the policy. You configure response rules independent of policies.
Note: Exceptions are added separate from rules. See “Adding an exception to a
policy” on page 401.
Content Matches Exact Data Exact Data Profile See “About the Exact Data Profile and index”
on page 440.
Content Matches Document Indexed Document See “Introducing Indexed Document Matching (IDM)”
Signature Profile on page 529.
Content Matches Data Identifier Data Identifier See “Introducing data identifiers” on page 635.
Detect using Vector Machine VML Profile See “Introducing Vector Machine Learning (VML)”
Learning on page 586.
Contextual Attributes (Cloud For information about contextual attributes for Cloud
Service Connector only) Connector incidents, see
http://www.symantec.com/docs/DOC9451.
Message Attachment or File See “About file type matching” on page 736.
Type Match
Message Attachment or File See “About file size matching” on page 738.
Size Match
Message Attachment or File See “About file name matching” on page 739.
Name Match
Custom File Type Signature Rule enabled See “About custom file type identification” on page 737.
Protocol Monitoring Custom protocols (if any) See “Introducing protocol monitoring for network”
on page 749.
Endpoint Device Class or ID Custom device(s) See “About endpoint device detection” on page 755.
Configuring policies 394
Configuring policy rules
Form Recognition
Detect using Form Recognition Form Recognition Profile See “About Form Recognition detection” on page 618.
Profile
See “Configuring the Form Recognition detection rule”
on page 622.
Sender/User based on a Exact Data Profile See “Introducing profiled Directory Group Matching
Directory from: (DGM)” on page 782.
Recipient based on a Directory See “Configuring Exact Data profiles for DGM”
from: on page 783.
Step 1 Add a rule to a policy, or modify See “Adding a rule to a policy” on page 392.
a rule.
To modify an existing rule, select the rule in the policy builder interface at
the Configure Policy – Edit Rule screen.
Step 2 Name the rule, or modify a In the General section of the rule, enter a name in the Rule Name field,
name. or modify the name of an existing rule.
Configuring policies 395
Configuring policy rules
Step 3 Set the rule severity. In the Severity section of the rule, select or modify a "Default" severity
level.
In addition to the default severity, you can add multiple severity levels to
a rule.
Step 4 Configure the match condition. In the Conditions section of the rule, you configure one or more match
conditions for the rule. The configuration of a condition depends on its
type.
Step 5 Configure match counting (if If the rule calls for it, configure how you want to count matches.
required).
See “Configuring match counting” on page 398.
Step 6 Select components to match on If the rule is content-based, select one or more available content rules to
(if available). match on.
Step 7 Add and configure one or more To define a compound rule, Add another match condition from the Also
additional match conditions Match list.
(optional).
Configure the additional condition according to its type (Step 4).
Step 8 Save the policy configuration. When you are done cofiguring the rule, click OK.
This action returns you to the Configure Policy screen where you can
Save the policy.
Table 18-4 lists each of the available match conditions and provides links to topics
for configuring each condition.
Rule Description
Rule Description
Content Matches Regular Expression See “Configuring the Content Matches Regular Expression condition”
on page 727.
Content Matches Exact Data from an See “Configuring the Content Matches Exact Data policy condition”
Exact Data Profile on page 464.
Content Matches Keyword See “Configuring the Content Matches Keyword condition” on page 717.
Content Matches Document Signature See “Configuring the Content Matches Document Signature policy
condition” on page 564.
Content Matches Data Identifier See “Configuring the Content Matches data identifier condition” on page 651.
Detect using Vector Machine Learning See “Configuring the Detect using Vector Machine Learning Profile
profile condition” on page 602.
Detect using Form Recognition profile See “Configuring the Form Recognition detection rule” on page 622.
Message Attachment or File Type See “Configuring the Message Attachment or File Type Match condition”
Match on page 740.
Message Attachment or File Size Match See “Configuring the Message Attachment or File Size Match condition”
on page 741.
Message Attachment or File Name See “Configuring the Message Attachment or File Name Match condition”
Match on page 742.
Custom File Type Signature See “Configuring the Custom File Type Signature condition” on page 745.
Network Monitoring See “Configuring the Protocol Monitoring condition for network detection”
on page 750.
Endpoint Monitoring See “Configuring the Endpoint Monitoring condition” on page 756.
Endpoint Device Class or ID See “Configuring the Endpoint Device Class or ID condition” on page 759.
Endpoint Location See “Configuring the Endpoint Location condition” on page 758.
Sender/User Matches Pattern See “Configuring the Sender/User Matches Pattern condition” on page 766.
Recipient Matches Pattern See “Configuring the Recipient Matches Pattern condition” on page 769.
Configuring policies 397
Defining rule severity
Rule Description
Sender/User based on a Directory See “Configuring the Sender/User based on a Directory Server Group
Server Group condition” on page 778.
Sender/User based on a Directory from See “Configuring the Sender/User based on a Profiled Directory condition”
an Exact Data Profile on page 784.
Recipient based on a Directory Server See “Configuring the Recipient based on a Directory Server Group
Group condition” on page 779.
Recipient based on a Directory from an See “Configuring the Recipient based on a Profiled Directory condition”
Exact Data Profile on page 785.
4 Select the desired severity level, choose the match count range, and enter the
match count.
For example, you can set a Medium severity with X range to match after 100
matches have been counted.
5 If you add an additional severity level, you can select it to be the default severity.
6 To remove a defined severity level, click the X icon beside the severity definition.
Check for Simple This configuration reports a match count of 1 if there are one or more matches; it
existence does not count multiple matches. For example, 10 matches are one incident.
Compound This configuration reports a match count of 1 if there are one or more matches
and ALL conditions in the rule or exception are set to check for existence.
Configuring policies 399
Configuring match counting
Count all Simple This configuration reports a match count of the exact number of matches detected
matches by the condition. For example, 10 matches count as 10 incidents.
Compound This configuration reports a match count of the sum of all condition matches in
the rule or exception. The default is one incident per condition match and applies
if any condition in the rule or exception is set to count all matches.
For example, if a rule has two conditions and one is set to count all matches and
detects four matches, and the other condition is set to check for existence and
detects six matches, the reported match count is 10. If a third condition in the rule
detects a match, the match count is 11.
Only report You can change the default one incident per match count by specifying the
incidents with minimum number of matches required to report an incident.
at least _
For example, in a rule with two conditions, if you configure one condition to count
matches
all matches and specify five as the minimum number of matches for each condition,
a sum of 10 matches reported by the two conditions generates two incidents. You
must be consistent and select this option for each condition in the rule or exception
to achieve this behavior.
Note: The count all matches setting applies to each message component you
match on. For example, consider a policy where you specify a match count of 3
and configure a keyword rule that matches on all four message components
(default setting for this condition). If a message is received with two instances of
the keyword in the body and one instance of the keyword in the envelope, the
system does not report this as a match. However, if three instances of the keyword
appear in an attachment (or any other single message component), the system
would report it as a match.
Count all unique Only count Unique match counting is new for Symantec Data Loss Prevention version 11.6
matches unique and is only available for Data Identifiers.
matches
See “About unique match counting” on page 648.
Condition Description
Content Matches Regular See “Introducing regular expression matching” on page 725.
Expression
See “Configuring the Content Matches Regular Expression condition” on page 727.
Condition Description
Content Matches Document See “Configuring the Content Matches Document Signature policy condition”
Signature (IDM) on page 564.
Content Matches Data Identifier See “Introducing data identifiers” on page 635.
See “Configuring the Content Matches data identifier condition” on page 651.
Recipient Matches Pattern See “Introducing described identity matching” on page 764.
Component Description
Envelope If the condition supports matching on the Envelope component, select it to match on the message
metadata. The envelope contains the header, transport information, and the subject if the message
is an SMTP email.
If the condition does not support matching on the Envelope component, this option is grayed out.
If the condition matches on the entire message, the Envelope is selected and cannot be deselected,
and the other components cannot be selected.
Subject Certain detection conditions match on the Subject component for some types of messages.
■ SMTP (email) messages from Network Monitor or Network Prevent for Email.
■ NNTP messages from Network Monitor.
To match on the Subject component, you must select (check) the Subject component and uncheck
(deselect) the Envelope component for the policy rule. If you select both components, the system
matches the subject twice because the message subject is included in the envelope as part of the
header.
Configuring policies 401
Adding an exception to a policy
Component Description
Body If the condition matches on the Body message component, select it to match on the text or content
of the message.
Attachment(s) If the condition matches on the Attachment(s) message component, select it to detect content in
files sent by, downloaded with, or attached to the message.
Note: You can create exceptions for all policy conditions, except the EDM condition
Content Matches Exact Data From. In addition, Network Prevent for Web does
not support synchronized DGM exceptions.
Content
Content Matches Regular See “Introducing regular expression matching” on page 725.
Expression
Content Matches Document Indexed Document See “Choosing an Indexed Document Profile” on page 387.
Signature Profile
Content Matches Data Identifier Data Identifier See “Introducing data identifiers” on page 635.
Detect using Vector Machine VML Profile See “Configuring VML policy exceptions” on page 603.
Learning profile
See “Configuring VML profiles and policy conditions”
on page 590.
File Properties
Message Attachment or File Type See “About file type matching” on page 736.
Match
Message Attachment or File Size See “About file size matching” on page 738.
Match
Message Attachment or File Name See “About file name matching” on page 739.
Match
Custom File Type Signature Condition enabled See “About custom file type identification” on page 737.
Custom script
added
Network Protocol See “Introducing protocol monitoring for network” on page 749.
Endpoint Protocol, Destination, See “About endpoint protocol monitoring” on page 753.
Application
Endpoint Device Class or ID See “About endpoint device detection” on page 755.
Form Recognition
Configuring policies 403
Configuring policy exceptions
Detect using Form Recognition Form Recognition See “About Form Recognition detection” on page 618.
Profile Profile
See “Configuring the Form Recognition exception rule”
on page 623.
Group (identity)
Sender/User Matches Pattern See “Introducing described identity matching” on page 764.
Sender/User based on a Directory User Group See “Introducing synchronized Directory Group Matching
Server Group (DGM)” on page 774.
Sender/User based on a Directory Exact Data Profile See “Introducing profiled Directory Group Matching (DGM)”
from: on page 782.
Recipient based on a Directory See “Configuring Exact Data profiles for DGM” on page 783.
from:
Step 1 Add a new policy exception, or See “Adding an exception to a policy” on page 401.
edit an existing exception.
Select an existing policy exception to modify it.
Configuring policies 404
Configuring policy exceptions
Step 2 Name the exception, or edit an In the General section, enter a unique name for the exception, or modify
existing name or description. the name of an existing exception.
Note: The exception name is limited to 60 characters.
Step 3 Select the components to apply If the exception is content-based, you can match on the entire message
the exception to (if available). or on individual message components.
■ Entire Message
This option applies the exception to the entire message.
■ Matched Components Only
This option applies the exception to each message component you
select from the Match On options in the Conditions section of the
exception.
Step 4 Configure the exception condition. In the Conditions section of the Configure Policy - Edit Exception
screen, define the condition for the policy exception. The configuration
of a condition depends on the exception type.
Step 5 Add one or more additional You can add conditions until the exception is structured as desired.
conditions to the exception
See “Configuring compound match conditions” on page 406.
(optional).
To add another condition to an exception, select the condition from the
Also Match list.
Step 6 Save and manage the policy. Click OK to complete the exception definition process.
Table 18-10 lists the exception conditions that you can configure, with links to
configuration details.
Exception Description
Content
Configuring policies 405
Configuring policy exceptions
Exception Description
Content Matches Regular Expression See “Configuring the Content Matches Regular Expression condition”
on page 727.
Content Matches Keyword See “Configuring the Content Matches Keyword condition” on page 717.
Content Matches Document Signature See “Configuring the Content Matches Document Signature policy
condition” on page 564.
Content Matches Data Identifier See “Configuring the Content Matches data identifier condition”
on page 651.
Detect using Vector Machine Learning Profile See “Configuring VML policy exceptions” on page 603.
File Properties
Message Attachment or File Type Match See “Configuring the Message Attachment or File Type Match condition”
on page 740.
Message Attachment or File Size Match See “Configuring the Message Attachment or File Size Match condition”
on page 741.
Message Attachment or File Name Match See “Configuring the Message Attachment or File Name Match condition”
on page 742.
Custom File Type Signature See “Configuring the Custom File Type Signature condition” on page 745.
Network Protocol See “Configuring the Protocol Monitoring condition for network detection”
on page 750.
Endpoint Protocol or Destination See “Configuring the Endpoint Monitoring condition” on page 756.
Endpoint Device Class or ID See “Configuring the Endpoint Device Class or ID condition” on page 759.
Endpoint Location See “Configuring the Endpoint Location condition” on page 758.
Form Recognition
Detect using Form Recognition profile See “Configuring the Form Recognition exception rule” on page 623.
Group (identity)
Sender/User Matches Pattern See “Configuring the Sender/User Matches Pattern condition”
on page 766.
Recipient Matches Pattern See “Configuring the Recipient Matches Pattern condition” on page 769.
Configuring policies 406
Configuring compound match conditions
Exception Description
Sender/User based on a Directory Server See “Configuring the Sender/User based on a Directory Server Group
Group condition” on page 778.
Recipient based on a Directory Server Group See “Configuring the Recipient based on a Directory Server Group
condition” on page 779.
Sender/User based on a Directory from an See “Configuring the Sender/User based on a Profiled Directory
EDM Profile condition” on page 784.
Recipient based on a Directory from and See “Configuring the Recipient based on a Profiled Directory condition”
EDM Profile on page 785.
Step 1 Modify or configure an You can add one or more additional match conditions to a policy rule at the
existing policy rule or Configure Policy – Edit Rule screen.
exception.
You can add one or more additional match conditions to a rule or exception
at the Configure Policy – Edit Rule or Configure Policy – Edit Exception
screen.
Step 2 Select an additional match Select the additional match condition from the Also Match list.
condition.
This list appears at the bottom of the Conditions section for an existing rule
or exception.
Configuring policies 407
Input character limits for policy configuration
Step 3 Review the available The system lists all available additional conditions you can add to a policy
conditions. rule or exception.
Step 4 Add the additional Click Add to add the additional match condition to the policy rule or exception.
condition.
Once added, you can collapse and expand each condition in a rule or
exception.
Step 5 Configure the additional See “Configuring policy rules” on page 394.
condition.
See “Configuring policy exceptions” on page 403.
Step 6 Select the same or any If the condition supports component matching, specify where the data must
component to match. match to generate or except an incident.
Same Component – The matched data must exist in the same component
as the other condition(s) that also support component matching to trigger a
match.
Any Component – The matched data can exist in any component that you
have selected.
Step 6 Repeat this process to You can add as many conditions to a rule or exception as you need.
additional match conditions
All conditions in a single rule or exception must match to trigger an incident,
to the rule or exception.
or to trigger the exception.
Step 7 Save the policy. Click OK to close the rule or exception configuration screen.
■ Group
■ Condition
■ Exact Data
■ Indexed Document
■ Vector Machine Learning
■ Form Recognition
■ Importing policies
■ Exporting policies
■ Cloning policies
■ Troubleshooting policies
Action Description
Modify a policy Click the policy name or edit icon to modify an existing policy.
Activate a policy Select the policy or policies you want to activate, then click Activate in the policy list
toolbar.
Make a policy inactive Select the policy or policies you want to make inactive, then click Suspend in the policy
list toolbar.
Note: By default, all solution pack policies are activated on installation of the solution
pack.
Sort policies Click any column header to sort the policy list.
Filter policies You can filter your policy list by Status, Name, Description, or Policy Group.
To filter your policy list, click Filter in the policy list toolbar, then select or enter your filter
criteria in the appropriate column or columns.
To remove filters from your policy list, click Clear in the policy list toolbar.
Remove a policy Select the policy or policies you want to remove, then click Delete in the policy list toolbar.
You can also click the red X icon at the end of the policy row to delete an individual
policy.
Note: You cannot remove a policy that has active incidents.
Import and export policies You can import and export policies using the Import and Export buttons in the policy
list toolbar.
Export and import policy You can export and import policy templates for reuse when authoring new policies.
templates
See “Importing policy templates” on page 419.
Action Description
Download policy details Click Download Details in the policy list toolbar to download details for the selected
policies in the Policy List. Symantec Data Loss Prevention exports the policy details
as HTML files in a ZIP archive. Open the archive to view and print policy details.
View and print policy details To view policy details for a single policy, click the printer icon at the end of the policy
row. To print the policy details, use the print feature of your web browser.
Clone a policy Select the policy or policies you want to clone, then click Clone in the policy list toolbar.
Assign policies to a policy You can assign individual or multiple policies to a policy group from the policy list page.
group
Select the policy or policies you want to assign to a policy group, then click Assign
Group in the policy list toolbar. Select the policy group from the drop-down list.
Table 19-2 lists and describes the display fields at the Policy List screen.
Column Description
Status The status column displays one of three states for the policy:
■ Misconfigured Policy:
The policy icon is a yellow caution sign.
See “Policy components” on page 342.
■ Active Policy:
The policy icon is green. An active policy can detect incidents.
■ Suspended Policy
The policy icon is red. A suspended policy is deployed but does not detect incidents.
Policy Group View and sort by the policy group to which the policy is deployed.
Column Description
Last Modified View and sort by the date the policy was last updated.
See “Policy authoring privileges” on page 347.
Action Description
Add a policy group Click Add Policy Group to define a new policy group.
Modify a policy group To modify an existing policy group, click the name of the group, or click the pencil icon to
the far right of the row.
Remove a policy group Click the red X icon to the far right of the row to delete that policy group from the system.
A dialog box confirms the deletion.
Note: If you delete a policy group, you delete any policies that are assigned to that group.
View policies in a group To view the policies deployed to an existing policy group, navigate to the System > Servers
and Detectors > Policy Groups > Configure Policy Group screen.
Column Description
Column Description
Available Servers and The detection server or cloud detector to which the policy group is deployed.
Detectors
See “Policy deployment” on page 345.
Last Modified The date the policy group was last modified.
Actions You can edit or delete policy groups using the icons in the Actions column.
■ Deselect (uncheck) the All Servers or Detectors option to assign the policy
group to individual detection servers.
The system displays a check box for each server currently configured and
registered with the Enforce Server.
Select each individual detection server to assign the policy group.
Note: The Policies in this Group section of the Polices Group screen lists all the
policies in the policy group. You cannot edit these entries. When you create a new
policy group, this section is blank. After you deploy one or more policies to a policy
group (during policy configuration), the Policies in this Group section displays
each policy in the policy group.
Importing policies
You can export policies from an Enforce Server and import them to another Enforce
Server. This feature makes it easier to move policies from one environment to
another. For example, you can export policies from your test environment and import
them into your production environment.
■ If the policy group to which the exported policy belonged exists on the target
system, the policy will be added to that policy group, or overwrite a policy of the
same name in that group. If the policy group does not exist on the target system,
it will be created upon import. If the policy exists on the target system, but it
belongs to a different policy group, the imported policy will be assigned to a
newly created policy group on the target system, and will not overwrite the
existing policy.
■ When you import a policy, you can choose whether or not to import its response
rules if those rules conflict with existing response rules on the target system.
■ The Policy Import Preview page will display warnings about any policy elements
that will be created or overwritten when you import the policy.
■ You can only import one policy at a time.
To import a policy
1 Navigate to Manage > Policies > Policy List.
2 Click Import.
The Import Policy page appears.
3 Click Browse to select the exported policy file you want to import.
4 Click Import Policy.
The Policy import preview page appears. This page will warn you of any
policy elements that may be overwritten when you import this policy. If the
policy you are importing includes any response rules among the elements that
may be overwritten, you can exclude those response rules from import on this
page.
5 Click Proceed with import.
The policy is imported. If the policy has any unresolved references, the Policy
References Check page appears.
You can resolve any unresolved policy references on this page.
See “About policy references” on page 415.
When you import a policy, Symantec Data Loss Prevention will alert you to any
unresolved references on the Policy References Check page. The Policy
References Check page displays at the end of the policy import process. You can
also view this page by clicking the unresolved references icon on the Policy List
and Policy Edit pages.
To resolve policy references, click the edit (pencil) icon on the Policy References
Check page. Symantec Data Loss Prevention displays the appropriate edit page
for each unresolved reference.Table 19-5 provides information about resolving
policy references.
Policy group where no detection server is Select detection servers for the policy group.
specified:
Directory connection with missing credentials: Provide the credentials for the directory
connection.
EDM profile with missing source file and Specify the correct data source file.
index:
IDM profile with missing import path and file Specify the correct data source.
name:
Remote IDM profile with missing credentials: Provide the credentials for the remote IDM
profile.
VML profile with trained profile and related Provide the trained profile and its related data,
data missing: train and accept the VML profile.
Form Recognition profile with missing gallery Provide the gallery ZIP archive.
ZIP archive:
Endpoint quarantine response rule with Provide the credentials for the endpoint
missing saved credentials: quarantine response rule.
Response rule with a missing Server Deploy the Server FlexResponse JAR file on
FlexResponse plug-in: the target system.
Exporting policies
You can export your policy data to an XML file to easily share policies between
Enforce Servers.
■ To export multiple policies to a ZIP archive, select the policies you want to
export, then click Export.
3 Symantec Data Loss Prevention exports your policy or policies using the
following naming conventions:
■ For single policies, the naming convention is
ENFORCEHOSTNAME-POLICYNAME-DATE-TIME.XML.
Cloning policies
You can clone policies from the Policy List page.
Cloned policies are exact copies of the original policy. They include the following
items:
■ Modified policy name, description, and policy group.
Cloned policies appear in the Policy List as Copy N of original policy name.
■ Policy rules, including Form Recognition, EDM, IDM, and VML definitions
■ Endpoint locations and devices
■ Sender and recipient patterns
■ Response rules
■ Data identifiers
■ Custom protocols
For information about importing and exporting policies and policy templates, see
these topics:
See “Exporting policies” on page 417.
See “Importing policies” on page 414.
See “Exporting policy detection as a template” on page 419.
See “Importing policy templates” on page 419.
Administering policies 419
Importing policy templates
3 At the bottom of the Configure Policy screen, click the Export this policy as
a template link.
4 Save the policy to a local or network destination of your choice.
For example, the system exports a policy named Webmail to the policy template
file Webmail.xml which you can save to your local drive.
See “Importing policy templates” on page 419.
For information about importing, exporting, and cloning policies, see these topics:
See “Exporting policies” on page 417.
See “Importing policies” on page 414.
See “Cloning policies” on page 418.
Note: Smart response rules are executed manually and are not deployed with
policies.
6 Save the policy when you are done adding response rules.
7 Verify that the policy status is green after adding the response rule to the policy.
See “Manage and add policies” on page 409.
Note: If the policy status is a yellow caution sign, the policy is misconfigured. The
system does not support certain pairings of detection rules and automated response
rule actions. See Table 73-2 on page 1776.
Remove a If you attempt to delete a policy that has If you want to delete a policy, you must first delete all
policy associated incidents, the system does incidents that are associated with that policy from the
not let you remove the policy. Enforce Server.
Remove a If you attempt to delete a policy group Before you delete a policy group, remove any policies from
policy group that contains one or more policies, the that group by either deleting them or assigning them to
system displays an error message. And, different policy groups.
the policy group is not deleted.
See “Manage and add policy groups” on page 412.
3 To view details for a policy, extract the files from the ZIP archive, then open
the file you want to view. Use the index file to search through the downloaded
policies by policy name, description, status, policy group, or last modified date.
The Policy Snapshot screen appears.
4 To print the policy details, use the Print command in your web browser from
the Policy Snapshot screen.
Troubleshooting policies
Table 19-7 lists log files to consult for troubleshooting policies.
VontuMonitor.log Logs when policies and profiles are sent from the Enforce Server to
detection servers and endpoint servers. Displays JRE errors.
FileReader.log Logs when an index file is loaded into memory. For EDM, look for the
line "loaded database profile." For IDM look for the line: "loaded
document profile."
See “Debug log files” on page 309.
Indexer.log Logs the operations of the Indexer process to generate EDM and IDM
indexes.
Table 19-8 Reindexing requirements for EDM and IDM data profiles
Exact Data Matching (EDM) If you have existing Exact Data profiles supporting See “Updating EDM indexes to the
EDM policies and you want to use new EDM latest version” on page 486.
■ Multi-token matching
features, before upgrading the detection server(s)
■ Proportional proximity In addition, refer to the chapter
you must:
range "Updating EDM indexes to the latest
■ Reindex each structured data source using a version" in the Symantec Data Loss
14.0-compatible EDM indexer, and Prevention Administration Guide and
■ Load each index into a 14.0-generated Exact the online Help.
Data profile.
Indexed Document If you have existing Indexed Document profiles Or, refer to the topic "Using Agent IDM
Matching (IDM) supporting IDM policies and you want to use after upgrade to version 14.0" in the
Agent IDM, after upgrading to 14.0 you must: Symantec Data Loss Prevention
■ Exact match IDM on the
Administration Guide and the online
endpoint (Agent IDM) ■ Disable two-tier detection on the Endpoint
Help.
Server, and
■ Reindex each document data source so that
the endpoint index is generated and deployed
to the Endpoint Server for download by the
DLP Agent.
The HIPAA and HITECH (including PHI) and the Caldicott Report policy templates
are updated with recent Drug, Disease, and Treatment keyword list terminology
based on information from the U.S. Federal Drug Administration (FDA) and other
sources. Symantec recommends that you update policies derived from these
templates with the updated Drug, Disease, and Treatment keyword lists.
See “Updating the Drug, Disease, and Treatment keyword lists for your HIPAA and
Caldicott policies” on page 720.
In addition, policy templates that use data identifier patterns to detect Social Security
Numbers (SSNs) are updated to use the Randomized US SSN data identifier, which
detects both traditional and randomized SSNs. Symantec recommends that you
update your SSN policies to use the Randomized US SSN data identifier.
See “Updating policies to use the Randomized US SSN data identifier” on page 689.
Table 19-9 lists the policy templates updated for this release of Symantec Data
Loss Prevention.
Table 19-9 Policy templates updated in Data Loss Prevention version 12.5
Caldicott Report Drug, Disease, and Treatment See “Caldicott Report policy template” on page 1124.
keyword lists
Customer Data Protection Randomized US SSN data See “Customer Data Protection policy template”
identifier on page 1130.
Employee Data Protection Randomized US SSN data See “Employee Data Protection policy template”
identifier on page 1137.
FACTA 2003 (Red Flag Randomized US SSN data See “FACTA 2003 (Red Flag Rules) policy template”
Rules) identifier on page 1140.
HIPAA and HITECH (including Drug, Disease, and Treatment See “HIPAA and HITECH (including PHI) policy
PHI) keyword lists template” on page 1194.
State Data Privacy Randomized US SSN data See “State Data Privacy policy template” on page 1227.
identifier
US Social Security Numbers Randomized US SSN data See “US Social Security Numbers policy template”
identifier on page 1235.
Chapter 20
Best practices for authoring
policies
This chapter includes the following topics:
■ Use the appropriate match condition for your data loss prevention objectives
Develop a policy strategy that supports your data security See “Develop a policy strategy that supports your data
objectives. security objectives” on page 428.
Use a limited number of policies to get started. See “Use a limited number of policies to get started”
on page 428.
Use policy templates but modify them to meet your See “Use policy templates but modify them to meet your
requirements. requirements” on page 429.
Use policy groups to manage policy lifecycle. See “Use policy groups to manage policy lifecycle”
on page 434.
Use the appropriate match condition for your data loss See “Use the appropriate match condition for your data
prevention objectives. loss prevention objectives” on page 429.
Test and tune policies to improve match accuracy. See “Test and tune policies to improve match accuracy”
on page 430.
Start with high match thresholds to reduce false positives. See “Start with high match thresholds to reduce false
positives” on page 431.
Use a limited number of exceptions to narrow detection See “Use a limited number of exceptions to narrow
scope. detection scope” on page 432.
Use compound conditions to improve match accuracy. See “Use compound conditions to improve match
accuracy” on page 432.
Author policies to limit the potential effect of two-tier See “Author policies to limit the potential effect of two-tier
detection. detection” on page 433.
Follow detection-specific best practices. See “Follow detection-specific best practices” on page 434.
Best practices for authoring policies 428
Develop a policy strategy that supports your data security objectives
Approach Description
Information-driven With this approach you start by identifying specific data items and data combinations you
want to protect. Examples of such data may include fields profiled from a database, a list of
keywords, a set of users, or a combination of these elements. You then group similar data
items together and create policies to identify and protect them. This approach works best
when you have limited access to the data or no particular concerns about a given regulation.
Regulation-driven With this approach you begin with a policy template based on the regulations with which you
must comply. Examples of such templates may include HIPAA or FACTA. Also, begin with
a large set of data (such as customer or employee data). Use the high-level requirements
stipulated by the regulations as the basis for this approach. Then, decide what sensitive data
items and documents in your enterprise meet these requirements. These data items become
the conditions for the detection rules and exceptions in your policies.
Generally it is better to have fewer policies that are configured to address specific
data loss prevention objectives rather than many policies that attempt to address
all of your security requirements. Having too many policies can impact the
performance of the system and can lead to too many false positives.
See “Test and tune policies to improve match accuracy” on page 430.
Words and phrases, such as "Confidential" or Keywords Exact words, phrases, proximity
"Proprietary"
Network and endpoint communications Protocol and Endpoint Protocols, destinations, monitoring
Determined by the identity of the user, sender, Synchronized DGM Exact identity from LDAP server
recipient
Profiled DGM Exact profiled identity
Describes a document, such as author, title, date, Content-based conditions File type metadata
etc.
creating policy exceptions. If the policy does not detect some incidents, make the
detection condition(s) less specific.
As your policies mature, it is important to continuously test and tune them to ensure
ongoing accuracy.
See “Follow detection-specific best practices” on page 434.
False positives Policy rules too False positives create high costs in time and resources that are required to
general or broad investigate and resolve apparent incidents that are not actual incidents. Since
many organizations do not have the capacity to manage excess false positives,
it is important that your policies define contextual rules to improve accuracy.
False Policy rules too False negatives obscure gaps in security by allowing data loss, the potential for
negatives tight or narrow financial losses, legal exposure, and damage to the reputation of an organization.
False negatives are especially dangerous because you do not know you have
lost sensitive data.
For example, a policy that contains a keyword match on the word "confidential"
but also contains a condition that excludes all Microsoft Word documents would
be too narrow and be suspect to false negatives because it would likely miss
detecting many actual incidents contained in such documents
See “Start with high match thresholds to reduce false positives” on page 431.
See “Use a limited number of exceptions to narrow detection scope” on page 432.
See “Use compound conditions to improve match accuracy” on page 432.
thresholds for your content-based detection policies. As you tune your policies you
can reduce the match thresholds to be more precise.
See “Configuring match counting” on page 398.
Caution: Too many compound exceptions in a policy can cause system performance
issues. You should avoid the use of compound exceptions as much as possible.
It is important to understand how exception conditions work so you can use them
properly. Exception conditions disqualify messages from creating incidents.
Exception conditions are checked first by the detection server before match
conditions. If the exception condition matches, the system immediately discards
the entire message or message component that met the exception. There is no
support for match-level exceptions. Once the message or message component is
discarded by meeting an exception, the data is no longer available for policy
evaluation.
See “Exception conditions” on page 370.
See “Use compound conditions to improve match accuracy” on page 432.
Exact Data Matching (EDM) For EDM policies, consider including Data Identifier rules OR'd with EDM rules.
For example, for a policy that uses an EDM condition to match social security
numbers, you could add a second rule that uses the SSN Data Identifier condition.
The Data Identifier does not require two-tier detection and is evaluated locally by
the DLP Agent. If the DLP Agent is not connected to the Endpoint Server when
the DLP Agent receives the data, the DLP Agent can still perform SSN pattern
matching based on the Data Identifier condition.
See “Combine Data Identifiers with EDM rules to limit the impact of two-tier
detection” on page 527.
For example policy configurations, each of the policy templates that provide EDM
conditions also provide corresponding Data Identifier conditions.
Indexed Document Matching For IDM policies that match file contents, consider using VML rules OR'd with IDM
(IDM) rules. VML rules do not require two-tier detection and are executed locally by the
DLP Agent. If you do not need to match file contents exactly, you may want to use
VML instead of IDM.
See “Use the appropriate match condition for your data loss prevention objectives”
on page 429.
If you are only concerned with file matching, not file contents, consider using
compound file property rules instead of IDM. File property rules do not require
two-tier detection.
See “Use compound file property rules to protect design and multimedia files”
on page 746.
Directory Group Matching (DGM) For the synchronized DGM Recipient condition, consider including a Recipient
Matches Pattern condition OR'd with the DGM condition. The pattern condition
does not require two-tier detection and is evaluated locally by the DLP Agent.
Data identifiers See “Best practices for using data identifiers” on page 705.
Keywords See “Best practices for using keyword matching” on page 721.
Regular expressions See “Best practices for using regular expression matching” on page 728.
Non-English language See “Best practices for detecting non-English language content” on page 732.
detection
File properties See “Best practices for using file property matching” on page 746.
Network protocols See “Best practices for using network protocol matching” on page 751.
Endpoint events See “Best practices for using endpoint detection” on page 762.
Described identities See “Best practices for using described identity matching” on page 771.
Synchronized DGM See “Best practices for using synchronized DGM” on page 780.
Profiled DGM See “Best practices for using profiled DGM” on page 786.
Metadata detection See “Best practices for using metadata detection” on page 817.
Chapter 21
Detecting content using
Exact Data Matching (EDM)
This chapter includes the following topics:
extracting the text-based content, normalizing it, and securing it using a nonreversible
hash. You can schedule indexing on a regular basis so the data is current.
Once you have profiled the data, you configure the Content Matches Exact Data
condition to match individual pieces of the indexed data. For increased accuracy
you can configure the condition to match combinations of data fields from a particular
record. The EDM policy condition matches on data coming from the same row or
record of data. For example, you can configure the EDM policy condition to look
for any three of First Name, Last Name, SSN, Account Number, or Phone Number
occurring together in a message and corresponding to a record from your customer
database.
Once the policy is deployed to one or more detection servers, the system can detect
the data you have profiled in either structured or unstructured format. For example,
you could deploy the EDM policy to a Network Discover Server and scan data
repositories for confidential data matching data records in the index. Or, you could
deploy the EDM policy to a Network Prevent for Email Server to detect records in
email communications and attachments, such as Microsoft Word files. If the
attachment is a spreadsheet, such as Microsoft Excel, the EDM policy can detect
the presence of confidential records there as well.
See “About the Exact Data Profile and index” on page 440.
You create an Exact Data Profile and index the data source file. When you configure
the profile, you map the data field columns to system-defined patterns and validate
Detecting content using Exact Data Matching (EDM) 438
Introducing Exact Data Matching (EDM)
the data. You then configure the EDM policy condition that references the Exact
Data Profile. In this example, the condition matches if a message contains all five
data fields.
The detection server reports a match if it detects the following in any inbound
message:
Bob Smith 123-45-6789 05/26/99 $42500
But, a message containing the following does not match because that record is not
in the index:
Betty Smith 000-00-0000 05/26/99 $42500
If you limited the condition to matching only the Last Name, SSN, and Salary column
fields, the following message is a match because it meets the criteria:
Robert, Smith, 123-45-6789, 05/29/99, $42500
Finally, the following message contents do not match because the value for the
SSN is not present in the profile:
Bob, Smith, 415-789-0000, 05/26/99, $42500
See “Configuring Exact Data profiles” on page 446.
■ You can use profiled Directory Group Matching (DGM) to match on senders or
recipients of data based on email address, IM handle, or Windows user name.
■ Proximity matching range that is proportional to the number of required matches
set in the policy condition.
■ Full support for single- and multi-token cell indexing and matching. A multi-token
is a cell that is indexed that contains two or more words.
See “EDM policy templates” on page 439.
Note: The format for the data source file should be a text-based format containing
pipe- or tab-delimited contents. In general you should avoid using a spreadsheet
format for the data source file (such as XLS or XLSX) because such programs use
scientific notation to render numbers.
Columns 32 The data source file cannot have more than 32 columns. If it does, the system
does not index it.
Detecting content using Exact Data Matching (EDM) 442
Introducing Exact Data Matching (EDM)
Cells 6 billion The data source file cannot have more than 6 billion data cells. If it does, the
system does not index it.
1 Prepare the data source file for See “Preparing the exact data source file for
indexing. indexing” on page 449.
2 Ensure that the data source has at See “Ensure data source has at least one
least one column that is unique column of unique data” on page 519.
data.
3 Remove incomplete and duplicate See “Cleanse the data source file of blank
records. Do not fill empty cells with columns and duplicate rows” on page 520.
bogus data.
specify fields that the system recognizes in the system-provided policy templates.
The Field Mappings section also gives you advanced options for specifying custom
fields and validating the data in those fields.
See “Mapping Exact Data Profile fields” on page 457.
Consider the following example use of field mappings. Your company wants to
protect employee data, including employee social security numbers. You create a
Data Loss Prevention policy based on the Employee Data Protection template. The
policy requires an exact data index with fields for social security numbers and other
employee data. You prepare your data source and then create the Exact Data
Profile. To validate the data in the social security number field, you map this column
field in your index to the "Social Security Number" system field pattern. The system
then validates all data in that field using the Social Security Number validator to
ensure that each data item is a social security number
Using the system-defined field patterns to validate your data is critical to the accuracy
of your EDM policies. If there is no system-defined field pattern that corresponds
to one or more data fields in your index, you can define custom fields and choose
the appropriate validator to validate the data.
See “Map data source column to system fields to leverage validation” on page 522.
Note: You cannot use the Content Matches Exact Data From an Exact Data
Profile condition as a policy exception. Data Loss Prevention does not support the
use of the EDM condition as a policy exception.
See “Configuring the Content Matches Exact Data policy condition” on page 464.
See “Configuring Data Owner Exception for EDM policy conditions” on page 466.
1 Create the data source file. Export the source data from the database (or other data repository) to
a tabular text file.
If you want to except data owners from matching, you need to include
specific data items in the data source file.
See “Creating the exact data source file for EDM” on page 447.
2 Prepare the data source file for Remove irregularities from the data source file.
indexing.
See “Preparing the exact data source file for indexing” on page 449.
Detecting content using Exact Data Matching (EDM) 447
Configuring Exact Data profiles
3 Upload the data source file to the You can copy or upload the data source file to the Enforce Server, or
Enforce Server. access it remotely.
4 Create an Exact Data Profile. An Exact Data Profile is required to implement Exact Data Matching
(EDM) policies. The Exact Data Profile specifies the data source, data
field types, and the indexing schedule.
5 Map and validate the data fields. You map the source data fields to system or custom data types that
the system validates. For example, a social security number data field
needs to be nine digits.
See “About using System Fields for data source validation” on page 442.
6 Index the data source, or See “About index scheduling” on page 443.
schedule indexing.
See “Scheduling Exact Data Profile indexing” on page 460.
7 Configure and tune one or more See “Configuring the Content Matches Exact Data policy condition”
EDM detection conditions. on page 464.
Step Description
1 Export the data you want to protect from a database or other tabular data format, such as an Excel
spreadsheet, to a flat file. The data source file you create must be a tabular text file that contains rows
of data from the original source. Each row from the original source is included as a row in the data source
file. Delimit columns using a tab, a comma, or a pipe. Pipe is preferred. Comma should not be used if
your data source fields contain numbers.
You must maintain all the structured data that you exported from the source database table or table-like
format in one data source file. You cannot split the data source across multiple files.
The data source file cannot exceed 32 columns, 4 billion - 2 (2^32 -2) rows, or 6 billion cells. If you plan
to upload the data source file to the Enforce Server, browser capacity limits the data source size to 2
GB. For file sizes larger than this size you can copy the file to the Enforce Server using FTP/S.
■ Unique data
For all EDM implementations, make sure the data source contains at least one column of unique
data
See “Ensure data source has at least one column of unique data” on page 519.
■ Data Owner Exception
Make sure the data source contains the email address field or domain field, if you plan to use data
owner exceptions.
See “Creating the exact data source file for Data Owner Exception” on page 448.
■ Directory Group Matching
Make sure the data source includes one or more sender/recipient identifying fields.
See “Creating the exact data source file for profiled DGM” on page 449.
See “Preparing the exact data source file for indexing” on page 449.
Creating the exact data source file for Data Owner Exception
To implement Data Owner Exception and ignore data owners from detection, you
must explicitly include each user's email address or domain address in the Exact
Data Profile. Each expected domain (for example, symantec.com) must be explicitly
added to the Exact Data Profile. The system does not automatically match on
subdomains (for example, fileconnect.symantec.com). Each subdomain must be
explicitly added to the Exact Data Profile.
To implement the data owner exception feature, you must include either or both of
the following fields in your data source file:
Detecting content using Exact Data Matching (EDM) 449
Configuring Exact Data profiles
■ Email address
■ Domain address
See “About Data Owner Exception” on page 444.
See “Configuring Data Owner Exception for EDM policy conditions” on page 466.
Field Description
Email address If you use an email address column filed in the data source file, the email address appears in
the Directory EDM drop-down list at the incident snapshot screen.
Windows user name If you use a Windows user name field in your data source, the data must be in the following
format: domain\user; for example: ACME\john_smith.
MSN IM name
threshold is met, Symantec Data Loss Prevention stops indexing. It then displays
an error to warn you that your data may be unorganized or corrupt.
To prepare the exact data source for EDM indexing
1 Make sure that the data source file is formatted as follows:
■ If the data source has more than 200,000 rows, verify that it has at least
two columns of data. One of the columns should contain unique values.
For example, credit card numbers, driver’s license numbers, or account
numbers (as opposed to first and last names, which are generic).
See “Ensure data source has at least one column of unique data”
on page 519.
■ Verify that you have delimited the data source using pipes ( | ) or tabs. If
the data source file uses commas as delimiters, remove any commas that
do not serve as delimiters.
See “Do not use the comma delimiter if the data source has number fields”
on page 522.
■ Verify that data values are not enclosed in quotes.
■ Remove single-character and abbreviated data values from the data source.
For example, remove the column name and all values for a column in which
the possible values are Y and N. Optionally, remove any columns that
contain numeric values with less that five digits, as these can cause false
positives in production.
See “Remove ambiguous character types from the data source file”
on page 521.
■ Verify that numbers, such as credit card or social security, are delimited
internally by dashes, or spaces, or none at all. Make sure that you do not
use a data-field delimiter such as a comma as an internal delimiter in any
such numbers. For example: 123-45-6789, or 123 45 6789, or 123456789
are valid, but not 123,45,6789.
See “Do not use the comma delimiter if the data source has number fields”
on page 522.
■ Eliminate duplicate records, which can cause duplicate incidents in
production.
See “Cleanse the data source file of blank columns and duplicate rows”
on page 520.
■ Do not index common values. EDM works best with values that are unique.
Think about the data you want to index (and thus protect). Is this data truly
valuable? If the value is something common, it is not useful as an EDM
value. For example, suppose you want to look for "US states." Since there
are only 50 states, if your exact data profile has 300,000 rows, the result
Detecting content using Exact Data Matching (EDM) 451
Configuring Exact Data profiles
2 Once you have prepared the exact data source file, proceed with the next step
in the EDM process: upload the exact data source file to the Enforce Server
for profiling the data you want to protect.
See “Uploading exact data source files to the Enforce Server” on page 451.
Table 21-6 Uploading the data source file to the Enforce Server for indexing
Upload Data Source Data source file is If you have a smaller data source file (less than 50 MB), upload the data
to Server Now less than 50 MB source file to the Enforce Server using the Enforce Server administration
console (web interface). When creating the Exact Data Profile, you can
specify the file path or browse to the directory and upload the data source
file.
Note: Due to browser capacity limits, the maximum file size that you can
upload is 2 GB. However, uploading any file over 50 MB is not
recommended since files over this size can take a long time to upload. If
your data source file is over 50 MB, consider copying the data source file
to the datafiles directory using the next option.
Detecting content using Exact Data Matching (EDM) 452
Configuring Exact Data profiles
Table 21-6 Uploading the data source file to the Enforce Server for indexing
(continued)
Reference Data Data source file is If you have a large data source file (over 50 MB), copy it to the datafiles
Source on Manager over 50 MB directory on the host where Enforce is installed.
Host
■ On Windows this directory is located at
\SymantecDLP\Protect\datafiles.
■ On Linux this directory is located at
/var/SymantecDLP/datafiles.
Use This File Name Data source file is In some cases you may want to create an EDM profile before you have
not yet created created the data source file. In this case you can create a profile template
and specify the name of the data source file you plan to create. This
option lets you define EDM policies using the EDM profile template before
you index the data source. The policies do not operate until the data
source is indexed. When you have created the data source file you place
it in the \SymantecDLP\Protect\datafiles directory and index the
data source immediately on save or schedule indexing.
Table 21-6 Uploading the data source file to the Enforce Server for indexing
(continued)
Use This File Name Data source is to In some environments it may not be secure or feasible to copy or upload
be indexed the data source file to the Enforce Server. In this situation you can index
and
remotely and the data source remotely using Remote EDM Indexer.
Load Externally copied to the
See “Remote EDM indexing” on page 500.
Generated Index Enforce Server
This utility lets you index an exact data source on a computer other than
the Enforce Server host. This feature is useful when you do not want to
copy the data source file to the same computer as the Enforce Server.
As an example, consider a situation where the originating department
wants to avoid the security risk of copying the data to an
extra-departmental host. In this case you can use the Remote EDM
Indexer.
First you create an EDM profile template where you choose the Use this
File Name and the Number of Columns options. You must specify the
name of the data source file and the number of columns it contains.
See “Creating an EDM profile template for remote indexing” on page 503.
You then use the Remote EDM Indexer to remotely index the data source
and copy the index files to the Enforce Server host and load the externally
generated index. The Load Externally Generated Index option is only
available after you have defined and saved the profile. Remote indexes
are loaded from the /SymantecDLP/Protect/Index directory on the
Enforce Server host.
See “Copying and loading remote index files to the Enforce Server”
on page 509.
Note: If you are using the Remote EDM Indexer to generate the Exact Data Profile,
refer to the following topic.
Detecting content using Exact Data Matching (EDM) 454
Configuring Exact Data profiles
Note: Use this option with caution. Be sure to remember to create the data
source file and copy it to the "datafiles" directory. Name the data source
file exactly the same as the name you enter here and include the exact
number of columns you specify here.
8 If the first row of your data source contains Column Names, select the "Read
first row as column names" check box.
9 Specify the Error Threshold, which is the maximum percentage of rows that
contain errors before indexing stops.
A data source error is either an empty cell, a cell with the wrong type of data,
or extra cells in the data source. For example, a name in a column for phone
numbers is an error. If errors exceed a certain percentage of the overall data
source (by default, 5%), the system quits indexing and displays an indexing
error message. The index is not created if the data source has more invalid
records than the error threshold value allows. Although you can change the
threshold value, more than a small percentage of errors in the data source can
indicate that the data source is corrupt, is in an incorrect format, or cannot be
read. If you have a significant percentage of errors (10% or more), stop indexing
and cleanse the data source.
See “Preparing the exact data source file for indexing” on page 449.
10 Select the Column Separator Char (delimiter) that you have used to separate
the values in the data source file. The delimiters you can use are tabs, commas,
or pipes.
11 Select one of the following encoding values for the content to analyze, which
must match the encoding of your data source:
■ ISO-8859-1 (Latin-1) (default value)
Standard 8-bit encoding for Western European languages using the Latin
alphabet.
■ UTF-8
Use this encoding for all languages that use the Unicode 4.0 standard (all
single- and double-byte characters), including those in East Asian
languages.
Detecting content using Exact Data Matching (EDM) 456
Configuring Exact Data profiles
■ UTF-16
Use this encoding for all languages that use the Unicode 4.0 standard (all
single- and double-byte characters), including those in East Asian
languages.
Note: Make sure that you select the correct encoding. The system does not
prevent you from creating an EDM profile using the wrong encoding. The
system only reports an error at run-time when the EDM policy attempts to
match inbound data. To make sure that you select the correct encoding, after
you clickNext, verify that the column names appear correctly. If the column
names do not look correct, you chose the wrong encoding.
16 Check your field mappings against the suggested fields for the policy template
you plan to use. To do so, go to the Check Mappings Against drop-down list,
select a template, and click Check now on the right.
The system displays a list of all template fields that you have not mapped. You
can go back and map these fields now. Alternatively, you may want to expand
your data source to include as many expected fields as possible, and then
re-create the exact data profile. Symantec recommends that you include as
many expected data fields as possible.
17 In the Indexing section of the screen, select one of the following options:
■ Submit Indexing Job on Save
Select this option to begin indexing the data source when you save the
exact data profile.
■ Submit Indexing Job on Schedule
Select this option to index the data source according to a specific schedule.
Make a selection from the Schedule drop-down list and specify days, dates,
and times as required.
See “About index scheduling” on page 443.
See “Scheduling Exact Data Profile indexing” on page 460.
18 Click Finish.
After Symantec Data Loss Prevention finishes indexing, it deletes the original
data source from the Enforce Server. After you index a data source, you cannot
change its schema. If you change column mappings for a data source after
you index it, you must create a new exact data profile.
After the indexing process is complete you can create new EDM rules for your
policies that reference the Exact Data Profile you have created.
See “Configuring the Content Matches Exact Data policy condition” on page 464.
system field. The Field Mappings section lets you map the columns in the original
data source to system fields in the Exact Data Profile.
Field Description
Data Source Field If you selected the Column Names option at the Add Exact Data Profile screen, this column
lists the values that are found in the first row from the data source. If you did not select this
option, this column lists the columns by generic names (such as Col 1, Col 2, and so on).
Note: If you are implementing data owner exception, you must map either or both the email
address and domain fields.
See “Configuring the Content Matches Exact Data policy condition” on page 464.
A system field value (except None Selected) cannot be mapped to more than one column.
Some system fields have system patterns associated with them (such as social security
number) and some do not (such as last name).
See “Using system-provided pattern validators for EDM profiles” on page 459.
Check mappings Select a policy template from the drop-down list to compare the field mappings against and
against policy then click Check now.
template
All policy templates that implement EDM appear in the drop-down menu, including any you
have imported.
If you plan to use more than one policy template, select one and check it, and then select
another and check it, and so on.
If there are any fields in the policy template for which no data exists in the data source, a
message appears listing the missing fields. You can save the profile anyway or use a different
Exact Data Profile.
Advanced View If you want to customize the schema for the exact data profile, click Advanced View to display
the advanced field mapping options.
Table 21-8 lists and describes the additional columns you can specify in the Advanced View
screen.
Finish Click Finish when you are done configuring the Exact Data Profile.
Detecting content using Exact Data Matching (EDM) 459
Configuring Exact Data profiles
From the Advanced View you map the system and data source fields to system
patterns. System patterns map the specified structure to the data in the Exact Data
Profile and enable efficient error checking and hints for the indexer.
Field Description
Custom Name If you select Custom Name for a System Field, enter a unique name for it and then select a
value for Type. The name is limited to 60 characters.
Type If you select a value other than Custom for a System Field, some data types automatically
select a value for Type. For example, if you select Birth Date for the System Field, Date is
automatically selected as the Type. You can accept it or change it.
Some data types do not automatically select a value for Type. For example, if you select
Account Number for the System Field, the Type remains unselected. You can specify the
data type of your particular account numbers.
See “Using system-provided pattern validators for EDM profiles” on page 459.
Description Click the link (description) beside the Type column header to display a pop-up window
containing the available system data types. See also the topic link below.
See “Using system-provided pattern validators for EDM profiles” on page 459.
Simple View Click Simple View to return to the Simple View (with the Custom Name and Type columns
hidden).
Type Description
Credit Card Number The Credit Card pattern is built around knowledge about various internationally recognized
credit cards, their registered prefixes, and number of digits in account numbers. The following
types of Credit Cards patterns are validated: MasterCard, Visa, America Express, Diners Club,
Discover, Enroute, and JCB.
Optional spaces in designated areas within credit cards numbers are recognized. Note that
only spaces in generally accepted locations (for example, after every 4th digit in MC/Visa) are
recognized. Note that the possible location of spaces differs for different card types. Credit
card numbers are validated using checksum algorithm. If a number looks like a credit card
number (that is, it has correct number of digits and correct prefix), but does not pass checksum
algorithm, it is not considered to be a credit card, but just a number.
Detecting content using Exact Data Matching (EDM) 460
Configuring Exact Data profiles
Type Description
Email Email is a sequence of characters that looks like the following: [email protected], where
string may contain letters, digits, underscore, dash, and dot, and 'tld' is one of the approved
DNS top level generic domains, or any two letters (for country domains).
Number Number is either float or integer, either by itself or in round brackets (parenthesis).
Percent Percent is a number immediately followed by the percent sign ("%"). No space is allowed
between a number and a percent sign.
Phone Only US and Canadian telephone numbers are recognized. The phone number must start
with any digit but 1, with the exception of numbers that include a country code
Phone number can be one of the following formats:
All cases above can be optionally followed by an extension number, preceded by spaces or
dashes. The extension number is 2 to 5 digits preceded by any of the following (case
insensitive): 'x' 'ex' 'ext' 'exten' 'extens' 'extensions' optionally followed by a dot and spaces.
Note: The system does not recognize the pattern XXX-XXX-XXXX as a valid phone number
format because this format is frequently used in other forms of identification. If your data source
contains a column of phone numbers in that format, select None Selected to avoid confusion
between phone numbers and other data.
Postal Code Only US ZIP codes and Canadian Postal Codes are recognized. The US ZIP code is a sequence
of 5 digits, optionally followed by dash, followed by another 4 digits. The Canadian Postal
Code is a sequence like K2B 8C8, that is, "letter-digit-letter-space-digit-letter-digit" where
space(s) in the middle is optional.
Social Security Only US TAX IDs are recognized. The TAX ID is a 3 digits, optionally followed by spaces or
Number dashes, followed by 2 digits, optionally followed by spaces or dashes, followed by 4 digits.
■ If you update your data sources occasionally (for example, less than once a
month), there is no need to create a schedule. Index the data each time you
update the data source.
■ Schedule indexing for times of minimal system use. Indexing affects performance
throughout the Symantec Data Loss Prevention system, and large data sources
can take time to index.
■ Index a data source as soon as you add or modify the corresponding exact data
profile, and re-index the data source whenever you update it. For example,
consider a scenario whereby every Wednesday at 2:00 A.M. you update the
data source. In this case you should schedule indexing every Wednesday at
3:00 A.M. Do not index data sources daily as this can degrade performance.
■ Monitor results and modify your indexing schedule accordingly. If performance
is good and you want more timely updates, for example, schedule more frequent
data updates and indexing.
The Indexing section lets you index the Exact Data Profile as soon as you save it
(recommended) or on a regular schedule as follows:
Parameter Description
Submit Indexing Select this option to index the Exact Data Profile when you click Save.
Job on Save
Submit Indexing Select this option to schedule an indexing job. The default option is No Regular Schedule. If you
Job on Schedule want to index according to a schedule, select a desired schedule period, as described.
Index Once On – Enter the date to index the document profile in the format MM/DD/YY. You can also click the
date widget and select a date.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Index Weekly Day of the week – Select the day(s) to index the document profile.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Detecting content using Exact Data Matching (EDM) 462
Configuring Exact Data profiles
Parameter Description
Index Monthly Day – Enter the number of the day of each month you want the indexing to occur. The number
must be 1 through 28.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Action Description
Add EDM profile Click Add Exact Data Profile to define a new Exact Data Profile.
Edit EDM profile To modify an existing Exact Data Profile, click the name of the profile, or click the pencil icon
at the far right of the profile row.
Remove EDM profile Click the red X icon at the far right of the profile row to delete the Exact Data Profile from the
system. A dialog box confirms the deletion.
Note: You cannot edit or remove a profile if another user currently modifies that profile, or if a
policy exists that depends on that profile.
Download EDM Click the download profile link to download and save the Exact Data Profile.
profile
This is useful for archiving and sharing profiles across environments. The file is in the binary
*.edm format.
Detecting content using Exact Data Matching (EDM) 463
Configuring EDM policies
Action Description
Refresh EDM profile Click the refresh arrow icon at the upper right of the Exact Data screen to fetch the latest status
status of the indexing process.
If you are in the process of indexing, the system displays the message "Indexing is starting."
The system does not automatically refresh the screen when the indexing process completes.
Column Description
Last Active Version The version of the exact data profile and the name of the detection server that runs the profile.
Status The current status of the exact data profile, which can be any of the following:
In addition, the current status of the indexing process for each detection server, which can be
any of the following:
Error messages The Exact Data screen displays any error messages in red.
For example, if the Exact Data Profile is corrupt or does not exist, the system displays an error
message.
Table 21-13 Configure the Content Matches Exact Data policy condition
1 Configure an EDM Create a new EDM detection rule in a policy, or modify an existing EDM rule.
policy detection rule.
See “Configuring policies” on page 390.
2 Select the fields to The first thing you do when configuring the EDM condition is select each data
match. field that you want the condition to match. You can select all or deselect all fields
at once. The system displays all the fields or columns that were included in the
index. You do not have to select all the fields, but you should select at least 2 or
3, one of which must be unique, such as social security number, credit card
number, and so forth.
3 Choose the number of Choose the number of the selected fields to match from the drop down menu.
selected fields to match. This number represents the number of fields of those selected that must be present
in a message to trigger a match. You must select at least as many fields to match
as the number of data fields you check. For example, if you choose 2 of the
selected fields from the menu, you must have checked at least two fields present
in a message for detection.
See “Ensure data source has at least one column of unique data” on page 519.
Detecting content using Exact Data Matching (EDM) 465
Configuring EDM policies
Table 21-13 Configure the Content Matches Exact Data policy condition
(continued)
4 Select the WHERE The WHERE clause option matches on the specified field value. You specify a
clause to enter specific WHERE clause value by selecting an exact data field from the menu and by
field values to match entering a value for that field in the adjacent text box. If you enter more than one
(optional). value, separate the values with commas.
See “Use a WHERE clause to detect records that meet specific criteria”
on page 527.
For example, consider an Exact Data Profile for "Employees" with a "State" field
containing state abbreviations. In this example, to implement the WHERE clause,
you select (check) WHERE, choose "State" from the drop-down list, and enter
CA,NV in the text box. This WHERE clause then limits the detection server to
matching messages that contain either CA or NV as the value for the State field.
Note: You cannot specify a field for WHERE that is the same as one of the
selected matched fields.
5 Ignore data owners Selecting this option implements Data Owner Exception.
(optional).
See “Configuring Data Owner Exception for EDM policy conditions” on page 466.
6 Exclude data field You can use the exclude data field combinations to specify combinations of data
combinations (optional). values that are exempted from detection. If the data appears in exempted pairs
or groups, it does not cause a match. Excluded combinations are only available
when matching 2 or 3 fields. To enable this option, you must select 2 or 3 fields
to match from the _ of the selected fields menu at the top of the condition
configuration.
Table 21-13 Configure the Content Matches Exact Data policy condition
(continued)
7 Select an incident Enter or modify the minimum number of matches required for the condition to
minimum. report an incident.
For example, consider a scenario where you specify 1 of the selected fields for
a social security number field and an incident minimum of 5. In this situation the
engine must detect at least five matching social security numbers in a single
message to trigger an incident.
9 Select one or more Select this option to create a compound condition. All conditions must match for
conditions to also the rule to trigger an incident.
match.
You can Add any available condition from the list.
10 Test and troubleshoot See “Test and tune policies to improve match accuracy” on page 430.
the policy.
See “Troubleshooting policies” on page 423.
■ Sender matches — Select this option to EXCLUDE the data sender from
detection.
■ Any or All Recipient matches — Select one of these options to EXCLUDE
any or all data recipient(s) from detection.
Note: When you configure DOE for the EDM condition, you cannot select a value
for Ignore Sender/Recipient that is the same as one of the matched fields.
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing,Sales in the text
box. If the condition is implemented as a rule, in this example a match occurs only if the sender or
user works in Marketing or Sales (as long as the other input content meets all other detection criteria).
If the condition is implemented as an exception, in this example the system ignores from matching
messages from a sender or user who works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any sender
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
Detecting content using Exact Data Matching (EDM) 468
Configuring EDM policies
Table 21-15 Configuring the Recipient based on a Directory from an EDM profile
condition
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing, Sales in the text
box. For a detection rule, this example causes the system to capture an incident only if at least one
recipient works in Marketing or Sales (as long as the input content meets all other detection criteria).
For an exception, this example prevents the system from capturing an incident if at least one recipient
works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any recipient
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
See “Enable keyword token verification for CJK” on page 720. describes how to
enable and use token verification for CJK keywords.
Detecting content using Exact Data Matching (EDM) 470
Configuring EDM policies
EDM.MaximumNumberOfMatches 100 Defines a top limit on the number of matches returned from each
ToReturn RAM index search. For multi-file indices, this limit is applied to each
sub-index search independently before the search results are
combined. As a result the number of actual matches can exceed
this limit for multiple file indices.
Detecting content using Exact Data Matching (EDM) 471
Configuring EDM policies
Table 21-18 Advanced Settings for EDM indexing and detection (continued)
EDM.RunProximityLogic true If true (default), this setting runs the token proximity check. The
free-form text proximity is defined by the setting
EDM.SimpleTextProximityRadius. The tabular text proximity
is defined by belonging to the same table row.
Note: Disabling proximity is not recommended because it can
negatively impact the performance of the system.
EDM.SimpleTextProximityRadius 35 Provides the baseline range for proximity checking a matched token.
This value is multiplied by the number of required matches to equal
the complete proximity check range.
Table 21-18 Advanced Settings for EDM indexing and detection (continued)
You can set this amount to as many sub-tokens as you need, but
the total number of characters in a multi-token cell cannot exceed
200.
Lexer.StopwordLanguages en Enables the elimination of stop words for the specified languages.
MessageChain.NumChains Varies This number varies depending on detection server type. It is either
4 or 8. The number of messages, in parallel, that the filereader will
process. Setting this number higher than 8 (with the other default
settings) is not recommended. A higher setting does not substantially
increase performance and there is a much greater risk of running
out of memory. Setting this to less than 8 (in some cases 1) helps
when processing big files, but it may slow down the system
considerably.
Detecting content using Exact Data Matching (EDM) 473
Using multi-token matching
Characteristic Description
Whitespace in multi-token cells is considered, but multiple See “Multi-token with spaces” on page 474.
whitespaces are normalized to 1.
Detecting content using Exact Data Matching (EDM) 474
Using multi-token matching
Characteristic Description
Punctuation immediately preceding and following a token See “Multi-token with punctuation” on page 475.
or sub-token is always ignored.
See “Additional examples for multi-token cells with
punctuation” on page 476.
For proximity range checking the sub-token parts of a See “Proximity matching example” on page 484.
multi-token are counted as single tokens.
The system does not consider stopwords when matching See “Multi-token with stopwords” on page 474.
multi-tokens. In other words, stopwords are not excluded.
Multi-tokens are more computationally expensive than See “Memory requirements for EDM” on page 490.
single tokens and require additional memory for indexing,
loading, and processing.
Cell contains space Bank of America Bank of America Cell with spaces is
multi-token.
Cells contains multiple Bank of America Bank of America Multiple spaces are
spaces normalized to one.
Table 21-21 shows multi-token matches with stopwords, single letters, and single
digits.
Cell contains stopword. throw other ball throw other ball Common word ("other") is
filtered out during detection
but not when it is part of a
multi-token.
Cell contains single letter. throw a ball throw a ball Single letter ("a") is filtered
out, but not when it is part of
a multi-token.
Cell contains single digit. throw 1 ball throw 1 ball Unlike single-letter words
that are stopwords, single
digits are never ignored.
Table 21-22 Multi-token cell with Latin and CJK characters examples
Cell includes Latin and CJK ABC傠傫 ABC傠傫 Mixed Latin-CJK cell is
characters with no spaces. multi-token.
傠傫ABC 傠傫ABC
Must match exactly.
Cell includes Latin and CJK ABC 傠傫 ABC 傠傫 Multiple spaces are reduced
with one or more spaces. to one.
傠傥 ABC 傠傥 ABC
The WIP setting operates at detection-time to alter how matches are reported. For
most EDM policies you should not change the WIP setting. For a few limited
situations, such as account numbers or addresses, you may need to set
IncludePunctuationInWords = false depending on your detection requirements.
a.b a.b TRUE Yes The indexed content and the detected content are
exactly the same.
a.b ab TRUE No The indexed content and the detected content are
different.
ab a.b TRUE No The indexed content and the detected content are
different.
FALSE Yes The detected content is treated as "a b" and is therefore
a match.
ab ab TRUE Yes The indexed content and the detected content are
exactly the same
FALSE Yes The indexed content and the detected content are
exactly the same
is false. In other words, if indexed data has cell which has a token with internal
punctuation, the WIP setting should be set to true.
Table 21-24 Additional use cases for multi-token cells with punctuation
Cell contains a physical 346 Guerrero St., Apt. #2 346 Guerrero St., Apt. #2 The indexed content is a
address with punctuation. multi-token cell.
346 Guerrero St Apt 2
Both match because the
punctuation comes at the
beginning or end of the
sub-token parts and is
therefore ignored.
Cell contains Asian 傠傫;;傠傫 傠傫;;傠傫 (if WIP true) The indexed content is a
language characters (CJK) single token cell.
with indexed internal
During detection, Asian
punctuation.
language characters (CJK)
with internal punctuation is
affected by the WIP setting.
Thus, in this example 傠傫;;
傠傫 matches only if the WIP
setting is true.
Table 21-24 Additional use cases for multi-token cells with punctuation
(continued)
Cell contains mix of Latin DLP;;EDM 傠傫;;傠傥 DLP;;EDM;;傠傫;;傠傥 (if The indexed content is a
and CJK characters with WIP true) multi-token cell.
internal punctuation.
DLP;;EDM 傠傫;;傠傥 (if During detection,
WIP true) punctuation between the
Latin and Asian characters
is treated as a single
whitespace and leading and
trailing punctuation is
ignored.
Table 21-24 Additional use cases for multi-token cells with punctuation
(continued)
Cell contains mix of Latin DLP EDM 傠傫 傠傥 DLP EDM 傠傫 傠傥 The indexed content is a
and CJK characters with multi-token cell.
DLP;EDM 傠傫;傠傥 (if WIP
internal punctuation.
false) During detection,
punctuation between the
DLP;EDM;;傠傫;傠傥 (if WIP
Latin and Asian characters
false)
is treated as a single
whitespace and leading and
trailing punctuation is
ignored. Thus, it matches as
indexed.
Note: It is a best practice to always validate your index against the recognized
system patterns when the data source includes one or more such column fields.
See “Map data source column to system fields to leverage validation” on page 522.
The general rule for system-recognized patterns is that the WIP setting does not
apply during detection. Instead, the rules for that particular pattern apply. In other
Detecting content using Exact Data Matching (EDM) 480
Using multi-token matching
words, if the pattern is recognized during detection, the WIP setting is not checked.
This is always true if the pattern is a string of characters such as an email address,
and if the cell contains a number that conforms to one of the recognized number
patterns (such as CCN or SSN).
In addition, even if the pattern is a generic number such as account number that
does not conform to one of the recognized number patterns, the WIP setting may
still not apply. To ensure accurate matching for generic numbers that do not conform
to one of the system-recognized patterns, you should not include punctuation in
these number cells. If the cell contents conforms to one of the system-recognized
patterns, the punctuation rules for that pattern apply and the WIP setting does not.
See “Do not use the comma delimiter if the data source has number fields”
on page 522.
See Table 21-25 on page 480. lists and describes examples for detecting
system-recognized data patterns.
Caution: This list is not exhaustive. It is provided for informational purposes only to
ensure that you are aware that data that matches system-defined patterns takes
precedence and the WIP setting is ignored. Before deploying your EDM policies
into production, you must test detection accuracy and adjust the index accordingly
to ensure that the data that you have indexed matches as expected during detection.
Table 21-25 Some special use cases for system-recognized data patterns
Table 21-25 Some special use cases for system-recognized data patterns
(continued)
### #### ### ### #### ### Must match exactly. The
pattern ###-####-### does
not match even if WIP is set
to false.
Apostrophe '
Tilde ~
Exclamation point !
Ampersand &
Dash -
Period (dot) .
Detecting content using Exact Data Matching (EDM) 482
Using multi-token matching
Question mark ?
At sign @
Dollar sign $
Percent sign %
Asterisk *
Caret symbol ^
Open parenthesis (
Close parenthesis )
Open bracket [
Close bracket ]
Open brace {
Close brace }
Forward slash /
Back slash \
Pound sign #
Equal sign =
Plus sign +
Semicolon ;
Table 21-27 provides examples for match counting. All examples assume that the
policy is set to match three out of four column fields and that the profile index
contains the following cell contents:
Kathy | Stevens | 123-45-6789 | 1111-1111-1111-1111
Kathy | Stevens | 123-45-6789 | 2222-2222-2222-2222
Kathy | Stevens | 123-45-6789 | 3333-3333-3333-3333
If
EDM.HighlightAllMatchesInProximity=true,
EDM matches all tokens within the
proximity window. The token set for each
row is as follows:
1111-1111-1111-1111 1 3 If
Kathy Stevens 123-45-6789 EDM.HighlightAllMatchesInProximity=false,
2 2 EDM matches the left-most tokens for
each profile data row. The token set for
3 2: if
each row is as follows:
EDM.HighlightAllMatchesInProximity=false
(default) Row # 1: 1111-1111-1111-1111 Kathy
Stevens
1: if
EDM.HighlightAllMatchesInProximity=true Row # 2: Kathy Stevens 123-45-6789
Row # 3: Kathy Stevens 123-45-6789
If
EDM.HighlightAllMatchesInProximity=true,
EDM matches all tokens within the
proximity window. The token set for each
row is as follows:
distinction at run-time between the two. Thus, tabular data is treated the same as
free text data and the proximity check is performed beyond the scope of the length
of the row contents
For example, assuming the default radius of 35 and a policy set to match 3 out of
4 column fields, the proximity range is 105 tokens (3 x 35). If the policy matches 2
out of 3 the proximity range is 70 tokens (35 x 2).
Warning: While you can decrease the value of the proximity radius, Symantec does
not recomment increasing this value beyond the default (35). Doing so may cause
performance issues. See “Configuring Advanced Server Settings for EDM policies”
on page 470.
Table 21-28 shows a proximity matching example based on the default proximity
radius setting. In this example, the detected content produces 1 unique token set
match, described as follows:
■ The proximity range window is 105 tokens (35 x 3).
■ The proximity range window starts at the leftmost match ("Stevens") and ends
at the rightmost match ("123-45-6789").
■ The total number of tokens from "Stevens" to the SSN (including both) is 105
tokens.
■ The stopwords "other" and "a" are counted for proximity range purposes.
■ "Bank of America" is a multi-token. Each sub-token part of a multi-token is
counted as a single token for proximity purposes.
Detecting content using Exact Data Matching (EDM) 486
Updating EDM indexes to the latest version
Last_Name | Employer | Match 3 of 3 Radius = 35 Zendrerit inceptos Kathy Stevens lorem ipsum pharetra
SSN tokens (default) convallis leo suscipit ipsum sodales rhoncus, vitae dui
nisi volutpat augue maecenas in, luctus id risus magna
Stevens | Bank of America
arcu maecenas leo quisque. Rutrum convallis tortor
| 123-45-6789
urna morbi elementum hac curabitur morbi, nunc dictum
primis elit senectus faucibus convallis surfrent.
Aptentnour gravida adipiscing iaculis himenaeos,
himenaeos a porta etiam viverra. Class torquent uni
other tristique cubilia in Bank of America. Dictumst
lorem eget ipsum. Hendrerit inceptos other sagittis
quisque. Leo mollis per nisl per felis, nullam cras mattis
augue turpis integer pharetra convallis suscipit
hendrerit? Lubilia en mictumst horem eget ipsum.
Inceptos urna sagittis quisque dictum odio hendrerit
convallis suscipit ipsum wrdsrf 123-45-6789.
1 Upgrade the Enforce Server Refer to the Symantec Data Loss Prevention Upgrade Guide for details.
to 14.6.
Do not upgrade the EDM detection server(s) now.
The 14.6 Enforce Server can continue to receive incidents from non-14.6
detection servers during the upgrade process. Policies and other data cannot
be pushed out to non-14.6 detection servers (one-way communication only
between Enforce 14.6 and non-14.6 detection servers).
2 Create a 14.6-compatible Using the 14.6 Enforce Server administration console, create a new EDM
remote EDM profile profile template for remote EDM indexing.
template.
See “Creating an EDM profile template for remote indexing” on page 503.
Download the *.edm profile template and copy it to the remote data source
host system.
See “Downloading and copying the EDM profile file to a remote system”
on page 506.
3 Install the 14.6 Remote EDM Install the Symantec Data Loss Prevention 14.6 Remote EDM Indexer on the
Indexer on the remote data remote data source host so that you can index the data source.
source host.
See “Remote EDM indexing” on page 500.
4 Calculate the memory that Calculate the memory that is required for indexing before you attempt to index
is required to index the data the data source. Although the Remote EDM Indexer is allocated sufficient
source and adjust the memory to index most data sources, if you have a very large index you may
indexer memory setting. have to allocate more memory.
Table 21-29 Update process using the Remote EDM Indexer (continued)
5 Index the data source using The result of this process is multiple 14.6-compatible *.rdx files that you
the 14.6 Remote EDM can load into a 14.6 Enforce Server system.
Indexer.
If you have a data source file prepared, run the Remote EDM Indexer and
index it.
See “Remote indexing examples using data source file” on page 507.
If the data source is an Oracle database and the data is clean, use the SQL
Preindexer to pipe the data to the Remote EDM Indexer.
6 Calculate the memory that You need to calculate how much RAM the detection server requires to load
is required to load and and process the index at run-time. These calculations are required for each
process the index and adjust EDM index you want to deploy.
the detection server memory
See “Memory requirements for EDM” on page 490.
setting for each EDM
detection server host.
7 Update the EDM profile by Copy the *.pdx and *.rdx files from the remote host to the 14.6 Enforce
loading the 14.6 index. Server host file system.
Load the index into the EDM profile you created in Step 2.
See “Copying and loading remote index files to the Enforce Server”
on page 509.
8 Upgrade one or more EDM Once you have created the 14.6-compliant EDM profiles and upgraded the
detection servers to 14.6. Enforce Server, you can then upgrade the detection server(s).
Refer to the Symantec Data Loss Prevention Upgrade Guide for details.
Make sure you have calculated and verified the memory requirements for
loading and processing multi-token indexes on the detection server.
9 Test and verify the updated To test the upgraded system and updated index, you can create a new policy
index. that references the updated index.
10 Remove out-of-date EDM Once you have verified the new EDM index and policy, you can retire the
indexes. legacy EDM index and policy. (Indexes created for versions earlier than 14.0
will not work with version 14.6.)
1 Upgrade the Enforce Server Refer to the Symantec Data Loss Prevention Upgrade Guide for details.
to 14.6.
Do not upgrade the EDM detection server(s) now.
The 14.6 Enforce Server can continue to receive incidents from non-14.6
detection servers during the upgrade process. Policies and other data cannot
be pushed out to non-14.6 detection servers (one-way communication only
between Enforce 14.6 and non-14.6 detection servers).
2 Create, prepare, and copy Copy the data source file to the /SymantecDLP/Protect/datafiles
the data source file to the directory on the upgraded 14.6 Enforce Server host file system.
14.6 Enforce Server host.
See “Creating the exact data source file for EDM” on page 447.
See “Preparing the exact data source file for indexing” on page 449.
See “Uploading exact data source files to the Enforce Server” on page 451.
3 Calculate memory the Calculate the memory that is required for indexing before you attempt to index
memory that is required to the data source.
index the data source and
See “Memory requirements for EDM” on page 490.
update the indexer memory
setting.
4 Create a new Create a new EDM profile using the 14.6 Enforce Server administration
14.6-compliant EDM profile console.
and index the data source
Choose the option Reference Data Source on Manager Host for uploading
file.
the data source file (assuming that you copied it to the /datafiles directory).
5 Calculate memory the You need to calculate how much RAM the detection server requires to load
memory that is required to and process the index and run-time. These calculations are required for each
load and process the index EDM index you want to deploy and the memory adjustments are cumulative.
at run-time and adjust the
See “Memory requirements for EDM” on page 490.
memory settings for each
EDM detection server host.
6 Upgrade the EDM detection Once you have created the 14.6-compliant EDM profile you can then upgrade
server(s) to 14.6. the detection server(s).
Refer to the Symantec Data Loss Prevention Upgrade Guide for details.
Make sure you have calculated and verified the memory requirements for
loading and processing multi-token indexes on the detection server.
7 Test and verify the updated To test the upgraded system and updated index, you can create a new policy
index. that references the updated index.
8 Remove out-of-date EDM Once you have verified the new EDM index and policy, you can retire the
indexes. legacy EDM index and policy. (Indexes created for versions earlier than 14.0
will not work with version 14.6.)
Enforce Server error 2928 One or more profiles are out of date and must be reindexed.
event
See “Updating EDM indexes to the latest version” on page 486.
Enforce Server error 2928 Check the Manage > Data Profiles > Exact Data page for more details.
event detail The following EDM profiles are out of date: Profile X, Profile XY, and so
forth.
System Event error 2928 One or more profiles are out of date and must be reindexed.
Exact Data Profile error N/A This profile is out of date, and must be reindexed.
Once you have established what your specific EDM memory requirements are, you
can evaluate how those requirements affect the general system requirements for
your Data Loss Prevention deployment. See the Symantec Data Loss Prevention
System Requirements and Compatibility Guide for details about general
requirements and potential EDM deployment impact.
Table 21-32 Workflow for determining memory requirements for EDM indexes
2 Increase the indexer See “Increasing the memory for the Enforce Server
memory according to EDM indexer” on page 494.
your calculations.
See “Increasing the memory for the Remote EDM
indexer” on page 495.
Table 21-32 Workflow for determining memory requirements for EDM indexes
(continued)
4 Increase the detection See “Increasing the memory for the detection server
server memory (File Reader)” on page 498.
according to your
calculations.
1 Estimate the memory requirements See “Determining requirements for both local and remote
for the indexer. indexers” on page 493.
2 Increase the indexer memory. The next step is to increase the memory allocated to the
indexer. The procedure for increasing the indexer memory
differs depending on whether you are using the EDM indexer
local to the Enforce Server or the Remote EDM Indexer.
3 Restart the Vontu Manager service. You must restart this service after you have changed the
memory allocation.
4 Index the data source. The last step is to index the data source. You need to do this
before you calculate remaining memory requirements.
Serial indexing
If you create the indexes serially (no two are created in parallel), the memory
requirement for the biggest index is:
2 billion cells – 0 .5 billion default x 3 bytes = 4.5 GB rounded to 5 GB additional
memory.
As explained in detail later, set wrapper.java.maxmemory to 7 GB (7168M). This
7 GB includes the 2 GB (2048 MB) default memory for Enforce and the 5 GB
additional memory.
Table 21-34 provides examples for how the data source size affects indexer memory
requirements for serial indexes.
100 million cells 2048 MB (default) No additional RAM is needed for the indexer.
500 million cells 2048 MB (default) No additional RAM is needed for the indexer.
1 billion cells 4 GB If you have a single data source with 1 billion cells (for
example, 10 columns by 100 million rows), you need
extra memory for 0.5 billion cells (1 billion cells – 0.5
million default) 0.5 million x 3 bytes, or 1.5 GB of RAM
(rounded to 2 GB) to index the data source. This
amount is added to the default indexer RAM allotment.
Detecting content using Exact Data Matching (EDM) 494
Memory requirements for EDM
2 billion cells 7 GB If you have a single data source with 2 billion cells (for
example, 10 columns by 200 million rows), you need
extra memory for 1.5 billion cells (2 billion cells – 0.5
million default) 1.5 million x 3 bytes, or 4.5 GB of RAM
(rounded to 5 GB) to index the data source.
Parallel indexing
If you index these four files in Table 21-34 simultaneously (in parallel), you are
indexing more than 500 million cells. So, the additional memory (3.6 billion cells –
0.5 billion cells provided by default) required is as follows:
3.1 billion cells x 3 bytes = 9.3 GB rounded to 10 GB additional memory.
As explained in detail later, you set wrapper.java.maxmemory to 12 GB. This 12
GB includes 2048 MB default memory for Enforce and an additional 9 GB from the
additional memory calculation above.
Note: For CJK language indexes, or indexes that are predominantly multi-token,
these formulas should use a multiplier of 4 bytes instead of 3 bytes. In both of these
cases, a 350-million cell data source is supported by default.
See “Increasing the memory for the Enforce Server EDM indexer” on page 494.
Note: This result is added to the existing memory setting; it is not used to
replace the existing memory setting.
The *.vmoptions file accepts one JVM option per line. For example, you can specify
the following option in a file you save as RemoteEDMIndexer.vmoptions:
-Xmx11G
See “Overview of configuring memory and indexing the data source” on page 492.
To deploy the *.vmoptions file, copy it to the following locations:
For Linux: /opt/SymantecDLP/Protect/bin/RemoteEDMIndexer.vmoptions
For Windows: \SymantecDLP\Protect\bin\RemoteEDMIndexer.exe.vmoptions
See “Generating remote index files” on page 506.
The memory settings for a detection server are set in the Enforce Server console
at the Server Detail - Advanced Server Settings page, using the
BoxMonitor.FileReaderMemory. property. The format is -Xrs -Xms1200M –Xmx4G
Note: When you update this setting, only change the -Xmx value in this property.
For example, only change "4G." to a new value, and leave all other values the
same.
Detecting content using Exact Data Matching (EDM) 497
Memory requirements for EDM
The examples in Table 21-35 show the settings for five different situations.
Example 1: Single small index Memory required is: 2 million default settings
with 2 million cells to load * 14 bytes = 28 MB
These instructions assume that you have performed the necessary calculations.
To increase the memory for detection server processing
1 In the Enforce Server administration console, navigate to the Server Detail -
Advanced Server Settings screen for the detection server where the EDM
index is deployed or to be deployed.
2 Locate the following setting: BoxMonitor.FileReaderMemory.
3 Change the -Xmx4G value in the following string to match the calculations you
have made.
-Xrs -Xms1200M -Xmx4G -XX:PermSize=128M -XX:MaxPermSize=256M
For example: -Xrs -Xms1200M -Xmx11G -XX:PermSize=128M
-XX:MaxPermSize=256M
4 Save the configuration and restart the detection server.
To compute the RAM required to run your indexes, enter the following information:
1. Obtain the number of message chains from the MessageChain.NumChains
advanced server setting and enter that number into # of Message Chains.
2. Obtain the number of cells in each index (you can specify up to 10 indexes)
and enter that number into # of cells in Index.
Detecting content using Exact Data Matching (EDM) 500
Remote EDM indexing
When you change any value, the spreadsheet updates the Required RAM field.
The value in the Required RAM field is the amount of memory that is required to
run the indexes specified. See “Increasing the memory for the detection server (File
Reader)” on page 498. for information on updating the -Xmx parameter in the
BoxMonitor.FileReaderMemory setting.
Step 1 Install the Remote EDM See “About installing and running the Remote EDM Indexer and SQL
Indexer on a computer that Preindexer utilities” on page 503.
is not part of the Symantec
Data Loss Prevention
system.
Step 2 Create an Exact Data Profile On the Enforce Server, generate an EDM Profile template using the *.edm
on the Enforce Server to use file name extension and specifying the exact number of columns to be indexed.
with the Remote EDM
See “Creating an EDM profile template for remote indexing” on page 503.
Indexer.
Step 3 Copy the Exact Data Profile Download the profile template from the Enforce Server and copy it to the
file to the computer where remote data source host computer.
the Remote EDM Indexer
See “Downloading and copying the EDM profile file to a remote system”
resides.
on page 506.
Step 4 Run the Remote EDM If you have a cleansed data source file, use the RemoteEDMIndexer with the
Indexer and create the index -data, -profile and -result options.
files.
If the data source is an Oracle database, use the SqlPreindexer and the
RemoteEDMIndexer to index the data source directly with the -alias (oracle
DB host), -username and -password credentials, and the -query string or
-query_path
Step 5 Copy the index files from the Copy the resulting *.pdx and *.rdx files from the remote machine to the
remote machine to the Enforce Server host at C:\SymantecDLP\Protect\index.
Enforce Server.
See “Copying and loading remote index files to the Enforce Server” on page 509.
Step 6 Load the index files into the Update the EDM profile by loading the externally generated index.
Enforce Server.
Submit the profile for indexing.
See “Copying and loading remote index files to the Enforce Server” on page 509.
Step 7 Troubleshoot any problems Verify that indexing is started and completes.
that occur during the
Check the system events for Code 2926 ("Created Exact Data Profile" and
indexing process.
"Data source saved").
Step 8 Create policy with EDM You should see the column data for defining the EDM condition.
condition.
See “Configuring the Content Matches Exact Data policy condition” on page 464.
About installing and running the Remote EDM Indexer and SQL
Preindexer utilities
The Remote EDM Indexer is installed from the same installation program as the
other Symantec Data Loss Prevention components. The SQL Preindexer is installed
automatically when you install the Remote EDM Indexer. Both utilities are run from
the command line and are stored at /SymantecDLP/Protect/bin.
See “Generating remote index files” on page 506.
To install the Remote EDM Indexer, copy the ProtectInstaller.exe (Windows)
or the ProtectInstaller.sh (Linux) file to the remote computer where the data
to be indexed resides. When running the installer, choose to install the "Indexer"
only and no other components. The Linux installer for the Remote EDM Indexer is
a program that you run from the command console.
See “Installing the Remote EDM Indexer (Windows)” on page 515.
See “Installing the Remote EDM Indexer (Linux)” on page 516.
Both the Remote EDM Indexer and the SQL Preindexer run from the command
line. If you are on a Linux system, change users to the “protect” user before running
the SQL Preindexer. (The installation program creates the “protect” user.)
See “Generating remote index files” on page 506.
Note: For two- and three-tier Data Loss Prevention installations, you should not
install the Remote EDM Indexer on the same system that hosts a detection server.
Refer to the Symantec Data Loss Prevention Installatio Guide for more information.
10 Click Next to map the column headings from the data source to the profile.
11 In the Field Mappings section, map the Data Source Field to the System
Field for each column by selecting the column name from the System Field
drop-down list.
The Data Source Field lists the number of columns you specified at the
previous screen. The System Field contains a list of standard column headings.
If any of the column headings in your data source match the choices available
in the System Field list, map each accordingly. Be sure that you match the
selection in the System Field column to its corresponding numbered column
in the Data Source Field.
For example, for a data source that you have specified in the profile as having
three columns, the mapping configuration may be:
12 If a Data Source Field does not map to a heading value in the options available
from the System Field column, click the Advanced View link.
In the Advanced View the system displays a Custom Name column beside
the System Field column.
Enter the correct column name in the text box that corresponds to the
appropriate column in the data source.
Optionally, you can specify the data type for the Custom Name you entered
by selecting the data type from the Type drop-down list. These data types are
system-defined. Click the description link beside the Type name for details
on each system-defined data type.
13 If you intend to use the Exact Data Profile to implement a policy template that
contains one or more EDM rules, you can validate your profile mappings for
the template. To do this, select the template from the Check mappings against
policy template drop-down list and click Check now. The system indicates
any unmapped fields that the template requires.
14 Do not select any Indexing option available at this screen, since you intend
to index remotely.
15 Click Finish to complete the profile creation process.
Detecting content using Exact Data Matching (EDM) 506
Remote EDM indexing
Remote EDM Indexer with data source Specify data source file, EDM profile, Use when you have a cleansed data
file. output directory. source file; use for upgrading to DLP
14.0.
Remote EDM Indexer with SQL Query DB and pipe output to stdin of Requires Oracle DB and clean data.
Preindexer Remote EDM Indexer.
See “Remote indexing examples using
SQL Preindexer” on page 508.
For example:
RemoteEDMIndexer -data=C:\EDMIndexDirectory\CustomerData.dat
-profile=C:\EDMIndexDirectory\RemoteEDMProfile.edm
-result=C:\EDMIndexDirectory\
This command generates an EDM index using the local data source flat file
CustomerData.dat and the local RemoteEDMProfile.edm file that you generated
and copied from the Enforce Server to the remote host, where \EDMIndexDirectory
is the directory for placing the generated index files.
When the generation of the indexes is successful, the utility displays the message
"Successfully created index" as the last line of output.
In addition, the following index files are created and placed in the -result directory:
■ ExternalDataSource.CustomerData.pdx
■ ExternalDataSource.CustomerData.rdx
For example:
With this command the SQL Preindexer utility connects to the Oracle database and
runs the SQL query to retrieve name and salary data from the employee table. The
SQL Preindexer returns the result of the query to stdout (the command console).
The SQL query must be in quotes. The Remote EDM Indexer command runs the
utility and reads the query result from the stdin console. The Remote EDM Indexer
indexes the data using the ExportEDMProfile.edm profile as specified by the profile
file name and local file path.
When the generation of the indexes is successful, the utility displays the message
"Successfully created index" as the last line of output.
In addition, the utility places the following generated index files in the
EDMIndexDirectory -result directory:
■ ExternalDataSource.CustomerData.pdx
■ ExternalDataSource.CustomerData.rdx
Here is another example using SQL Preindexer and Remote EDM Indexer
commands:
As an alternative to the -query SQL string you can use the -query_path option and
specify the file path and name for the SQL query (*.sql). If you do not specify a
query or query path the entire DB is queried.
■ ExternalDataSource.<DataSourceName>.rdx.0 -
ExternalDataSource.<DataSourceName>.rdx.11
After you create the index files on a remote machine, the files must be copied to
the Enforce Server, loaded into the previously created remote EDM profile, and
indexed.
See “Creating an EDM profile template for remote indexing” on page 503.
To copy and load the files on the Enforce Server
1 Go to the directory where the index files were generated. (This directory is the
one specified in the -result option.)
2 Copy all of the index files with .pdx and .rdx extensions to the index directory
on the Enforce Server. This directory is located at
\SymantecDLP\Protect\Index (Windows) or /var/SyantecDLP/index (Linux).
3 From the Enforce Server administration console, navigate to the Manage >
Policies > Exact Data screen.
This screen lists all the Exact Data Profiles in the system.
4 Click the name of the Exact Data Profile you used with the Remote EDM
Indexer.
5 To load the new index files, go to the Data Source section of the Exact Data
Profile and select Load Externally Generated Index.
Detecting content using Exact Data Matching (EDM) 510
Remote EDM indexing
-alias Oracle DB connect string Specifies the database alias that is used to connect to the
database in the following format:
Required
@//oracle_DB_host:port/SID
For example:
-alias=@//myhost:1521/ORCL
-alias=@//localhost:1521/CUST
-driver Oracle JDBC driver class Specifies the JDBC driver class, for example:
oracle.jdbc.driver.OracleDriver.
-encoding Character encoding Specifies the character encoding of the data to index. The
(iso-8859-1) default is iso-8859-1.
-query SQL query This option specifies the SQL query to perform. The statement
must be enclosed in quotes.
If you omit the -query option the utility indexes the entire
database.
-query_path SQL script Specifies the file name and local path that contains a SQL
query to run. Must be full path.
-separator Output column separator Specifies whether the output column separator is a comma,
(tab) pipe, or tab. The default separator is a tab.
-subprotocol Oracle thin driver Specifies the JDBC connect string subprotocol (for example,
oracle:thin).
Required
-verbose Print verbose output for Displays a statistical summation of the operation when it is
debugging. complete.
If you are on Linux, change users to the “protect” user before running the Remote
EDM Indexer. (The installation program creates the “protect” user.)
The Remote EDM Indexer provides a command line interface. The syntax for running
the utility is as follows:
-data Data source to be indexed Specifies the data source to be indexed. If this option is not
(stdin) specified, the utility reads data from stdin.
Required if you use a flat file Required if using data source file and not the SQL Preindexer.
-encoding Character encoding of data Specifies the character encoding of the data to index. The
to be indexed (ISO-8859-1) default is ISO-8859-1.
-ignore_date Ignore expiration date of the Overrides the expiration date of the Exact Data Profile if the
EDM profile profile has expired. (By default, an Exact Data Profile expires
after 30 days.)
-profile File containing the EDM Specifies the Exact Data Profile to be used. This profile is the
profile one that is selected by clicking the “download link” on the
Exact Data screen in the Enforce Server management console
Required
Detecting content using Exact Data Matching (EDM) 513
Remote EDM indexing
-result Directory to place the Specifies the directory where the index files are generated.
resulting indexes
Required
-verbose Display verbose output Displays a statistical summation of the indexing operation
when the index is complete.
Index files not Use the -verbose option in the Specifying the verbose option when running the Remote EDM
generated command to reveal error Indexer provides a statistical summary of information about the
message. indexing operation after it completes. This information includes
the number of errors and where the errors occurred.
"Failed to create Verify file and path names. Verify that you included the full path and proper file name for
index" the -data file and the -profile file (*.edm). The paths must be
local to the host.
"Cannot compute
index"
"Unable to generate
index"
"Destination is not a Directory path not correct. Verify that you properly entered the full path to the destination
directory" directory for the required -result argument.
*.idx file instead Did not use -data argument The -data option is required if you are using a data source file
of *.rdx file and not the SQL Preindexer. In other words, the only time you
don't use the -data argument is when you are using the SQL
Preindexer.
If you run the Remote EDM Indexer without the -data option
and no SQL Preindexer query, you get an *.idx and *.rdx
file that cannot be used as for the EDM index. Rerun the index
using the -data option or a SQL Preindexer -query or
-query-path.
Detecting content using Exact Data Matching (EDM) 515
Remote EDM indexing
In addition, you may encounter errors when you index large amounts of data. Often
the set of data contains a data record that is incomplete, inconsistent, or incorrectly
formatted. Data rows that contain more columns than expected or incorrect data
types often cannot be properly indexed and are unrecognized during indexing. The
rows of data with errors cannot be indexed until those errors are corrected and the
Remote EDM Indexer rerun. Symantec provides a couple of ways to get information
about any errors and the ultimate success of the indexing operation.
To see the actual rows of data that the Remote EDM Indexer failed to index, modify
the Indexer.properties file.
To modify the Indexer.properties file and view remote indexing errors
1 Locate the Indexer.properties file at
\SymantecDLP\Protect\config\Indexer.properties (Windows) or
/opt/SymantecDLP/Protect/config/Indexer.properties (Linux).
cd /tmp
4 You may need to change permissions on the file before you can run the file. If
so, type:
5 Once the file permissions have been changed you can run the
ProtectInstaller_14.0.sh file, by typing:
./ProtectInstaller_14.0.sh -i console
Once the console mode installation launches, the Introduction step is displayed.
For most circumstances, it is recommended to use the defaults during
installation whenever possible. Press Enter to proceed to the next step.
6 At the Choose Install Set step, specify the component to install. To install the
Remote EDM Indexer, type the number beside the option and press Enter.
7 At the Install Folder step, type the absolute path to the directory where you
want to install the files. The default location can be selected by pressing Enter.
8 At the Pre-Installation Summary step, review the installation configuration
that you have selected. If you are satisfied with the selections, press Enter to
begin the installation. Or, type back and press Enter until you reach the step
you want to change.
9 When the installation completes, press Enter to close the installer.
The files to uninstall the Remote EDM Indexer are located in the root level of the
Symantec Data Loss Prevention installation directory. Follow this procedure to
uninstall the utility on Linux.
To remove a Remote EDM Indexer from the command line
1 Log on as root and change to the Uninstall directory by typing:
cd /opt/SymantecDLP/Uninstall
./Uninstall -i console
Ensure that the data source file contains at least one See “Ensure data source has at least one column of unique
column of unique data. data” on page 519.
Eliminate duplicate rows and blank columns before See “Cleanse the data source file of blank columns and
indexing. duplicate rows” on page 520.
To reduce false positives, avoid single characters, quotes, See “Remove ambiguous character types from the data
abbreviations, numeric fields with less than 5 digits, and source file” on page 521.
dates.
Understand multi-token indexing and clean up as See “Understand how multi-token cell matching functions”
necessary. on page 521.
Use the pipe (|) character to delimit columns in your data See “Do not use the comma delimiter if the data source
source. has number fields” on page 522.
Review an example cleansed data source file. See “Ensure that the data source is clean for indexing”
on page 523.
Map data source column to system fields to leverage See “Map data source column to system fields to leverage
validation during indexing. validation” on page 522.
Leverage EDM policy templates whenever possible. See “Leverage EDM policy templates when possible”
on page 523.
Include the column headers as the first row of the data See “Include column headers as the first row of the data
source file. source file” on page 523.
Check the system alerts to tune Exact Data Profiles. See “Check the system alerts to tune profile accuracy”
on page 524.
Use stopwords to exclude common words from matching. See “Use stopwords to exclude common words from
detection” on page 524.
Automate profile updates with scheduled indexing. See “Use scheduled indexing to automate profile updates”
on page 524.
Detecting content using Exact Data Matching (EDM) 519
Best practices for using EDM
Match on two or three columns in an EDM rule. See “Match on 3 columns in an EDM condition to increase
detection accuracy” on page 525.
Leverage exception tuples to avoid false positives. See “Leverage exception tuples to avoid false positives”
on page 526.
Use a where clause to detect records that meet a specific See “Use a WHERE clause to detect records that meet
criteria. specific criteria” on page 527.
Use the minimum matches field to fine tune EDM rules. See “Use the minimum matches field to fine tune EDM
rules” on page 527.
Consider using Data Identifiers in combination with EDM See “Combine Data Identifiers with EDM rules to limit the
rules. impact of two-tier detection” on page 527.
Include an email address field in the Exact Data Profile for See “Include an email address field in the Exact Data
profiled DGM. Profile for profiled DGM” on page 528.
Use profiled DGM for Network Prevent for Web identity See “Use profiled DGM for Network Prevent for Web
detection identity detection” on page 528.
The following data fields are usually unique: The following data fields are not unique:
■ Account number ■ First name
■ Bank Card number ■ Last name
■ Phone number ■ City
■ Email address ■ State
■ Social security number ■ Zip code
■ Tax ID number ■ Password
■ Drivers license number ■ PIN number
■ Employee number
■ Insurance number
Cleanse the data source file of blank columns and duplicate rows
The data source file should be as clean as possible before you create the EDM
index, otherwise the resulting profile may create false positives.
When you create the data source file, avoid including empty cells or blank columns.
Blank columns or fields count as “errors” when you generate the EDM profile. A
data source error is either an empty cell or a cell with the wrong type of data (a
name appearing in a phone number column). If the errors exceed the error threshold
percentage for the profile (by default, 5%), the system stops indexing and displays
an indexing error message.
The best practice is to remove blank columns and empty cells from the data source
file, rather than increasing the error threshold. Keep in mind that if you have many
empty cells, it may require a 100% error threshold for the system to create the
profile. If you specify 100% as the error threshold, the system indexes the data
source without checking for errors.
In addition, do not fill empty cells or blank fields with bogus data so that the error
threshold is met. Adding fictitious or "null" data to the data source file will reduce
the accuracy of the EDM profile and is strongly discouraged. Content you want to
monitor should be legitimate and not null.
See “About cleansing the exact data source file” on page 442.
See “Preparing the exact data source file for indexing” on page 449.
See “Ensure that the data source is clean for indexing” on page 523.
Detecting content using Exact Data Matching (EDM) 521
Best practices for using EDM
Single characters Single character fields should be eliminated from the data source file. These are
more likely to cause false positives, since a single character is going to appear
frequently in normal communications.
Abbreviations Abbreviated fields should be eliminated from the data source file for the same reason
as single characters.
Small numbers Indexing numeric fields that contain less than 5 digits is not recommended because
it will likely yield many false positives.
Dates Date fields are also not recommended. Dates are treated like a string, so if you are
indexing a date, such as 12/6/2007, the string will have to match exactly. The indexer
will only match 12/6/2007, and not any other date formats, such as Dec 6, 2007,
12-6-2007, or 6 Dec 2007. It must be an exact match.
Do not use the comma delimiter if the data source has number fields
Of the three types of column delimiters that you can choose from for separating the
fields in the data source file (pipe, tab, or comma), the pipe or tab (default) is
recommended. The comma delimiter is ambiguous and should not be used,
especially if one or more fields in your data source contain numbers. If you use a
comma-delimited data source file, make sure there are no commas in the data set
other than those used as column delimiters.
Note: Although the system also treats the pound sign, equals sign, plus sign,
semicolon, and colon characters as separators, you should not use these because
like the comma their meaning is ambiguous.
Include column headers as the first row of the data source file
When you extract the source data to the data source file, you should include the
column headers as the first row in the data source file. Including the column headers
will make it easier for you to identify the data you want to use in your policies.
Detecting content using Exact Data Matching (EDM) 524
Best practices for using EDM
The column names reflect the column mappings that were created when the exact
data profile was added. If there is an unmapped column, it is called Col X, where
X is the column number (starting with 1) in the original data profile.
If the Exact Data Profile is to be used for DGM, the file must have a column with a
heading of email, or the DGM will not appear in the Directory EDM drop-down list
(at the remediation page).
■ If you update your data sources occasionally (for example, less than once a
month), generally there is no need to create a schedule. Index the data each
time you update the data source.
■ Schedule indexing for times of minimal system use. Indexing affects performance
throughout the Symantec Data Loss Prevention system, and large data sources
can take time to index.
■ Index a data source as soon as you add or modify the corresponding exact data
profile, and re-index the data source whenever you update it. For example,
consider a scenario whereby every Wednesday at 2:00 P.M. you generate an
updated data source file. In this case you could schedule indexing every
Wednesday at 3:00 P.M., giving you enough time to cleanse the data source
file and copy it to the Enforce Server.
■ Do not index data sources daily as this can degrade performance.
■ Monitor results and modify your indexing schedule accordingly. If performance
is good and you want more timely updates, for example, schedule more frequent
data updates and indexing.
Consider using scheduled indexing with remote EDM indexing to keep an EDM
profile up to date. For example, you can schedule a cron job on the remote machine
to run the Remote EDM Indexer on a regular basis. The job can also copy the
generated index files to the index directory on the Enforce Server. You can then
configure the Enforce Server to load the externally generated index and submit it
for indexing on a scheduled basis.
See “About index scheduling” on page 443.
See “Scheduling Exact Data Profile indexing” on page 460.
See “Copying and loading remote index files to the Enforce Server” on page 509.
Consider the following example. You want to create an EDM policy condition based
on an Exact Data Profile that contains the following 5 columns of indexed data:
■ First Name
■ Last Name
■ Social security number (SSN)
■ Phone Number
■ Email Address
If you select all 5 columns to be included in the policy, consider the possible results
based on the number of fields you require for each match.
If you choose "1 of the selected fields" to match, the policy will undoubtedly generate
a large number of false positives because the record will not be unique enough.
(Even if the condition only matches the SSN field, there may still be false positives
because there are other types of nine-digit numbers that may trigger a match.).
If you choose "2 of the selected fields" to match, the policy will still produce false
positives because there are potential worthless combinations of data: First Name
+ Last Name, Phone Number + Email Address, or First Name + Phone Number.
If you choose to match on 4 or all 5 of the column fields, you will not be able to
exclude certain data field combinations because that option is only available for
matches on 2 or 3 fields.
See “Leverage exception tuples to avoid false positives” on page 526.
In this example, to ensure that you generate the most accurate match, the
recommendation is that you choose "3 of the selected fields to match." In this way
you can reduce the number of false positives while using one or more exceptions
to exclude the combinations that do not present a concern, such as First Name +
Last Name + Phone Number
Whatever number of fields you choose to match, ensure that you are including the
column with the most unique data, and that you are matching at least 2-column
fields.
EDM also allows more complex rules such as looking for N of M fields, but excluding
specified tuples. For example, this type of rule definition is required to identify
incidents in violation of state data privacy laws, such as California SB 1386, which
requires a first name and last name in combination with any of the following: SSN,
bank account number, credit card number, or driver's license number.
While exception tuples can help you reduce false positives, if you are using several
exception tuples, it may be a sign your index is flawed. In this case, consider redoing
your index so you do not have to use so many excluded combinations to achieve
the desired matches.
Combine Data Identifiers with EDM rules to limit the impact of two-tier
detection
When implementing EDM policies, it is recommended that you combine Data
Identifiers (DIs) rules with the EDM condition to form compound policies. As
reference, note that all system-provided policy templates that implement EDM rules
also implement Data Identifier rules in the same policy.
Data Identifiers and EDM are both designed to protect personally identifiable
information (PII). Including Data Identifiers with your EDM rules make your policies
more robust and reusable across detection servers because unlike EDM rules Data
Identifiers are executed on the endpoint and do not require two-tier detection. Thus,
Detecting content using Exact Data Matching (EDM) 528
Best practices for using EDM
if an endpoint is off the network, the Data Identifier rules can protect PII such as
SSNs.
Data Identifier rules are also useful to use in your EDM policies while you are
gathering and preparing your confidential data for EDM indexing. For example, a
policy might contain the US SSN Data Identifier and an EDM rule for as yet
unindexed or unknown SSNs.
Include an email address field in the Exact Data Profile for profiled
DGM
You must include the appropriate fields in the Exact Data Profile to implement
profiled DGM.
See “Creating the exact data source file for profiled DGM” on page 449.
If you include the email address field in the Exact Data Profile for profiled DGM and
map it to the email data validator, email address will appear in the Directory EDM
drop-down list (at the remediation page).
Use profiled DGM for Network Prevent for Web identity detection
If you want to implement DGM for Network Prevent for Web, use one of the profiled
DGM conditions to implement identity matching. For example, you may want to use
identity matching to block all web traffic for a specific users. For Network Prevent
for Web, you cannot use synchronized DGM conditions for this use case.
See “Creating the exact data source file for profiled DGM” on page 449.
See “Configuring the Sender/User based on a Profiled Directory condition”
on page 784.
Chapter 22
Detecting content using
Indexed Document
Matching (IDM)
This chapter includes the following topics:
Note: The Mac Agent is substantially the same as the Windows Agent, except that
the Mac Agent does not support two-tier detection, and different channels are
supported on the Mac Agent and Windows Agent. See “Overview of Mac agent
detection technologies and policy authoring features” on page 1780.
Partial file contents Match of discrete passages of extracted and normalized Detection server
file contents.
DLP Agent
See “Using IDM to detect exact and partial file contents”
on page 539.
Exact file Match is based on the binary signature of the file. Detection server
See “Using IDM to detect exact files” on page 538. DLP Agent
Exact file contents Match is an exact match of the extracted and normalized Detection server
file contents.
Note: Symantec recommends
See “Using IDM to detect exact and partial file contents” that you use partial file contents
on page 539. matching rather than exact file
contents matching.
Agent IDM The DLP Agent supports partial contents matching in See “Agent IDM detection”
addition to exact file matching locally on the endpoint. on page 531.
Server IDM The detection server performs exact file matching, exact See “Server IDM detection”
file contents matching, and partial file contents matching. on page 532.
Two-tier IDM The DLP Agent sends the data to the detection server for See “Two-tier IDM detection”
policy evaluation. on page 532.
Agent IDM is enabled by default for a newly installed Endpoint Server. Agent IDM
for Windows is disabled when you upgrade from 12.5 or earlier to 14.0, or from
12.5 to 14.6. Agent IDM for macOS is enabled by default for newly installed Endpoint
Servers, but disabled if you upgrade. In the case of all upgrades except Agent IDM
for Windows from 14.x to 14.6, if you want to use agent IDM you must enable it and
reindex your IDM profiles so that the endpoint index is generated and made available
for download by DLP Agents.
If you use two-tier detection for IDM on the Windows endpoint, make sure that you
understand the performance implications of two-tier detection.
See “Two-tier detection for DLP Agents” on page 372.
the Indexed Document Profile, you have the option of indexing the document
source immediately on save of the profile or at a scheduled time. However, you
must index the document source before you can detect policy violations.
See “Creating and modifying Indexed Document Profiles” on page 547.
For example, consider a scenario where you want to create an IDM index to detect
when exact versions of certain documents are found, or when passages or sections
of the documents are exposed. When you define the Indexed Document Profile,
you can upload the documents to the Enforce Server, or you can index the
documents using the Remote IDM Indexer. You can also use file name and file size
filters in the document profile to include or ignore certain files during indexing.
The number of documents you can index has increased to up to 1,000,000 on the
Server and up to 30,000 on the Agent. These values are based on initial default
limits of 2 GB/60 MB. You can change the 60 MB limit on the Configure Partial
Matching page. While it is possible to reconfigure the 2 GB limit by changing the
size of com.vontu.profiles.documents.maxIndexSize in
\SymantecDLP\Protect\config\indexer.properties, Symantec recommends
that you contact Symantec Support before reconfiguring properties files.
During indexing, the system stores the document source by changing
\SymantecDLP\Protect\documentprofiles (on Windows) or
/var/SymantecDLP/documentprofiles (on Linux). After indexing, for security
purposes the system deletes the document source files that you have uploaded to
the Enforce Server.
The result of the indexing process is four separate indexes: one for detection servers
(the server index) and three for DLP Agents (the endpoint indexes). All indexes are
generated regardless of whether or not you are licensed for Endpoint Prevent or
Endpoint Discover. On the Enforce Server, the system stores the indexes in
\SymantecDLP\Protect\index (on Windows) or /var/SymantecDLP/index (on
Linux).
See “About the server index files and the agent index files” on page 535.
For most IDM deployments there is no need to configure the indexer. If necessary
you can configure key settings for the indexer using the file
\SymantecDLP\Protect\config\Indexer.properties.
Note: Symantec recommends that you contact Symantec Support for guidance if
you decide to modify a properties file. Modifying properties incorrectly can cause
serious issues with the operation of Symantec Data Loss Prevention.
WebDAV provides extensions to the HTTP 1.1 protocol that enable collaborative
editing and management of files that are stored on remote web servers. You can
index such documents remotely by exposing them to the Enforce Server using
WebDAV. For example, you can use the remote SMB option with a UNC address
and a WebDAV client to index Microsoft SharePoint or OpenText Livelink documents.
See “Using the remote SMB share option to index SharePoint documents”
on page 556.
Note: To index documents on a SharePoint server using the Remote SMB Share
option, you must deploy the Enforce Server to a supported Windows Server
operating system host. Data Loss Prevention depends on Windows NTLM services
to mount a WebDAV server.
About the server index files and the agent index files
When you create an Indexed Document Profile and index a document data source,
the system generates four index files, one for the server and three for the endpoint.
The indexes are generated regardless of whether or not you are licensed for a
particular detection server or the DLP Agent.
See “About index deployment and logging” on page 536.
The server index is a binary file named DocSource.rdx. The server index supports
exact file, exact file contents, and partial file contents matching. If the document
data source is large, the server index may span multiple *.rdx files.
The endpoint index is comprised of one secure binary file, either
EndpointDocSource.rdx or LegacyEndpointDocSource.rdx for backward
compatibility with 14.0 and 12.5 Agents. The endpoint index supports exact file and
partial file contents matching. EncryptedDocSource.rdx is for endpoint partial
matching.
See “Supported forms of matching for IDM” on page 530.
To create the index entries for exact file and exact file contents matching, the system
uses the MD5 message-digest algorithm. This algorithm is a one-way hash function
that takes as input a message of arbitrary length and produces as output a 128-bit
message-digest or "fingerprint" of the input. If the message input is a text-based
document that the system can extract contents from, such as a Microsoft Word file,
the system extracts all of the file content, normalizes it by removing whitespace,
punctuation, and formatting, and creates a cryptographic hash. Otherwise, if the
message input is a file that the system cannot extract the contents from, such as
an image file, small file, or unsupported file type, the system creates a cryptographic
hash based on the binary signature of the file.
Detecting content using Indexed Document Matching (IDM) 536
Introducing Indexed Document Matching (IDM)
Note: To improve accuracy across different versions of the Enforce Server and DLP
Agent, only binary matching MDF is supported on the agent, whether or not the file
contains text.
Table 22-3 Types of matching supported by the endpoint and server indexes
Binary file, custom file, A single cryptographic hash based Exact file binary DocSource.rdx
small file, encapsulated on the binary signature of the file
EndpointDocSource.rdx
file
LegacyEndpointDocSource.rdx
Agent only: Text-based
file that the system can
extract the contents
from.
access memory (RAM) when an active IDM policy that references that index is
deployed to that detection server.
The system deploys the endpoint index (either EndpointDocSource.rdx or
LegacyEndpointDocSource.rdx) to each designated Endpoint Server. When a
DLP Agent connects to the Endpoint Server, the DLP Agent downloads the endpoint
index. Assuming agent IDM is enabled, the DLP Agent loads the endpoint index
into memory when the index is required by an active local policy.
See “Estimating endpoint memory use for agent IDM” on page 564.
You cannot manually deploy either the server or endpoint index files by copying
the *.rdx file or files from the Enforce Server to a detection server. The detection
server does not monitor the index destination folder for new index files; the detection
server must be notified by the Enforce Server that an index has been deployed. If
a detection server is offline during the index deployment process, the Enforce Server
stops trying to deploy the index. When the detection server comes back online the
Enforce Server deploys the index to the detection server. The same is true for DLP
Agents. There is no way to manually copy the endpoint index to the endpoint host
and have the DLP Agent recognize the index.
Table 22-4 summarizes how IDM indexes are deployed and the logs files to check
to troubleshoot index deployment.
File format from which the Proprietary or non-supported If the system cannot extract the contents from the file
system cannot extract the document format format, you can use IDM to detect that specific file
contents using exact binary matching.
Binary file GIF, MPG, AVI, CAD design, You can use IDM to detect binary file types from
JPEG files, audio/video files which you cannot extract the contents, such as
images, graphics, JPEGs, etc. Binary file detection
is not supported on stream-based channels.
File containing a small CAD files and Visio diagrams A file containing a small amount of text is treated as
amount of text a binary file even if the contents are text-based and
can have their contents extracted.
Encapsulated file Any file that is encapsulated when If a document data source file is encapsulated in an
indexed (even if text-based and archive file, the file contents of the subfile cannot be
can have their contents extracted and only the binary signature of the file can
extracted); for example, Microsoft be fingerprinted. This does not apply to document
Word file archived in a ZIP file archive that are indexes.
cases, match even if there are some minor differences between the scanned file
and the indexed file.
The system does not consider the file format or file size when creating the
cryptographic hash for the index or when checking for an exact file contents match
against the index. A document might contain much more content, but the system
detects only the file contents that are indexed as part of the Indexed Document
Profile. For example, consider a situation where you index a one-page document,
and that one-page document is included as part of a 100-page document. The
100-page document is considered an exact match because its content matches
the one-page document exactly.
See “About the server index files and the agent index files” on page 535.
For text-based files from which you can extract the contents, in addition to creating
the MD5 fingerprint for exact file contents matching, the system uses a rolling hash
algorithm to register discrete sections or passages of content. In this case the
system uses a selection method to store hashed sections of content; not all text is
hashed in the index. The index does not contain actual document content.
Table 22-6 lists the requirements to match file contents using IDM.
Requirement Description
File formats from The system must be able to extract the the file format and extract file content. Data Loss
which you can extract Prevention supports context extraction for over 100 file types.
the contents
See “Supported formats for content extraction” on page 806.
Unencapsulated file To match file contents, the source file cannot be encapsulated in an archive file when the
source file is indexed. If a file in the document source is encapsulated in an archive file, the
system does not index the file contents of the encapsulated file. Any encapsulated file is
considered for exact matches only, like image files and other unsupported file formats.
See “Do not compress files in the document source” on page 567.
Note: The exception to this is the main ZIP file that contains the document data source, for
those upload methods that use an archive file. See “Creating and modifying Indexed Document
Profiles” on page 547.
Detecting content using Indexed Document Matching (IDM) 541
Introducing Indexed Document Matching (IDM)
Requirement Description
Minimum amount of For exact file contents matching, the source file must contain at a minimum 50 characters of
text normalized text before the extracted content is indexed. Normalization involves the removal
of punctuation and whitespace. A normalized character therefore is either a number or a letter.
This size is set by the min_normalized_size=50 parameter in the file
\SymantecDLP\Protect\config\Indexer.properties. If file contains less than 50
normalized characters, the system performs an exact file match against the file binary.
Note: Symantec advises that you consult with Symantec Support for guidance if you need to
change an advanced setting or edit a properties file. Incorrectly updating a properties file can
have unintended consequences.
For partial file contents matching, there must be at least 300 normalized characters. However,
the exact length is variable depending on the file contents and encoding.
Maximum amount of The default maximum size of the document that can be processed for content extraction at
text run-time is 30,000,000 bytes. If your document is over 30,000,000 bytes you need to increase
the default maximum size in Advanced server settings. Contact Symantec Support for
assistance when changing Advanced server settings, to avoid any unintended consequences.
Table 22-7 describes the matching supported by the Content Matches Document
Signature From policy condition.
Table 22-7 Minimum document exposure settings for the IDM condition
Exact file matching File contents All of the extracted and Microsoft Word
normalized file contents, if
See “Using IDM to detect
the file is text-based and
exact and partial file
from which the content is not
contents” on page 539.
extractable
Exact content matching The endpoint performs Microsoft Word, JPG, MP3
binary matching on all files.
Partial content matching File contents Discrete passages of text Microsoft Word
Note: White listing only applies to partial file contents matching; it does not apply
to exact file contents matching. The white listing file is not checked at run-time when
the system computes the cryptographic hashes for exact file contents matching.
Detecting content using Indexed Document Matching (IDM) 543
Configuring IDM profiles and policy conditions
1 Identify the content you want to protect and See “Using IDM to detect exact and partial file contents”
collect the documents that contain this on page 539.
content.
See “Using IDM to detect exact files” on page 538.
2 Prepare the documents for indexing. See “Preparing the document data source for indexing”
on page 543.
3 Whitelist headers, footers, and boilerplate See “White listing file contents to exclude from partial
text. matching” on page 545.
4 Create an Indexed Document Profile and See “Creating and modifying Indexed Document Profiles”
specify the document source. on page 547.
5 Configure any document source filters. See “Filtering documents by file name” on page 559.
6 Schedule indexing as necessary. See “Scheduling document profile indexing” on page 561.
7 Configure one ore more IDM policy conditions See “Configuring the Content Matches Document Signature
or exceptions. policy condition” on page 564.
8 Test and troubleshoot your IDM See “Troubleshooting policies” on page 423.
implementation.
1 Collect all of the documents Collect all of the documents you want to index and put them in a folder.
you want to protect.
See “About the document data source” on page 533.
2 Uncompress all the files you The files you index should be in their unencapsulated, uncompressed state.
want to index. Check the document collection to make sure none of the files are
encapsulated in an archive file, such as ZIP, TAR, or RAR. If a file is
embedded in an archive file, extract the source file from the archive file and
remove the archive file.
See “Using IDM to detect exact and partial file contents” on page 539.
3 Separate the documents if To protect a large amount of content and files, create separate collections
you have more than for each set of documents over 1,000,000 files in size, with all files in their
1,000,000 files to index. unencapsulated, uncompressed state. For example, if you have 15,000,000
documents you want to index, separate the files by folders, one folder
containing 750,000 files, and another folder containing the remaining 750,000
files. or, you can change the value of
com.vontu.profiles.documents.maxIndexSize in the
Indexer.properties to accommodate larger data sets. The rule of thumb is
2 GB/1 million documents.
See “Create separate profiles to index large document sources” on page 571.
4 Decide how you are going to The indexing process is a separate process that runs on the Enforce Server.
make the document source To index the document source you must make the files accessible to the
files available to the Enforce Enforce Server. You have several options. Decide which one works best
Server. for your needs and proceeding accordingly.
See “Using the remote SMB share option to index file shares” on page 555.
5 Configure the document The next step is to configure the document profile, or, alternatively, if you
profile. want to exclude specific document content from detection, whitelist it.
See “White listing file contents to exclude from partial matching” on page 545.
Detecting content using Indexed Document Matching (IDM) 545
Configuring IDM profiles and policy conditions
1 Copy the content you want to Copy only noncritical content you want to exclude, such as standard
exclude from matching into a text boilerplate text and document headers and footers, to the text file. By
file. default, for file contents matching the file to be indexed must contain
at least 300 characters. This default setting applies to the
Whitelisted.txt file as well. For whitelisted text you can change
this default setting.
2 Save the text file as The Whitelisted.txt file is the source file for storing content you
Whitelisted.txt. want to exclude from matching.
4 Configure the Indexed When you index the document data source, the Enforce Server looks
Document Profile and generate for the Whitelisted.txt file. If the file exists, the Enforce Server
the index. copies it to Whitelisted.x.txt, where x is a unique identification
number corresponding to the Indexed Document Profile. Future
indexing of the profile uses the profile-specific Whitelisted.x.txt
file, not the generic Whitelisted.txt file.
Action Description
Add IDM profile Click Add Document Profile to create a new Indexed Document Profile.
Edit IDM profile Click the name of the Document Profile, or click the pencil icon to the far right of the profile, to
modify an existing Document Profile.
Remove IDM profile Click the red X icon next to the far right of the document profile row to delete that profile from
the system. A dialog box confirms the deletion.
Note: You cannot edit or remove a profile if another user currently modifies that profile, or if a
policy exists that depends on that profile.
Refresh IDM profile Click the refresh arrow icon at the upper right of the Indexed Documents screen to fetch the
status latest status of the indexing process. If you are in the process of indexing, the system displays
the message "Indexing is starting." The system does not automatically update the screen when
the indexing process is complete.
Column Description
Column Description
Detection server The name of the detection server that indexes the Document Profile and the Document Profile
version.
Click the triangle icon beside the Document Profile name to display this information. It appears
beneath the name of the Document Profile.
Location The location of the file(s) on the Enforce Server that the system has profiled and indexed.
Documents The number of documents that the system has indexed for the document profile.
Status The current status of the document indexing process, which can be any of the following:
In addition, beneath the status of the indexing process, the system displays the status of each
detection server, which can be any of the following:
Error messages The Indexed Document screen also displays any error messages in red (for example, if the
document profile is corrupted or does not exist).
1 Navigate to the screen Manage You must be logged on to the Enforce Server administration console
> Data Profiles > Indexed as an administrator or policy author.
Documents.
See “Policy authoring privileges” on page 347.
2 Click Add Document Profile. Select an existing Indexed Document Profile to edit it.
3 Enter a Name for the Document Choose a name that describes the data content and the index type
Profile. (for example, "Research Docs IDM"). The name is limited to 255
characters.
4 Select the Document Source Select one of the five options for indexing the document data source,
method for indexing. depending on how large your data source is and how you have
packaged it.
The Remote IDM Indexer is a standalone tool that lets you index
your confidential documents and files locally on the systems where
these files are stored. See Remote IDM Indexing See “About the
Remote IDM Indexer” on page 573. for more information.
■ See “Using the remote SMB share option to index SharePoint
documents” on page 556.
Detecting content using Indexed Document Matching (IDM) 550
Configuring IDM profiles and policy conditions
5 Optionally, configure any Filters. You can specify file name and file size filters in the document profile.
The filters tell the system which files to include or ignore during
indexing.
Enter files to include in the File Name Include Filters field, or enter
files to exclude in the File Name Exclude Filters field.
Select file sizes to ignore, either Ignore Files Smaller Than or Ignore
Files Larger Than.
6 Select one of the Indexing As part of creating a document profile, you can set up a schedule for
options. indexing the document source.
You do not have to select an indexing option to create a profile that
you can reference in a policy, but you must select an indexing option
to generate the index and actually detect matches using an IDM policy.
4 Click Save.
Note: The sum of all deployed profiles on the endpoint
cannot exceed the value of Endpoint Total Profile
Size (MB), which is set to a default 60 MB. To change
this value, enter a different value in the Endpoint Total
Profile Size (MB) box.
Table 22-15 Requirements for using the Upload Document Archive to Server
Now option
Requirement Description
ZIP file only The document archive must be a ZIP file; no other encapsulation formats are supported
for this option.
50 MB or less You cannot use this option if the document archive ZIP file is more than 50 MB because
files exceeding that size limit can take too long to upload and slow the performance of the
Enforce Server. If the document archive ZIP file is over 50 MB, use the Reference Archive
on Enforce Server method instead.
UTF-8 file names only The IDM indexing process fails (and presents you with an "unexpected error") if the
document archive (ZIP file) contains non-ASCII file names in encodings other that UTF-8.
If the ZIP file contains files with non-ASCII file names, use one of the following options
instead to make the files available to the Enforce Server for indexing:
Note: If the ZIP file is less than 50 MB, you can use the Upload Document Archive
to Server Now option instead. See “Uploading a document archive to the Enforce
Server” on page 551.
To use the Reference Archive on Enforce Server option, you copy the ZIP file to
the \SymantecDLP\Protect\documentprofiles folder on the Enforce Server file
system host. Once you have copied the ZIP file to the Enforce Server, you can
select the document source from the pull-down menu at the Add Document Profile
screen. See “Creating and modifying Indexed Document Profiles” on page 547.
To reference the document archive on the Enforce Server describes the procedure
for using the Reference Archive on Enforce Server option.
To reference the document archive on the Enforce Server
1 Copy the ZIP file to the Enforce Server.
■ On Windows, copy the ZIP file to directory
\SymantecDLP\Protect\documentprofiles
Note: The system deletes the document data source file after the indexing
process completes.
Table 22-16 Requirements to use the option Reference Archive on Enforce Server
Requirement Description
ZIP file only The document archive must be a ZIP file; no other encapsulation formats are supported
for this option.
The ZIP file can be at the most 2 GB. Consider using a third-party solution (such as Secure
FTP), to copy the ZIP file securely to the Enforce Server.
subfile not archived Make sure the subfiles are proper and not encapsulated in an archive (other than the
top-level profile archive).
See “Do not compress files in the document source” on page 567.
UTF-8 file names only Do not use this method if any of the names of the files you are indexing contain non-ASCII
file names.
Use either of the following options instead:
■ Use the Remote IDM Indexer. See xref to Remote IDM Indexer chapter.
■ Use Local Path on Enforce Server
See “Using local path on Enforce Server” on page 554.
■ Use Remote SMB Share
See “Using the remote SMB share option to index file shares” on page 555.
Note: If the files you index include a file that is more than 2 GB in size, the system
indexes all the files except the 2 GB file. This only applies to the Use Local Path
on Enforce Server option. It does not apply to the Reference Archive on Enforce
Server option.
Note: Symantec Data Loss Prevention does not delete documents after indexing
when you use the Use Remote SMB Share option.
Note: To index documents on a SharePoint server using the Remote SMB Share
option, you must deploy the Enforce Server to a supported Windows Server
operating system host. Data Loss Prevention depends on Windows NTLM services
to mount a WebDAV server.
Table 22-17 provides the procedure for remotely indexing SharePoint documents
using WebDAV
1 Enable WebDAV for See “Enabling WebDAV for Microsoft IIS” on page 557.
SharePoint.
2 Start the WebClient service. From the computer where the Enforce Server is installed, start the WebClient
service using the "Services" console. If this service is "disabled," right-click it
and select Properties. Enable the service, set it to Manual, then Start it.
Note: You must have administrative privileges to enable this service.
3 Access the SharePoint From the computer where your Enforce Server is installed, access SharePoint
instance. using your browser and the following address format:
http://<server_name>:port
5 Locate the documents to In SharePoint, navigate to the documents you want to scan. Often SharePoint
scan. documents are stored at the Home > Shared Documents screen. Your
documents may be stored in a different location.
Detecting content using Indexed Document Matching (IDM) 557
Configuring IDM profiles and policy conditions
6 Find the UNC path for the In SharePoint for the documents you want to scan, select the option Library
documents. > Open with Explorer. Windows Explorer should open a window and display
the documents. Look in the Address field for the path to the documents. This
address is the UNC path you need to scan the documents remotely. For
example: \\protect-x64\Shared Documents. Copy this path to the
Clipboard or a text file.
7 Create the IDM Index. See “Creating and modifying Indexed Document Profiles” on page 547.
9 Verify success. At the Manage > Data Profiles > Indexed Documents screen you should see
that the index was successfully created. Check the "Status" and the number
of documents indexed. If the index was successfully created you can now use
it to create IDM policies.
Filter Description
File Name Include Filters If the File Name Include Filters field is empty, matching is performed on all documents
in the document profile. If you enter anything in the File Name Include Filters field, it is
treated as an inclusion filter. In this case the document is indexed only if it matches the
filter you specify.
For example, if you enter *.docx in the File Name Include Filters field, the system
indexes only the *.docx files in the document source.
File Name Exclude Filters The Exclude Filters field lets you specify the documents to exclude in the matching
process.
If you leave the Exclude Filters field empty, the system performs matching on all
documents in the ZIP file or file share. If you enter any values in the field, the system
scans only those documents that do not match the filter.
The system treats forward slashes (/) and backslashes (\) as equivalent. The system
ignores whitespace at the beginning or end of the pattern. File name filtering does
not support escape characters, so you cannot match on literal question marks,
commas, or asterisks.
Table 22-19 describes the syntax accepted by the File Name Filters feature. The
syntax for the Include and Exclude filters is the same.
Operator Description
Table 22-20 provides sample filters and descriptions of behavior if you enter them
in the File Name Include Filters field:
*.txt,*.docx The system indexes only .txt and .docx files in the ZIP file or file share, ignoring
everything else.
?????.docx The system indexes files with the .docx extension and files with five-character
names, such as hello.docx and stats.docx, but not good.docx or
marketing.docx.
*/documentation/*,*/specs/* The system indexes only files in two subdirectories below the root directory, one
called "documentation" and the other called "specs."
Example with wildcards and IDM indexing fails or ignores the filter setting if the File Name Includes / Excludes
sub-directories: filter string starts with an alphanumeric character and includes a wildcard, for
example: l*.txt. The workaround is to configure the include/exclude filter with
*\scan_dir\l*.txt
the filter string as indicated in this example, that is, *\scan_dir\l*.txt.
For example, the filter 1*.txt does not work for a file path
\\dlp.symantec.com\scan_dir\lincoln-LyceumAddress.txt. However,
if the filter is configured as *\scan_dir\l*.txt, the indexer acknowledges the
filter and index the file.
Filter Description
Ignore Files Smaller Than To exclude files smaller than a particular size:
■ Enter a number in the field for Ignore Files Smaller Than.
■ Select the appropriate unit of measure Bytes, KB (kilobytes), or MB (megabytes)
from the drop-down list.
For example, to prevent indexing of files smaller than one kilobyte (1 KB), enter 1 in
the field and select KB from the corresponding drop-down list.
Ignore Files Larger Than To exclude files larger than a particular size:
For example, to prevent indexing of files larger than two megabytes (2 MB), enter 2
in the field and select MB from the corresponding drop-down list.
Note: The Enforce Server can index only one document profile at a time. If one
indexing process is scheduled to start while another indexing process is running,
the new process does not begin until the first process completes.
Parameter Description
Index Once On – Enter the date to index the document profile in the format MM/DD/YY. You can also click
the date widget and select a date.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing
should stop. You can also click the date widget and select a date.
Detecting content using Indexed Document Matching (IDM) 562
Configuring IDM profiles and policy conditions
Parameter Description
Index Weekly Day of the week – Select the day(s) to index the document.
At – Select the hour to start indexing.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing
should stop. You can also click the date widget and select a date.
Index Monthly Day – Enter the number of the day of each month you want the indexing to occur. The number
must be 1 through 28.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing
should stop. You can also click the date widget and select a date.
low_threshold_k=50
Detecting content using Indexed Document Matching (IDM) 563
Configuring IDM profiles and policy conditions
4 Change the numerical portion of the parameter value to reflect the wanted
minimum number of characters that are allowed in Whitelisted.txt.
For example, to change the minimum to 30 characters, modify the value to
look like the following:
low_threshold_k=30
The value for this parameter must match the min_normalized_size value.
The default for min_normalized_size is 50.
5 Save the file.
For more information on IDM configuration and customization, see the article
"Understanding IDM configuration and customization" at
http://www.support.symantec.com/doc/TECH234899 at the Symantec Support
Center.
Table 22-23 Advanced agent settings for exact match IDM on the endpoint
Action Description
Choose a percentage between 10% and 90% to match document contents partially.
Select the components to Select one of the available message components to match on:
Match On.
■ Body – The content of the message.
■ Attachments – Any files that are attached to or transferred by the message.
Configure additional Select this option to create a compound condition. All conditions must be met to trigger or
conditions to Also Match. except a match.
You can Add any available condition from the drop-down menu.
Test and tune the policy. See “Test and tune policies to improve match accuracy” on page 430.
See “Use parallel IDM rules to tune match thresholds” on page 572.
Consideration Description
Reindex IDM profiles after upgrade. See “Reindex IDM profiles after major upgrade”
on page 567.
Do not compress documents whose content you want to See “Do not compress files in the document source”
fingerprint. on page 567.
Prefer partial matching over exact matching on the DLP See “Prefer partial matching over exact matching on the
Agent. DLP Agent” on page 568.
Do not index text-based documents without content. See “Do not index empty documents” on page 568.
Be aware of the limitations of exact matching. See “Understand limitations of exact matching” on page 568.
Use white listing to exclude partial file contents from See “Use white listing to exclude non-sensitive content
matching and reduce false positives. from partial matching” on page 569.
Filter non-critical documents from indexing to reduce false See “Filter documents from indexing to reduce false
positives. positives” on page 570.
Change the index max size to index more than 1,000,000 See “Create separate profiles to index large document
documents. sources” on page 571.
Use remote indexing for large document sets. See “Remote IDM indexing” on page 573.
Use scheduled indexing to automate profile updates. See “Use scheduled indexing to keep profiles up to date”
on page 572.
Use multiple IDM rules in parallel to establish and tune See “Use parallel IDM rules to tune match thresholds”
match thresholds. on page 572.
Detecting content using Indexed Document Matching (IDM) 567
Best practices for using IDM
Note: This behavior has not been observed with XLSX files; that is, false positives
do not get created if the blank files are different.
See “Using IDM to detect exact and partial file contents” on page 539.
■ Some file formats change the byte size of a file if the file is opened by the native
application and then saved without changes, resulting in the file not matching
exactly. For example, if you open a file such as a JPEG image with Windows
Picture and Fax Viewer and save the file without making changes, the binary
size of the file is nonetheless changed, resulting in no exact match.
■ For some applications the Windows Print operation may alter the file data such
that extracted file contents does not match exactly. Known file types that are
affected by this include Microsoft Office documents.
Table 1 lists some known limitations with exact content matching. This list is not
exhaustive and there may be other file formats that change on resave.
so that this text is excluded when the server index is generated. If you use white
listing, generally you can lower the Minimum Document Exposure setting in the
policy without increasing false positives because more of the content indexed is
confidential data, instead of common, repeated content.
Note: White listing does not apply to exact file or exact file contents matching.
Note: White listing is not available for exact file or file contents matching; it is only
available for partial content matching.
IDM Use
Configuration
See “Use white listing to exclude non-sensitive content from partial matching” on page 569.
See “Filter documents from indexing to reduce false positives” on page 570.
A document might contain much more content, but Symantec Data Loss Prevention
protects only the content that is indexed as part of a document profile. For example,
consider a situation where you index a one-page document, and that one-page
document is included as part of a 100-page document. The 100-page document is
considered an exact match because its content matches the one-page document
exactly. In addition, the matched document does not have to be of the same file
type or format as the indexed document. For example, if you index a Word document
as part of a document profile, and its contents are pasted into the body of an email
message or used to create a PDF, the engine considers it a match
A rule-of-thumb for setting the Minimum Document Exposure setting is 60%.
Minimum Document Exposures set to less than 50% typically create many false
positives. Starting with rate of 60% should give you enough information to determine
whether you should go to a higher or lower match percentage without creating
excessive false positives
As an alternative, consider taking a tiered approach to establishing Minimum
Document Exposure settings. For example, you can create multiple IDM rules, each
with a different threshold percentage, such as 80% for documents with a high match
percentage, 50% for documents with a medium match percentage, and 10% with
a low match percentage. Using this approach helps you filter out false positives
and establish an accurate Minimum Document Exposure setting for each IDM index
you deploy as part of your policies.
You can integrate the tool with external systems to schedule indexing. In addition,
you can incrementally index a data source by specifying an existing *.prdx file
when you run the tool.
Feature Description
Note: The Indexer includes both the Remote IDM Indexer and the Remote
EDM Indexer. See the Symantec Data Loss Prevention Administration Guide
for details on using the Remote EDM Indexer.
Platform Installer
Linux ProtectInstaller64_15.0.sh
Windows ProtectInstaller64_15.0.exe
GUI RemoteIDMIndexerUI.exe
Indexing the document data source using the GUI edition (Windows
only)
To configure the UI edition of the Remote IDM Indexer, you enter the parameters
into the required fields. Optionally you can provide additional parameters, such as
a whitelist file for filters.
On successful completion of indexing, the preindex file (*.prdx) is generated. You
move this file to the Enforce Server to complete the indexing process.
Detecting content using Indexed Document Matching (IDM) 576
Remote IDM indexing
Figure 22-1 shows the GUI edition of the Remote IDM Indexer.
Table 22-31 provides instructions for configuring the GUI edition of the Remote
IDM Indexer.
Table 22-31 Configuring the Remote IDM Indexer using the GUI edition
1 Enter the Source URI path. The source URI is the local file path (directory folder) where the files to be
indexed are stored, or a shared file system path accessible by the host.
If the document data source requires credentials you provide them in the
URI Credentials section.
2 Enter the Output File Specify the file path and name for the preindex file that the tool generates.
name.
Include the *.prdx file extension when specifying the output file name.
3 Optionally, enter the Specify the file path to the whitelist.txt file.
Whitelist File path.
Text in the whitelist file is ignored during detection for server-based partial
matching.
See the Symantec Data Loss Prevention Administration Guide for details on
white listing.
4 Optionally, enter one or Enter one or more file names to include for indexing or to exclude for indexing.
more File Name Filters.
The File Name Include Filter includes the named files for indexing.
The File Name Exclude Filter excludes the named files from indexing.
The format for the include and exclude filters accepts both comma-separated
and newline-separated values.
If you use a filter, use one type but not both. For example, if you choose to
use a file name include filter, do not also provide a file name exclude filter.
See the Symantec Data Loss Prevention Administration Guide for details on
white listing.
5 Optionally, enter a File Size If you choose Ignore Files Smaller Than, files under the specified size are
Filter. not indexed.
If you choose Ignore Files Larger Than, files over the specified size are not
indexed.
See the Symantec Data Loss Prevention Administration Guide for details.
6 Click Run to index the data When you click Run the indexing process begins.
source immediately.
Alternatively, you can click Schedule to schedule indexing. The tool opens
the Windows Task Utility.
Table 22-31 Configuring the Remote IDM Indexer using the GUI edition
(continued)
7 Enter the Password for the For security purposes you must provide a password for the preindex file.
preindex file.
The password must meet the one of the following requirements:
The password you enter here is required to load the preindex into the Enforce
Server for indexing
8 Verify indexing Progress. When you click Run, the status bar shows the scanning completion
percentage.
Current File: The name of the file that is currently being indexed.
Caution: If you run the tool from the command line with arguments, those arguments
overwrite the parameters in the properties file.
Detecting content using Indexed Document Matching (IDM) 579
Remote IDM indexing
Table 22-34 lists and describes required parameters for running the Remote IDM
Indexer from the command line.
Note: Refer to the Symantec Data Loss Prevention Administration Guide for details
on preparing the document data source for indexing.
param.out= This parameter is the file path and name of the preindex
file that the tool generates.
Table 22-35 lists and describes optional parameters for running the Remote IDM
Indexer from the command line.
Note: Refer to the Symantec Data Loss Prevention Administration Guide for details
on using white listing and on using file type and file size filters.
param.whitelist= This parameter is the full file path (including the name) to
the whitelist.txt file. The whitelist file must be local
to the Remote IDM Indexer.
param.min_filesize_bytes= This parameter is the minimum file size filter. File sizes
under the specified size are not indexed.
param.max_filesize_bytes= This parameter is the maximum file size filter. File sizes
over the specified size are not indexed.
Caution: If you run the tool from the command line with arguments, those arguments
overwrite the parameters in the properties file.
Table 22-34 lists and describes required parameters for running the Remote IDM
Indexer from the command line.
Note: Refer to the Symantec Data Loss Prevention Administration Guide for details
on preparing the document data source for indexing.
-out This parameter is the file path and name of the preindex
file that the tool generates.
Detecting content using Indexed Document Matching (IDM) 581
Remote IDM indexing
Table 22-35 lists and describes optional parameters for running the Remote IDM
Indexer from the command line.
Note: Refer to the Symantec Data Loss Prevention Administration Guide for details
on using white listing and on using file type and file size filters.
-min_filesize_bytes This parameter is the minimum file size filter. Files under
the specified size are not indexed.
-max_filesize_bytes This parameter is the maximum file size filter. Files over
the specified size are not indexed.
If you are using the Windows GUI version of the Remote IDM Indexer, you can
schedule or edit a task directly from the tool. The following screen shots illustrate
the process.
See “To schedule indexing using the Windows GUI version of the tool” on page 583.
See “To edit an existing scheduled task using the Windows GUI version of the tool”
on page 584.
Incremental indexing
You can incrementally index a remote data source by specifying an existing preindex
file (*.prdx) in the command line argument when you run the tool.
In the GUI version of the tool you can browse to and select an existing *.prdx file
for the Output File path.
The indexing process appends newly indexed files and file contents to the existing
preindex entries.
The tool compares the last modified date of the file. If the file has been modified
after the file that was pre-indexed, the tool updates the pre-index with the changes
that were made to the file. If the file modified date is the same, the pre-index is not
updated. If you change any include, exclude, or size filters in your existing preindex
file, those filters are applied to any previously indexed files. For example, for a
remote data source with 10 .docx files and 10 .pptx files, if your first remote
indexing job has no filters, all files are indexed. If you add an exclude filter for .docx
files (-exclude_filter=*.docx) and run the indexing job again, the .docx files
are removed from the index and only the .pptx files remain.
The log presents error messages that indicate if file access was denied and if file
indexing failed.
You can use FTP or FTP/S to copy the *.prdx file to the Enforce Server host file
system.
Note: Make sure that the Enforce user reading and loading the .prdx file has
permission to enable copying and loading of the file.
Note: If you have not copied the preindex file to the proper directory on the Enforce
Server host (\SymantecDLP\Protect\documentprofiles), the file does not appear
in the drop-down field for selection.
you train the system against. You must be careful to select the documents that are
representative of the type of content you want to protect. And, you must select good
examples of content you want to ignore that are closely related to the content you
want to protect.
See “Configuring VML profiles and policy conditions” on page 590.
Table 23-1summarizes the baseline requirements for the content you collect for
VML profile training.
Minimum: 50
documents 30 MB per upload
Single, specific Text-based
business use case (primarily) No size limit per
Negative Approximately the Content you do
category.
same amount as not want to protect
the positive yet thematically
category. related to the
positive category.
Base false positive rate The percentage of the content in the negative training set that is statistically similar to the
(%) positive content.
Detecting content using Vector Machine Learning (VML) 589
Introducing Vector Machine Learning (VML)
Base false negative Rrate The percentage of the content in the positive training set that is statistically similar to
(%) negative content.
Similarity Description
Similarity Threshold The Similarity Threshold is a configurable parameter between 0 and 10 that is unique to each
VML profile. The default setting is 10, which requires the most similar match between the VML
profile features and the detected message content. As such, this setting is likely to produce
fewer incidents. A setting of 0 produces the most number of matches, many of which are likely
to be false positives.
Similarity Description
Similarity Score The Similarity Score is a read-only run-time statistic between 0 and 10 reported by the system
based on the detection results of a VML policy. To report an incident, the Similarity Score must
be higher than the Similarity Threshold, otherwise the VML policy does not report a match.
Discover Server Discover scanning does not begin until all policy dependencies are
loaded. A Discover scan based on a VML policy does not start until
the referenced VML profile is accepted. In this case the system
displays a message in the Discover scanning interface that indicates
that the scan waits on the dependency to load.
Network and Endpoint For a simple rule, or compound rule where the conditions are ANDed,
Servers the entire rule fails because the VML condition cannot match. If this
is the only rule in the policy, the policy does not work.
For a policy where there are multiple rules that are ORed, only the
VML rule fails; the other rules in the policy are evaluated.
Step 1 Collect the example documents for Collect a representative number of example documents that contain
training the system. the positive content that you want to protect and the negative
content you want to ignore.
Step 2 Create a new VML profile. Define a new VML profile based on the specific business category
of data from which you have derived your positive and negative
training sets.
Step 3 Upload the example documents. Upload the example positive and negative training sets separately
to the Enforce Server.
Step 4 Train the VML profile. Train the system to learn the type of content you want to protect
and generate the VML profile.
Step 5 Accept or reject the trained profile. Accept the trained profile to deploy it. Or, reject the profile, update
one or both of the training sets (by adding or removing example
documents), and restart the training process.
Step 6 Create a VML policy and test Create a VML policy that references the VML profile.
detection.
See “Configuring the Detect using Vector Machine Learning Profile
condition” on page 602.
Step 7 Tune the VML profile. Adjust the Similarity Threshold setting as necessary to optimize
detection results.
Step 8 Follow VML best practices. See “Best practices for using VML” on page 609.
Detecting content using Vector Machine Learning (VML) 592
Configuring VML profiles and policy conditions
Note: You must have Enforce Server administrator privileges to create VML profiles.
This version is an editable version of the VML profile. This version has not been
trained, or accepted, or both; it cannot be deployed to a policy.
Initially, when you create a new VML profile, the system displays only the Current
Profile tab with an empty training set. After you initially train and accept the VML
profile, the Trained Set table in the Current Profile tab is populated with details
about the training set. The information that is displayed in this table and tab is
read-only.
To edit a VML profile
◆ Click Manage Profile to the far right of the Current Profile tab.
The system displays the editable version of the profile in the Temporary
Workspace tab. You can now proceed with training and managing the profile.
See “Training VML profiles” on page 595.
The Temporary Workspace tab remains present in the user interface until you
train and accept a new version of the VML profile. In other words, there is no way
to close the Temporary Workspace tab without training and accepting, even if you
made no changes to the profile.
Once you accept a new version of the VML profile, the system overwrites the
previous Current Profile with the newly accepted version. You cannot revert to a
previously accepted Current Profile. However, you can revert to previous versions
of the training set for a Temporary Profile.
See “Managing training set documents” on page 598.
Note: You can upload individual documents. However, we recommended that you
upload a document archive (such as ZIP, RAR, or TAR) that contains the
recommended (250) or minimum (50) number of example documents. The maximum
upload size is 30 MB. You can partition the documents across archives if you have
more than 30 MB of data to upload. See “About the content you train” on page 587.
Detecting content using Vector Machine Learning (VML) 594
Configuring VML profiles and policy conditions
9 Click Upload Contents to repeat the process for the other training set.
The profile is not complete and cannot be trained until you have uploaded the
minimum number of positive and negative example documents.
See Table 23-1 on page 588.
10 Once you have successfully uploaded both training sets you are ready to train
the VML profile.
See “Training VML profiles” on page 595.
Step 1 Enable training mode. Select the VML profile you want to train from the Manage > Data Profiles >
Vector Machine Learning screen. Or, create a new VML profile.
Click Manage Profile to the far right of the Current Profile tab. The system
displays the profile for training in the Temporary Workspace tab.
See “Working with the Current Profile and Temporary Workspace tabs”
on page 592.
Step 2 Upload the training Familiarize yourself with the training set requirements and recommendations.
content.
See “About the content you train” on page 587.
Upload the positive and the negative training sets in separate document archives
to the Enforce Server.
Step 3 Adjust the memory The default value is "High" which generally results in the best training set accuracy
allocation (only if rates. Typically you do not need to change this setting. For some situations you
necessary). may want to choose a "Medium" or "Low" memory setting (for example, deploying
the profile to the endpoint).
Step 4 Start the training Click Start Training to begin the profile training process.
process. During the training process, the system:
Step 5 Verify training When the training process completes, the system indicates if the training profile
completion. was successfully created.
If the training process failed, the system displays an error. Check the debug log
files and restart the training process.
Note: If you previously accepted the profile, the system also displays the Current
Profile statistics for side-by-side comparison.
Detecting content using Vector Machine Learning (VML) 597
Configuring VML profiles and policy conditions
Step 6 Accept or reject the If the training process is successful, the system prompts you to accept or reject
training profile. the training profile. Your decision is based on the Accuracy Rate from Training
percentages.
See “About the base accuracy from training percentage rates” on page 588.
To accept or reject the training profile:
■ Click Accept to save the training results as the active Current Profile.
Once you accept the training profile, it appears in the Current Profile tab
and the Temporary Workspace tab is removed.
■ Click Reject to discard the training results.
The profile remains in the Temporary Workspace tab for editing. You can
adjust one or both of the training sets by adding or removing documents and
retraining the profile.
See “Managing training set documents” on page 598.
Note: A trained VML profile is not active until you accept it. The system lets you
create a policy based on a VML profile that has not been trained or accepted.
However, the VML profile is not deployed to that policy until the profile is accepted.
See “About using unaccepted VML profiles in policies” on page 590.
Step 7 Test and tune the Once you have successfully trained and accepted the VML profile, you can now
profile. use it to define policy rules and tune the VML profile.
See “Configuring the Detect using Vector Machine Learning Profile condition”
on page 602.
See “About the Similarity Threshold and Similarity Score” on page 589.
Note: For more information, refer to the Symantec Data Loss Prevention Vector
Machine Learning Best Practices Guide, available at the Symantec Support
Center at (http://www.symantec.com/docs/DOC8733).
Note: You must have Enforce Server administrator privileges to manage and create
VML profiles.
Detecting content using Vector Machine Learning (VML) 600
Configuring VML profiles and policy conditions
Action Description
View and sort The system lists all existing VML profiles and their state at the Vector
profiles. Machine Learning screen.
Click the column header to sort the VML profiles by name or status.
Manage and train Select a VML profile from the list to display and manage it.
profiles.
The Current Profile tab displays the active profile.
See “Working with the Current Profile and Temporary Workspace tabs”
on page 592.
Monitor profiles. The system lists and describes the status of all VML profiles.
■ Memory Required (KB)
The minimum amount of memory that is required to load the profile
in memory for detection.
See “Adjusting the memory allocation” on page 597.
■ Status
The present status of the profile.
See Table 23-8 on page 601.
■ Deployment Status
The historical status of the profile.
See Table 23-9 on page 601.
Remove profiles. Click the X icon at the far right to delete an existing profile.
If you delete an existing profile, the system removes the profile metadata
and the Training Set from the Enforce Server.
The Status field displays the current state of each VML profile.
Detecting content using Vector Machine Learning (VML) 601
Configuring VML profiles and policy conditions
The Deployment Status field indicates if the VML profile has ever been accepted
or not.
Accepted on <date> The VML profile was accepted on the date indicated.
Note: You do not have to retrain a profile if you change the name or description.
Detecting content using Vector Machine Learning (VML) 602
Configuring VML profiles and policy conditions
Step 1 Create and train the VML See “Creating new VML profiles” on page 592.
profile.
See “Training VML profiles” on page 595.
Step 3 Add the VML rule to the policy. From the Configure Policy screen:
Step 4 Configure the VML detection Name the rule and configure the rule severity.
rule.
See “Configuring policy rules” on page 394.
Detecting content using Vector Machine Learning (VML) 603
Configuring VML profiles and policy conditions
Step 5 Select components to match Select one or both message components to Match On:
on.
■ Body, which is the content of the message
■ Attachments, which are any files transported by the message
Note: On the endpoint, the Symantec DLP Agent matches on the entire
message, not individual message components.
Step 6 Configure additional conditions Optionally, you can create a compound detection rule by adding more
(optional). conditions to the rule.
Step 7 Save the policy configuration. Click OK then click Save to save the policy.
Step 1 Create and train the VML profile. See “Creating new VML profiles” on page 592.
Step 3 Add a VML exception to the From the Configure Policy screen:
policy.
■ Select Add Exception.
■ Select the Detect using Vector Machine Learning profile exception
from the list of content exceptions.
■ Select the VML profile you want to use from the drop-down menu.
■ Click Next.
Detecting content using Vector Machine Learning (VML) 604
Configuring VML profiles and policy conditions
■ Entire Message
Select this option to compare the exception against the entire
message. If an exception is found anywhere in the message, the
exception is triggered and no matching occurs.
■ Matched Components Only
Select this option to match the exception against the same
component as the rule. For example, if the rule matches on the Body
and the exception occurs in an attachment, the exception is not
triggered.
Step 5 Configure the condition. Generally you can accept the default condition settings for policy
exceptions.
Step 6 Save the policy configuration. Click OK then click Save to save the policy.
Note: You do not have to retrain the VML profile after you adjust the Similarity
Threshold, unless you modify a training set based on testing results.
Step 1 Train the VML profile. Follow the recommendations in this guide for defining the category and uploading
the training set documents. Adjust the memory allocation before you train the
profile. Refer to the Symantec Data Loss Prevention Administration Guide for help
performing the tasks involved.
Step 2 Set the Similarity The default Similarity Threshold is 10. At this value the system does not generate
Threshold to 0. any incidents. A setting of 0 produces the most incidents, many of which are likely
to be false positives. The purpose of setting the value to 0 is to see the entire
range of potential matches. It also servers to tune the profile to be greater than
the highest false positive score.
Step 3 Create a VML policy. Create a policy that references the VML profile you want to tune. The profile must
be accepted to be deployable to a policy.
Detecting content using Vector Machine Learning (VML) 606
Configuring VML profiles and policy conditions
Step 4 Test the policy. Test the VML policy using a corpus of test data. For example, you can use the
DLP_Wikipedia_sample.zip file to test your VML policies against. Create a
mechanism to detect incidents. The mechanism can be a Discover scan target of
a local file folder where you place the test data. Or it can be a DLP Agent scan of
a copy/paste operation.
Step 5 Review any incidents. Review any matches at the Incident Snapshot screen. Verify a relatively low
Similarity Score for each match. A relatively low Similarity Score indicates a false
positive. If one or more test documents produce a match with a relatively high
Similarity Score, you have a training set quality issue. In this case you need to
review the content and if appropriate add the document(s) to the positive training
set. You then need to retrain and retune the profile.
See “Log files for troubleshooting VML training and policy detection” on page 608.
Step 6 Adjust the Similarity Review the incidents to determine the highest Similarity Score among the detected
Threshold. false positives that you have tested the profile against. Then, you can adjust the
Similarity Threshold for the profile to be greater than the highest Similarity Score
for the false positives.
For example, if the highest detected false positive has a Similarity Score of 4.5,
set the Similarity Threshold to 4.6. This setting filters the known false positives
from being reported as incidents.
Manager.properties Property file for the Enforce Server; contains 1 VML setting.
The following table lists and describes the VML training parameters available for
configuration in properties file MLDTraining.properties.
Parameter Description
Lowering this value can help reduce the size of the profile.
However, adjusting this setting is not recommended.
Instead, use the memory allocation setting to tune the size
of the profile.
Parameter Description
Parameter Description
Table 23-17 provides a summary of the VML best practices that are discussed in
this section. It includes links to individual topics for more in-depth recommendations.
Recommended Use VML to protect unstructured, text-based content. Do not use VML to protect graphics, binary
uses for VML data, or personally identifiable information (PII).
Category of content Define the VML profile based on a single category of content that you want to protect. The
category of content should be derived from a specific business use case. Narrowly defined
categories are better than broadly defined ones.
Positive training set Archive and upload the recommended (250) number of example documents for the positive
training set, or at least the minimum (50).
Negative training Archive and upload the example documents for the negative training set. Ideally the negative
set training set contains a similar number of well-categorized documents as the positive training set.
In addition, add some documents containing generic or neutral content to your negative training
set.
Profile sizing Consider adjusting the memory allocation to low. Internal testing has shown that setting the
memory allocation to low may improve accuracy in certain cases.
Training set quality Reject the training result and adjust the example documents if either of the base accuracy rates
from training are more than 5%.
Profile tuning Perform negative testing to tune the VML profile by using a corpus of testable data.
Profile deployment Remove accepted profiles not in use by policies to reduce detection server load. Tune the
Similarity Threshold before deploying a profile into production across all endpoints to avoid
network overhead.
It is not possible or practical Often collecting all of the content you want to protect for fingerprinting is an impossible
to fingerprint all the data you task. This situation arises for many forms of unstructured data: marketing materials,
want to protect. financial documents, patient records, product formulas, source code, and so forth.
VML works well for this situation because you do not have to collect all of the content
you want to protect. You collect a smaller set of example documents.
You cannot adequately Often describing the data you want to protect is difficult without sacrificing some
describe the data you want to accuracy. This situation may arise when you have long keyword lists that are hard to
protect. generate, tune, and maintain.
VML works well in these situations because it automatically models the features
(keywords) you want to protect. It enables you to easily manage and update the source
content.
A policy reports frequent false Sometimes a certain category of information is a constant source of false positives.
positives. For example, a weekly sales report may consistently produce false positives for a Data
Identifier policy looking for social security numbers.
VML may work well here because you can train against the content that causes the
false positives and create a policy exception to ignore those features.
Note: The false positive contents must belong to a well-defined category for VML to
be an effective solution for this use case. See “Recommendations for training set
definition” on page 612.
Protect personally identifiable Exact Data Matching (EDM) and Data Identifiers are the best option for protecting the
information (PII). common types of PII.
Protect binary files and Indexed Document Matching (IDM) is the best option to protect the content that is
images. largely binary, such as image files or CAD files.
Note: While a completely generic negative training set is not recommended, seeding
the negative training set with some neutral-content documents does have value.
See “Guidelines for training set sizing” on page 613.
The following table provides some example categories and possible positive and
negative training sets comprising those categories.
Product source code Proprietary product source code Source code from open source
projects
Quarterly earnings Pre-release earnings; sales estimates; Details of published annual accounts
accounting documents
Mergers and acquisitions Confidential legal documents; M&A Publicly available materials; press
documents releases
case, you can upload the positive training set twice to reach the minimum document
threshold and equal the number of negative documents. Note that you should use
this technique for development and testing purposes only. Production profiles should
be trained against at least the minimum number of documents for both training sets.
Table 23-21 lists the optimal, recommended, and minimum number of documents
to include in each training set.
Note: These training set guidelines assume an average document size of 3 KB. If
you have larger-sized documents, fewer in number may be sufficient.
allocation setting, the more in-depth the feature extraction and the plotting of the
model, and the larger the profile. In general, for server-based policy detection, the
recommended memory allocation setting is high, which is the default setting.
On the endpoint, the VML profile is deployed to the host computer and loaded into
memory by the DLP Agent. (Unlike EDM and IDM, VML does not rely on two-tier
detection for endpoint policies.) Because memory on the endpoint is limited, the
recommendation is to allocate low or medium memory for endpoint policies. Internal
testing has shown that reducing the memory allocation does not reduce the accuracy
of the profile and may improve accuracy in certain situations.
Note: You can use the log file machinelearning_training.log to evaluate per-fold
training accuracy rates.
See “Log files for troubleshooting VML training and policy detection” on page 608.
Fold evaluation Per fold category accuracy rates and cross-fold averages
Fold evaluation Per fold category accuracy rates and cross-fold averages
Cross-fold Avg False Positive Rate 1.214855808019638 Avg False Negative Rate
1.0730373203754424
■ PNG
■ TIFF (single page or multi-page, .tif or .tiff)
■ Bitmap (.bmp, .dib)
Form Recognition is available for Network Monitor, Network Prevent for Email,
Network Prevent for Web, and Network Discover. Form Recognition is not available
for Endpoint Discover, Endpoint Prevent, or any cloud detectors.
See “Configuring Form Recognition detection” on page 619.
the fill threshold for the profile: the fill threshold specifies how much of the form
must be filled to trigger an incident.
Table 24-1 provides a high-level workflow for configuring Form Recognition detection:
1 Collect and prepare blank copies of the forms you want to protect. See “Preparing a Form Recognition
Gallery Archive” on page 620.
2 Configure a Form Recognition profile. Specify the Gallery Archive See “Configuring a Form Recognition
with the forms you want to detect and a Fill Threshold for creating profile” on page 621.
incidents.
3 Configure a policy with a Form Recognition detection or exception See “Configuring the Form Recognition
rule using your Form Recognition profile. detection rule” on page 622.
■ Each form should have content evenly distributed across the page. Forms with
clustered content and sparse areas are more difficult to match.
■ Each form should have either white or light-colored backgrounds. Black or dark
backgrounds are not supported.
To prepare a Form Recognition Gallery Archive
1 Collect blank copies of the forms you want to detect.
2 Save all blank copies of forms as PDF files. Consider the following guidelines
as you prepare PDF files:
■ The gallery must only contain PDF files. Symantec Data Loss Prevention
ignores any other folders and files in the ZIP archive.
■ If a form has two or more pages, separate them into single-page files, then
convert to PDF format.
For example, if your form is a single three-page Microsoft Word file titled
YourForm.docx, separate the file into three separate single-page files, then
convert them to PDF:
■ YourForm_1of3.PDF
■ YourForm_2of3.PDF
■ YourForm_3of3.PDF
■ If your form contains electronically fillable fields, use a PDF editing tool for
the conversion process that retains AcroForms formatting, for example
Adobe Acrobat.
■ If your form includes several pages of un-fillable boilerplate, only add the
fillable pages to your gallery archive.
Note: The name you enter is used when you configure policies and appears
in the incident snapshot for Form Recognition incidents.
Note: For electronically filled forms, entering 1 for the fill threshold detects any
electronically filled item on a form. For example, setting the threshold to 1
detects a single selected check-box. In contrast, setting the threshold to 1 may
not detect a similar check-box that has been filled in using a pen.
6 Upload the gallery archive by clicking Browse and selecting the gallery archive
ZIP file.
7 Click Save to begin indexing the profile.
When the gallery completes indexing, you can use it to configure a Form
Recognition rule in a policy.
See “Configuring the Form Recognition detection rule” on page 622.
3 Select Detect using Form Recognition Profile in the the Form Recognition
section and select the Form Recognition profile that contains the forms you
want to protect.
4 Click Next to display the Configure Policy - Edit Rule page.
5 Enter a name for the rule in the Rule Name field.
6 Choose the rule severity.
See “Policy severity” on page 346.
7 Select the conditions for the Form Recognition detection rule.
You can use the Also Match field to configure compound match conditions.
See “Compound conditions” on page 371.
8 Click OK to add the detection rule.
9 Click Save to apply the detection rule to the policy.
The new policy displays in the Policy List.
Element Description
Add Profile Click Add Profile to configure a new Form Recognition profile.
Show Entries Select a value from Show Entries to specify the number of profiles
you can view on this page.
Page navigation You can use the following buttons to change the view of profiles:
■ Click Last to view profiles with the most recent dates in ascending
order.
■ Click a number to navigate to that specific page number.
■ Click Next to view the next page.
■ Click Previous to view the previous page.
Profile Name Click the Profile Name to view or edit the profile.
Note: You can sort column data in ascending order (A-Z/1-3) by
clicking the up arrow or descending order (Z-A/3-1) by clicking the
down arrow.
Description The profile description. You can edit the description by clicking the
profile name or the pencil icon in the Actions column.
Detecting content using Form Recognition - Sensitive Image Recognition 625
Managing Form Recognition profiles
Element Description
■ Indexing not started displays when indexing for the profile did not
start. The uploaded gallery did not process.
■ Indexing in progress displays when the uploaded gallery is
indexing.
■ Profile indexed displays when indexing for this profile is complete
and the index successfully created.
■ Invalid gallery displays when indexing for the profile failed. The
uploaded gallery did not start indexing because it is invalid.
■ Index contains no images displays when indexing for the profile
failed. The uploaded gallery did not index because it contains no
compatible files.
■ Indexing failed displays when indexing for this profile failed. The
uploaded gallery was not indexed.
■ Indexing found some unusable files displays when indexing for
the profile completes with errors. Some of the files in the uploaded
gallery cannot be indexed.
You cannot edit the gallery name. You can upload a new gallery or an
existing gallery that has been renamed by clicking the profile name or
the pencil icon in the Actions column.
Usable Forms Count The total number of form images in the gallery that have been indexed
without errors and can be used in a policy.
Date Indexed The date when the profile was last indexed.
Fill Threshold The fill threshold value you provided when you configured the Form
Recognition profile. You can edit this value by clicking the profile name
or the pencil icon in the Actions column.
Click the red X to delete a profile. If you delete a profile, the system
removes the profile metadata and gallery from the Enforce Server.
Detecting content using Form Recognition - Sensitive Image Recognition 626
Advanced server settings for Form Recognition
The extracted text then enters the detection chain and is processed identically to
conventionally extracted text. Incident snapshots for OCR text are similar to those
for conventionally extracted text: the text excerpt is displayed, with the detected
words highlighted. OCR incidents have visual indicators denoting that the text came
from OCR, and a thumbnail of the original image.
You can set up OCR to use various languages. To improve recognition results, you
can also choose a specialized dictionary (such as legal, financial, or medical) to
enable supplemental spell checking. You can also set up a customized dictionary
to deal with proper nouns or other terms specific to your business.
While OCR content extraction can integrate with both Windows and Linux detection
servers, Symantec supports installing the OCR Server on Windows servers only.
OCR content extraction is not supported on the Windows Agents, macOS Agents,
the Data Loss Prevention cloud services, or the Data Loss Prevention appliances
(both virtual and physical). For information on supported versions of Windows
servers, see the Symantec Data Loss Prevention System Requirements Guide at
https://www.symantec.com/docs/DOC9256
■ Bitmap (.bmp)
■ Images extracted from PDF files, such as pages from a scanned document.
6 Enter a value for Accuracy vs speed. By default, the OCR Server sets the
value dynamically for each document. A Sensitive Image Recognition
pre-classifier is present on the detection server. This pre-classifier inspects
each image and determines if it is suitable for OCR content extraction (and
form recognition). It then determines which preset is most appropriate. If you
uncheck this box, you can select a preset to use for all images. You can choose
from Accurate, Balanced, or Fast. This strategy can be appropriate for
Discover scans, where accuracy is prioritized over time.
7 In the Supported Languages section, select the candidate languages for
OCR.
You can select one or more languages, and then the OCR Server selects a
language from that pool to use for the image. Symantec assumes that
documents are primarily one language (for example, all French, or all English,
as opposed to mixed English and French). The number of languages should
be as small as possible. The more languages you select, the slower the
processing speed.
Even if a language is not selected, you may still get accurate text from that
language. For example, you can select English and German and submit a
mixed English-French image the OCR Server. It may choose English and still
return some French text. The language selection affects which spell-check
dictionary to use. It also affects the pool of characters to choose from if a
character in the image is unclear.
8 In the Languages and Dictionaries Specialized Dictionaries section, you
enable supplemental spell checking for different businesses (legal, financial,
medical) across different languages.
9 In the Languages and Dictionaries Custom Dictionary section, specify the
name of your custom dictionary file to aid recognition accuracy. For example,
if certain proper nouns give the OCR Server difficulty, you can place them in
this custom dictionary.
Using Dictionaries and spell checking improves recognition results for
low-quality scans and images (such as faxes). If the characters are crisp and
clean, the engine has less uncertainty about what they might be, and the
Dictionaries are less useful.
10 The custom dictionary is a text file, with one entry per line. This text file must
be placed in the dictionary directory of each server at
c:\SymantecDLPOCR\Protect\bin.
medium, and narrow—so you can fine-tune your detection results. Data identifiers
offer broad support for detecting international content.
If a system-defined data identifier does not meet your needs, you can modify it.
You can also define your own custom data identifiers to detect any content that you
can describe.
See “System-defined data identifiers” on page 636.
See “Selecting a data identifier breadth” on page 653.
Category Description
Personal Identity Detect various types of identification numbers for the regions of Africa, Asia Pacific, Europe,
North America, and South America.
Financial Detect financial identification numbers, such as credit card numbers and ABA routing numbers.
Healthcare Detect U.S. and international drug codes, and other healthcare-related pattern-based sensitive
data.
South African Personal Identification Number See “South African Personal Identification Number”
on page 1060.
Table 26-3 lists system-defined data identifiers for the Asia Pacific region.
Australian Tax File Number See “Australian Tax File Number” on page 842.
Indian Aadhaar Card Number See “Indian Aadhaar Card Number” on page 971.
Indian Permanent Account Number See “Indian Permanent Account Number” on page 973.
Indonesian Identity Card Number See “Indonesian Identity Card Number” on page 974.
Israel Personal Identification Number See “Israel Personal Identification Number” on page 987.
Korean Residence Registration Number for Foreigners See “Korea Residence Registration Number for Foreigners”
on page 1005.
Korean Residence Registration Number for Korean See “Korea Residence Registration Number for Korean”
on page 1008.
Malaysian MyKad Number See “Malaysian MyKad Number (MyKad) ” on page 1013.
New Zealand National Health Index Number See “New Zealand National Health Index Number”
on page 1037.
People's Republic of China ID See “People's Republic of China ID” on page 1041.
Thailand Personal Identification Number See “Thailand Personal Identification Number” on page 1087.
United Arab Emirates Personal Number See “United Arab Emirates Personal Number” on page 1107.
Table 26-4 lists system-defined data identifiers for the European region.
Austria Tax Identification Number See “Austria Tax Identification Number” on page 845.
Austrian Social Security Number See “Austrian Social Security Number” on page 846.
Belgium Driver's License Number See “Belgium Driver's License Number” on page 851.
Belgium Tax Identification Number See “Belgium Tax Identification Number” on page 854.
Belgium Value Added Tax (VAT) Number See “Belgium Value Added Tax (VAT) Number”
on page 856.
Bulgarian Uniform Civil Number - EGN See “Bulgarian Uniform Civil Number - EGN” on page 871.
Czech Personal Identification Number See “Czech Personal Identification Number” on page 905.
Denmark Personal Identification Number See “Denmark Personal Identification Number” on page 908.
Finnish Personal Identification Number See “Finnish Personal Identification Number” on page 924.
France Driver's License Number See “France Driver's License Number” on page 926.
France Health Insurance Number See “France Health Insurance Number” on page 927.
France Tax Identification Number See “France Tax Identification Number” on page 929.
France Value Added Tax (VAT) Number See “France Value Added Tax (VAT) Number” on page 930.
French Social Security Number See “French Social Security Number” on page 936.
Germany Driver's License Number See “Germany Driver's License Number” on page 942.
Germany Value Added Tax (VAT) Number See “Germany Value Added Tax (VAT) Number”
on page 944.
Greek Tax Identification Number See “Greek Tax Identification Number” on page 946.
Hungarian Social Security Number (TAJ) See “Hungarian Social Security Number” on page 950.
Hungarian Tax Identification Number See “Hungarian Tax Identification Number” on page 952.
Irish Personal Public Service Number See “Irish Personal Public Service Number ” on page 985.
Italy Driver's License Number See “Italy Driver's License Number” on page 989.
Italy Health Insurance Number See “Italy Health Insurance Number” on page 991.
Italy Value Added Tax (VAT) Number See “Italy Value Added Tax (VAT) Number” on page 994.
Detecting content using data identifiers 640
Introducing data identifiers
Luxembourg National Register of Individuals Number See “Luxembourg National Register of Individuals Number
” on page 1010.
Netherlands Driver's License Number See “Netherlands Driver's License Number” on page 1028.
Netherlands Tax Identification Number See “Netherlands Tax Identification Number” on page 1031.
Netherlands Value Added Tax (VAT) Number See “Netherlands Value Added Tax (VAT) Number”
on page 1034.
Polish Social Security Number (PESEL) See “Polish Social Security Number (PESEL)” on page 1047.
Polish Tax Identification Number (NIP) See “Polish Tax Identification Number” on page 1049.
Romanian Numerical Personal Code (CNP) See “Romanian Numerical Personal Code” on page 1054.
Russian Passport Identification Number See “Russian Passport Identification Number” on page 1056.
Russian Taxpayer Identification Number See “Russian Taxpayer Identification Number” on page 1058.
Spain Driver's License Number See “Spain Driver's License Number” on page 1063.
Spanish Customer Account Number See “Spanish Customer Account Number” on page 1065.
Spanish DNI Identification Number See “Spanish DNI ID” on page 1068.
Spanish Social Security Number See “Spanish Social Security Number ” on page 1071.
Spanish Tax Identification (CIF) See “Spanish Tax Identification (CIF)” on page 1073.
Swedish Personal Identification Number See “Swedish Personal Identification Number” on page 1077.
Swiss Social Security Number (AHV) See “Swiss Social Security Number (AHV)” on page 1083.
UK Driver's License Number See “UK Drivers Licence Number” on page 1090.
UK National Insurance Number See “UK National Insurance Number” on page 1096.
UK National Health Service (NHS) Number See “UK National Health Service (NHS) Number”
on page 1094.
UK Electoral Roll Number See “UK Electoral Roll Number” on page 1093.
Table 26-5 lists system-defined data identifiers for the North American region.
Canadian Social Insurance Number See “Canadian Social Insurance Number” on page 874.
Driver's License Number – CA State See “Drivers License Number – CA State ” on page 910.
Driver's License Number – IL State See “Drivers License Number - IL State” on page 913.
Driver's License Number – NJ State See “Drivers License Number - NJ State” on page 914.
Driver's License Number – NY State See “Drivers License Number - NY State” on page 916.
Driver's License Number – FL, MI, MN States See “Drivers License Number - FL, MI, MN States ”
on page 912.
Driver's License Number -WA State See “Driver's License Number - WA State” on page 917.
Driver's License Number - WI State See “Driver's License Number - WI State” on page 919.
Mexican Personal Registration and Identification Number See “Mexican Personal Registration and Identification
Number” on page 1015.
Mexican Tax Identification Number See “Mexican Tax Identification Number” on page 1018.
Detecting content using data identifiers 642
Introducing data identifiers
Mexican Unique Population Registry Code (CURP) See “Mexican Unique Population Registry Code”
on page 1020.
Randomized US Social Security Number (SSN) See “Randomized US Social Security Number (SSN)”
on page 1051.
US Individual Tax ID Number (ITIN) See “UK Tax ID Number” on page 1100.
US Social Security Number (SSN) See “US Social Security Number (SSN)” on page 1113.
Note: This data identifer is replaced by the Randomized
US SSN data identifier.
US ZIP+4 Postal Codes See “US ZIP+4 Postal Codes” on page 1116.
Table 26-6 lists system-defined data identifiers for the South American region.
Argentina Tax Identification Number See “Argentina Tax Identification Number” on page 831.
Brazilian Bank Account Number See “Brazilian Bank Account Number” on page 858.
Brazilian Election Identification Number See “Brazilian Election Identification Number” on page 860.
Brazilian National Registry of Legal Entities Number See “Brazilian National Registry of Legal Entities Number”
on page 864.
Brazilian Natural Person Registry Number See “Brazilian Natural Person Registry Number (CPF)”
on page 866.
Chilean National Identification Number See “Chilean National Identification Number” on page 877.
Colombian Cell Phone Number See “Colombian Cell Phone Number” on page 885.
Colombian Tax Identification Number See “Colombian Tax Identification Number” on page 890.
Detecting content using data identifiers 643
Introducing data identifiers
Credit Card Magnetic Stripe Data See “Credit Card Magnetic Stripe Data” on page 892.
British Columbia Personal Healthcare Number See “British Columbia Personal Healthcare Number”
on page 869.
Detecting content using data identifiers 644
Introducing data identifiers
Drug Enforcement Agency (DEA) Number See “Drug Enforcement Agency (DEA) Number”
on page 922.
National Drug Code See “National Drug Code (NDC)” on page 1024.
National Provider Identifier Number See “National Provider Identifier Number” on page 1026.
International Mobile Equipment Identity Number See “International Mobile Equipment Identity Number”
on page 976.
validators to or from the data identifier, or changing one or more of the patterns
defined by the data identifier.
See “Cloning a system data identifier before modifying it” on page 673.
To create a custom data identifier, you implement one or more detection pattern(s),
select one or more data validators, provide the data input if the validator requires
it, and choose a data normalizer.
See “Custom data identifier configuration” on page 692.
Policy authors can reuse modified and custom data identifiers in one or more
policies.
Note: Not all system data identifiers provide each breadth of detection. Refer to the
complete list of data identifiers and breadths to determine what is available.
See “Selecting a data identifier breadth” on page 653.
Note: Optional validators only apply to the policy instance you are actively
configuring; they do not apply system-wide.
if the attachment contains the number but the body contains the keyword validator,
the detection engine does not consider this to be a match.
See “Configuring the Content Matches data identifier condition” on page 651.
■ Breadth ■ Patterns
You can implement any breadth the data identifier You cannot modify the match patterns at the instance
supports at the instance level. level.
■ Optional Validators ■ Mandatory Validators
You can select one or more optional validators at You cannot modify, add, or remove required validators at
the instance level. the instance level.
1 Decide the type of data See “Introducing data identifiers” on page 635.
identifier you want to
implement.
2 Decide the data identifier See “About data identifier breadths” on page 645.
breadth.
3 Configure the data See “Configuring the Content Matches data identifier condition” on page 651.
identifier.
4 Test and tune the data See “Best practices for using data identifiers” on page 705.
identifier policy.
Action Description
Edit a data identifier. Select the data identifier from the list to modify it.
Define a custom data Click Add data identifier to create a custom data identifier.
identifier.
See “Custom data identifier configuration” on page 692.
A pencil icon to the left means that the data identifier is modified from its original state, or is
custom.
Detecting content using data identifiers 650
Configuring data identifier policy conditions
Action Description
Remove a data Click the X icon on the right side to delete a data identifier.
identifier.
The system does not let you delete system data identifiers. You can only delete custom data
identifiers.
Note: The system does not export data identifiers in a policy template. The system
exports a reference to the system data identifier. The target system where the policy
template is imported provides the actual data identifier. If you modify a
system-defined data identifier, the modifications do not export to the template.
1 Clone the system data Clone the system data identifier before you modify it.
identifier you want to modify.
See “Cloning a system data identifier before modifying it” on page 673.
2 Edit the cloned data identifier. If you modify a system data identifier, click the plus sign to display the breadth
and edit the data identifier.
3 Edit one or more Patterns. You can modify any pattern that the Data Identifier provides.
4 Edit the data input for any See “Editing pattern validator input” on page 674.
validator that accepts input.
See “List of pattern validators that accept input data” on page 674.
5 Optionally, you can add or See “Selecting pattern validators” on page 703.
remove Validators, as
necessary.
Detecting content using data identifiers 651
Configuring data identifier policy conditions
7 Implement the data identifier See “Configuring the Content Matches data identifier condition” on page 651.
in a policy rule or exception.
1 Add a data identifier rule Select the Content Matches data identifier condition at the Add Detection
or exception to a policy, Rule or Add Exception screen.
or configure an existing
See “Adding a rule to a policy” on page 392.
one.
See “Adding an exception to a policy” on page 401.
2 Choose a data identifier. Choose a data identifier from the list and click Next.
3 Select a Breadth of Use the breadth option to narrow the scope of detection.
detection.
See “About data identifier breadths” on page 645.
Wide is the default setting and detects the broadest set of matches. Medium
and narrow breadths, if available, check additional criteria and detect fewer
matches.
4 Select and configure one Optional validators restrict the match criteria and reduce false positives.
or more Optional
See “About optional validators for data identifiers” on page 646.
Validators.
Detecting content using data identifiers 652
Configuring data identifier policy conditions
6 Configure the message Select one or more message components on which to match.
components to Match
On the endpoint, the detection engine matches the entire message, not
On.
individual components.
If the data identifier uses optional or required keyword validators, the keyword
must be present in the same component as the matched data identifier content.
7 Configure additional Optionally, you can Add one or more additional conditions from any available
conditions to Also Match. in the Also Match condition list.
Breadth Description
Wide The wide breadth defines a single or multiple patterns to create the greatest number of matches.
In general this breadth produces a higher rate of false positives than the medium and narrow
breadths.
Medium The medium breadth may refine the detection pattern(s) and/or add one or more data validators
to limit the number of matches.
Narrow The narrow breadth offers the tightest patterns and strictest validation to provide the most accurate
positive matches. In general this option requires the presence of a keyword or other validating
restriction to trigger a match.
Narrow
Narrow
Narrow
Narrow
Detecting content using data identifiers 654
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
Narrow
Belgium Value Added Tax (VAT) Number Wide Digits and Letters
See “Belgium Value Added Tax (VAT) Number” on page 856. Medium
Narrow
Detecting content using data identifiers 655
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
France Value Added Tax (VAT) Number Wide Digits and Letters
See “France Value Added Tax (VAT) Number” on page 930. Medium
Narrow
Narrow
Narrow
Narrow
Germany Value Added Tax (VAT) Number Wide Digits and Letters
See “Germany Value Added Tax (VAT) Number” on page 944. Medium
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Italy Value Added Tax (VAT) Number Wide Digits and Letters
See “Italy Value Added Tax (VAT) Number” on page 994. Medium
Narrow
Narrow
Narrow
Narrow
Mexican Personal Registration and Identification Number Wide Digits and Letters
Narrow
Detecting content using data identifiers 662
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
Narrow
Narrow
Netherlands Value Added Tax (VAT) Number Wide Digits and Letters
See “New Zealand National Health Index Number” on page 1037. Medium
Narrow
Narrow
Detecting content using data identifiers 663
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Detecting content using data identifiers 665
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
See “UK National Health Service (NHS) Number” on page 1094. Narrow
Narrow
Narrow
Narrow
Narrow
Detecting content using data identifiers 666
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
Narrow
Require beginning Match the characters that begin (lead) the matched data item.
characters
For example, for the CA Drivers License data identifier, you could require the beginning
character to be the letter "C." In this case the engine matches a license number C6457291.
Require ending characters Match the characters that end (trail) the matched data item.
Exclude beginning Exclude from matching characters that begin (lead) the matched data.
characters
See “Acceptable characters for optional validators” on page 668.
Exclude ending Exclude from matching the characters that end (trail) the matched data item.
characters
See “Acceptable characters for optional validators” on page 668.
Find keywords Match one or more keywords or key phrases in addition to the matched data item. Can
check for the proximity of matched data against a list of keywords.
Keywords can also be scanned for case sensitivity. Then a check is performed for the
proximity of the matched data identifier patterns against a list of keywords. An incident is
generated when all of the data identifier patterns in the rule match. Captured keywords
are highlighted in incidents. Proximity, case sensitivity, and validator highlighting are
disabled by default and must be enabled to work.
The keyword must be detected in the same message component as the data identifier
content to report a match.
See “List of pattern validators that accept input data” on page 674.
For example, the US Social Security Number (SSN) data identifier accepts numbers
only. If you configure the "Require ending character" optional validator and provide
input as letters, you receive the following error when you attempt to save the
configuration: Input to "Require ending characters" Validator is incorrect: List
contains non-number character.
See Table 26-18 on page 669.
To configure an optional validator
1 Click the plus sign beside the Optional Validators label for the data identifier
instance you are configuring.
See “Configuring the Content Matches data identifier condition” on page 651.
2 Select one or more optional validators.
See “About optional validators for data identifiers” on page 646.
3 Provide the expected input for each optional validator you select.
Each value can be of any length. Use commas to separate multiple values.
4 Click Save to save the configuration.
If the system displays an error message, make sure you have entered the
correct type of expected character input.
See Table 26-18 on page 669.
Note: The Find keyword optional validator accepts any characters as values for
all data identifiers .
The type of data expected by the optional validator depends on the data identifier.
Most data identifier/optional validator pairings accept numbers only; some accept
alphanumeric values, and a few accept any characters. If you enter unacceptable
input and attempt to save the policy, the system reports an error.
See “Configuring optional validators” on page 667.
Detecting content using data identifiers 669
Configuring data identifier policy conditions
Driver's License Number – CA State Numbers only Any characters (normalized to lowercase)
Driver's License Number – IL State Numbers only Any characters (normalized to lowercase)
Driver's License Number – NJ State Numbers only Any characters (normalized to lowercase)
Driver's License Number – FL, MI, Numbers only Any characters (normalized to lowercase)
MN States
First match is unique A unique match is the first match found in a message component.
Match count updated for each unique The match count is incremented by 1 for each unique pattern match.
match
Detecting content using data identifiers 671
Configuring data identifier policy conditions
Only unique matches are highlighted Duplicate matches are neither counted nor highlighted at the Incident Snapshot
screen
Uniqueness does not span message For example, if the same SSN appears in both the message body and
components attachment, two unique matches will be generated, not one. This is because
each instance is detected in a separate message component.
Compound rule with data identifier In a compound rule combining a data identifier condition with a keyword condition
and keyword proximity conditions that specifies keyword proximity logic, the reported match will be the first match
found
Note: The system does not export modified and custom data identifiers in a policy
template. The system exports a reference to the system Data identifier. The target
system where the policy template is imported provides the actual Data identifier.
See “Clone system-defined data identifiers before modifying to preserve original
state” on page 707.
6 Click Update Validator to save the changes you have made to the validator
input.
Click Discard Changes to not save the changes.
7 Click Save to save the data identifier.
Note: Input you use for beginning and ending validators concern the text of the
match itself. Input you use for prefix and suffix validators concern characters before
and after matched text.
Detecting content using data identifiers 675
Modifying system data identifiers
Validator Description
Exact Match Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude beginning characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude ending characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude exact match Enter a comma-separated list of values. Each value can be of any length.
Exclude prefix Enter a comma-separated list of values. Each value can be of any length.
Exclude suffix Enter a comma-separated list of values. Each value can be of any length.
Find keywords Enter a comma-separated list of values. Each value can be of any length.
Require beginning characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Require ending characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Table 26-22 Keyword list for international PII data identifiers (continued)
Belgian National Number French Numéro national, numéro de National number, security number,
sécurité, numéro d'assuré, number of insured, national
identifiant national, identification, national
identifiantnational#, identification #, national number
Numéronational# #
Belgium Driver's License German, French, Führerschein, Fuhrerschein, Driver's license, driver's license
Number Frisian Fuehrerschein, number, driving permit, driving
Führerscheinnummer, permit number
Fuhrerscheinnummer,
Fuehrerscheinnummer,
Führerscheinnummer,
Fuhrerscheinnummer,
Fuehrerscheinnummer,
Führerschein- Nr, Fuhrerschein-
Nr, Fuehrerschein- Nr, permis de
conduire,
rijbewijs,Rijbewijsnummer,
Numéro permis conduire
Belgium Tax Identification Dutch, German, Numéro de registre national, National registry number, tax
Number French numéro d'identification fiscale, identification number, tax number
belasting aantal,Steuernummer
Belgium Value Added German, French Numéro T.V.A, VAT number, tax identification
Tax (VAT) Number Umsatzsteuer-Identifikationsnummer, number
Umsatzsteuernummer
Brazilian Bank Account Brazilian Itauaccountno#, número conta Itaú account number, bank
Number Portuguese bancária, conta n, número conta, account number, Itaú bank
Conta bancária Itaú Número, account number, bank account
código de conta bancária, Conta code, account number
Sem, contan#, númeroconta#,
Conta Sem
Detecting content using data identifiers 678
Modifying system data identifiers
Table 26-22 Keyword list for international PII data identifiers (continued)
Brazilian National Brazilian Brasileira ID Legal, entidades Brazilian legal identification, legal
Registry of Legal Entities Portuguese jurídicas ID,Registro Nacional de entities ID, National Registry of
Number Pessoas Jurídicas n º, Legal Entities No
BrasileiraIDLegal#
Bulgarian Uniform Civil Bulgarian Униформ граждански номер, Uniform civil number, Uniform ID,
Number - EGN Униформ ID, Униформ Uniform civil ID, Bulgarian uniform
граждански ID, Униформ civil number
граждански не., български
Униформ граждански номер,
УниформгражданскиID#,
Униформгражданскине.#
China Passport Number Chinese 中国护照, 护照, 护照本 Chinese passport, passport,
passport book
Detecting content using data identifiers 679
Modifying system data identifiers
Table 26-22 Keyword list for international PII data identifiers (continued)
Codice Fiscale Italian codice fiscal, dati anagrafici, tax code, personal data, VAT
partita I.V.A., p. iva number, VAT number
Columbian Addresses Spanish Calle, Cll, Carrera, Cra, Cr, Street, St, Career, Avenue,
Avenida, Av, Dg, Diagonal, Diag, Diagonal, Transversal, sidewalk
Tv, Trans, Transversal, vereda
Columbian Cell Phone Spanish numero celular, número de Cellular number, telephone
Number teléfono, teléfono celular no., number, cellular telephone
numero celular# number
Columbian Personal Spanish cedula, cédula, c.c., c.c,C.C., C.C, Identification card, citizenship
Identification Number cc, CC, NIE., NIE, nie., nie, cedula card, identification document
de ciudadania, cédula de
ciudadanía, cc#, CC #, documento
de identificacion, documento de
identificación, Nit.
Columbian Tax Spanish NIT., NIT, nit., nit, Nit. TIN (tax identification number)
Identification Number
Czech Personal Czech Česká Osobní identifikační číslo, Czech Personal Identification
Identification Number Osobní identifikační číslo., Number, personal identification
identifikační číslo, čeština number, Czech identification
identifikační číslo number
Table 26-22 Keyword list for international PII data identifiers (continued)
France Health Insurance French carte vitale, carte d'assuré social Health card, social insurance card
Number
France Tax Identification French numéro d'identification fiscale Tax identification number
Number
France Value Added Tax French Numéro d'identification taxe sur Value added tax identification
(VAT) Number valeur ajoutée, Numéro taxe number, value added tax number,
valeur ajoutée, taxe valeur value added tax, VAT number,
ajoutée, Taxe sur la valeur French VAT number, SIREN
ajoutée, Numéro de TVA identification number
intracommunautaire, n° TVA,
numéro de TVA, Numéro de TVA
en France, français numéro de
TVA, Numéro d'identification
SIREN
French INSEE Code French INSEE, numéro de sécu, code INSEE, social security number,
sécu social security code
French Passport Number French Passeport français, Passeport, French passport, passport,
Passeport livre, Passeport carte, passport book, passport card,
numéro passeport passport number
French Social Security French sécurité sociale non., sécurité Social secuty number, social
Number sociale numéro, code sécurité security code, insurance number
sociale, numéro d'assurance,
sécuritésocialenon.#,
sécuritésocialeNuméro#
Detecting content using data identifiers 681
Modifying system data identifiers
Table 26-22 Keyword list for international PII data identifiers (continued)
Germany Value Added German Mehrwertsteuer, MwSt, Value added tax, value added tax
Tax (VAT) Number Mehrwertsteuer identification number, value added
Identifikationsnummer, tax number
Mehrwertsteuer nummer
Greek Tax Identification Greek Αριθμός Φορολογικού Μητρώου, Tax identification number, TIN, tax
Number AΦΜ, Φορολογικού Μητρώου registry number
Νο., τον αριθμό φορολογικού
μητρώου
Table 26-22 Keyword list for international PII data identifiers (continued)
Hungarian Tax Hungarian Magyar adóazonosító jel no, Hungarian tax identification
Identification Number adóazonosító szám, magyar tumber, tax identification number,
adószám, Magyar adóhatóság Hungarian tax number, Hungarian
no., azonosító szám, tax authority number, tax number,
adóazonosító no., adóhatóság no tax authority number
Hungarian VAT Number Hungarian Közösségi adószám, Általános Value added tax identification
forgalmi adó szám, number, sales tax number, value
hozzáadottérték adó, magyar added tax, Hungarian value added
Közösségi adószám tax number
Indonesian Identity Card Indonesian, Kartu Tanda Penduduk nomor, Identity card number, card
Number Portuguese número do cartão, Kartu identitas number, Indonesian identity card
Indonesia no, kartu no., Kartu number, card no., Indonesian
identitas Indonesia nomor, Nomor identity card number, ID number
Induk Kependudukan,
númerodocartão,kartuno.,
KartuidentitasIndonesiano
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
Central
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
East
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
West
Irish Personal Public Gaelic Gaeilge Uimhir Phearsanta Irish personal public service
Service Number Seirbhíse Poiblí, PPS Uimh., number, PPS no., personal public
uimhir phearsanta seirbhíse service number, service no., PPS
poiblí, seirbhíse Uimh, PPS Uimh, no., PPS service one
PPS seirbhís aon
Detecting content using data identifiers 683
Modifying system data identifiers
Table 26-22 Keyword list for international PII data identifiers (continued)
Israel Personal Hebrew, Arabic זהות,מספר זיהוי ישראלי,מספר זיהוי Israeli identity number, identity
Identification Number هوية,هويةاسرائيلية عدد,ישראלית number, unique identity number,
عدد هوية فريدة من نوعها,رقم الهوية, إسرائيليةpersonal ID, unique personal ID,
unique ID
Italy Driver's License Italian patente guida numero, patente di Driver's license number, driver's
Number guida numero, patente di guida, license
patente guida
Italy Health Insurance Italian TESSERA SANITARIA, tessera Health insurance card, Italian
Number sanitaria, tessera sanitaria health insurance card
italiana
Italian Passport Number Italian Repubblica Italiana Passaporto, Italian Republic passport,
Passaporto, Passaporto Italiana, passport, Italian passport, Italian
passport number, Italiana passport number, passport
Passaporto numero, Passaporto number
numero, Numéro passeport
italien, numéro passeport
Italy Value Added Tax Italian IVA, numero partita IVA, IVA#, VAT, VAT number, VAT#, VAT
(VAT) Number numero IVA number
Japan Passport Number Japanese 日本国旅券, パスポート, パスポー Japanese passport, passport,
ト数 passport number
Korea Passport Number Korean 한국어 여권, 여권, 여권 번호, 대한 Korean passport, passport,
민국 passport number, Republic of
Korea
Table 26-22 Keyword list for international PII data identifiers (continued)
Luxembourg National German, French Eindeutige ID-Nummer, Unique ID number, unique ID,
Register of Individuals Eindeutige ID, ID personnelle, personal ID, personal identification
Number Numéro d'identification number
personnel, IDpersonnelle#,
Persönliche
Identifikationsnummer,
EindeutigeID#
Malaysian MyKad Malay nombor kad pengenalan, kad Identification card number,
Number (MyKad) pengenalan no, kad pengenalan identification card no., Malaysian
Malaysia, bilangan identiti unik, identification card, unique identity
nombor peribadi, number, personal number
nomborperibadi#,
kadpengenalanno#
Mexican Personal Spanish Clave de Registro de Identidad Personal identity registration key,
Registration and Personal, Código de Mexican personal identification
Identification Number Identificación Personal mexicana, code, Mexican personal
número de identificación identification number
personal mexicana
Mexican Unique Spanish Única de registro de Población, Unique population registry, unique
Population Registry Code clave única, clave única de key, unique identity key, unique
identidad, clave personal personal identity, personal identity
Identidad, personal Identidad key
Clave, ClaveÚnica#,
clavepersonalIdentidad#
Mexico CLABE Number Spanish Clave Bancaria Estandarizada, Standardized banking code,
Estandarizado Banco número de standardized bank code number,
clave, número de clave, clave code number
número, clave#
Detecting content using data identifiers 685
Modifying system data identifiers
Table 26-22 Keyword list for international PII data identifiers (continued)
Netherlands Driver's Dutch RIJMEWIJS, permis de conduire, Driver's license, driving permit,
License Number rijbewijs, Rijbewijsnummer, driver's license number
RIJBEWIJSNUMMER
Netherlands Passport Dutch Nederlanden paspoort nummer, Dutch passport number, passport,
Number Paspoort, paspoort, Nederlanden passport number
paspoortnummer,
paspoortnummer
Netherlands Value Added Dutch, Frisian wearde tafoege tax getal, BTW Value added tax number, VAT
Tax (VAT) Number nûmer, BTW-nummer number
Norwegian Birth Number Norwegian fødsel nummer, Fødsel nr, fødsel Birth number
nei, fødselnei#, fødselnummer#
Detecting content using data identifiers 686
Modifying system data identifiers
Table 26-22 Keyword list for international PII data identifiers (continued)
Polish REGON Number Polish numer statystyczny, REGON, Statistical number, REGON
numeru REGON, number
numerstatystyczny#,
numeruREGON#
Polish Social Security Polish PESEL Liczba, społeczny PESEL number, social security
Number (PESEL) bezpieczeństwo liczba, społeczny number, social security ID, social
bezpieczeństwo ID, społeczny security code
bezpieczeństwo kod,
PESELliczba#,
społecznybezpieczeństwoliczba#
Polish Tax Identification Polish Numer Identyfikacji Podatkowej, Tax identification number, Polish
Number Polski numer identyfikacji tax identification number
podatkowej,
NumerIdentyfikacjiPodatkowej#
Romanian Numerical Romanian Cod Numeric Personal, cod Personal numeric code, personal
Personal Code identificare personal, cod unic identification code, unique
identificare, număr personal unic, identification code, identity
număr identitate, număr number, personal identification
identificare personal, number
număridentitate#,
CodNumericPersonal#,
numărpersonalunic#
Russian Passport Russian паспорт нет, паспорт, номер Passport no., passport, passport
Identification Number паспорта, паспорт ID, number, passport ID, Russian
Российской паспорт, Русский passport, Russian passport
номер паспорта, паспорт#, number
паспортID#, номерпаспорта#
Detecting content using data identifiers 687
Modifying system data identifiers
Table 26-22 Keyword list for international PII data identifiers (continued)
South African Personal Afrikaans nasionale identifikasie nommer, National identification number,
Identification Number nasionale identiteitsnommer, national identity number,
versekering aantal, persoonlike insurance number, personal
identiteitsnommer, unieke identity number, unique identity
identiteitsnommer, number, identity number
identiteitsnommer,
identiteitsnommer#,
versekeringaantal#,
nasionaleidentiteitsnommer#
Spain Driver's License Spanish permiso de conducción, permiso Driver's license, driver's license
Number conducción, Número licencia number, driving license, driving
conducir, Número de carnet de permit, driving permit number
conducir, Número carnet
conducir, licencia conducir,
Número de permiso de conducir,
Número de permiso conducir,
Número permiso conducir,
permiso conducir, licencia de
manejo, el carnet de conducir,
carnet conducir
Spanish Customer Spanish número cuenta cliente, código Customer account number,
Account Number cuenta, cuenta cliente ID, número account code, customer account
cuenta bancaria cliente, código ID, customer bank account
cuenta bancaria number, bank account code
Spanish DNI ID Spanish NIE número, Documento Nacional NIE number, national identity
de Identidad, Identidad único, document, unique identity,
Número nacional identidad, DNI national identity number, DNI
Número number
Spanish Passport Spanish libreta pasaporte, número passport book, passport number,
Number pasaporte, Número Pasaporte, Spanish passport, passport
España pasaporte, pasaporte
Detecting content using data identifiers 688
Modifying system data identifiers
Table 26-22 Keyword list for international PII data identifiers (continued)
Spanish Social Security Spanish Número de la Seguridad Social, Social security number
Number número de la seguridad social
Spanish Tax ID (CIF) Spanish número de contribuyente, número taxpayer number, corporate tax
de impuesto corporativo, número number, tax identification number,
de Identificación fiscal, CIF CIF number
número, CIFnúmero#
Swedish Passport Swedish Passnummer, pass, sverige pass, Passport number, passport,
Number SVERIGE PASS, sverige Swedish passport, Swedish
Passnummer passport number
Swiss AHV Number French Numéro AVS, numéro d'assuré, AVS number, insurance number,
identifiant national, numéro national identifier, national
d'assurance vieillesse, numéro insurance number, social security
de sécurité soclale, Numéro AVH number, AVH number
Table 26-22 Keyword list for international PII data identifiers (continued)
Ukraine Identity Card Ukrainian посвідчення особи України Ukraine identity card
Component Description
Patterns Define one or more regular expression patterns, separated by line breaks.
Validators Add or remove validators to perform validation checks on the data detected by the
pattern(s).
Data Entry Provide comma-separated data values for any validators that require data input.
Normalizer Select a normalizer to standardize the data before matching against it.
When you define a custom data identifier, the system assigns it to the "Wide" breadth
by default. This is not a limitation, however, because the actual scope of detection
is determined by the pattern(s) and validator(s) that you define.
1 Select Manage > Policies > The Data Identifiers screen lists all data identifiers available in the system.
Data Identifiers.
2 Select Add data identifier. Enter a Name for the custom data identifier.
3 Enter one or more Patterns You must enter at least one pattern for the custom data identifier to be valid.
to match data.
Separate multiple patterns by line breaks.
5 Select zero or more Including a validator to check and verify pattern matching is optional.
Validators.
See “Selecting pattern validators” on page 703.
6 Save the custom data Click Save at the upper left of the screen.
identifier.
Once you define and save a custom data identifier, it appears alphabetically
in the list of data identifiers at the Data Identifiers screen.
7 Implement the custom data The system lists all custom data identifiers beneath the Custom category
identifier in one or more for the "Content Matches data identifier" condition at the Configure Policy
policies. - Add Rule and the Configure Policy - Add Exception screens.
See “Configuring the Content Matches data identifier condition” on page 651.
You can configure optional validators at the policy instance level for custom
data identifiers.
Character Description
* The asterisk (*), pipe (|), and dot (.) characters are not supported for Data identifier
patterns.
|
\s The \s construct cannot be used to match a whitespace character; instead, use an actual
whitespace.
Grouping Grouping only works at the beginning of the pattern, for example:
\d{2} /19 \d{2} does not work; instead use \d{2} /[1][9] \d{2}
Groupings are allowed at the beginning of the pattern, like in the credit card Data identifier.
■ Special characters
You can follow each token by an optional quantifier.
See the section called “Quantifiers” on page 695.
Data identifier patterns only match a complete token or set of tokens.
Character Description
The data identifier pattern language includes five predefined special characters.
See Table 26-28 for descriptions of these special characters.
Character Description
Bracket expressions
Bracket expressions begin with [ and end with ], and contain at least one character
within in the body of the expression. For example, the bracket expression [abcd]
matches any of the letters "a," "b," "c," or "d."
You can include a character range within a bracket expression by separating two
characters with a hyphen: -. For example, the bracket expression [a-z] matches
the lower-case letters "a" through "z". Any two characters separated by - are
interpreted as a range. The relative ordering of the range does not matter: [a-z]
and [z-a] match the same characters.
You can include the characters "]" and "-" in your bracket expression if you follow
these rules:
■ The "]" character must appear as the first character in your bracket expression.
For example: []a-z] matches the "]" character or any lower-case letter between
"a" and "z."
■ The "-" character must appear as either the first or last character in your bracket
expression. If your bracket expression contains both the "]" and "-" characters,
the "]" must be the first character, and "-" the last character. For example: []-]
matches either "]" or "-."
Order of interpretation
Data identifier patters are interpreted from left to right. For example, the bracket
expression [a-d-z] is interpreted as the range a-d and then the literals - and z.
Quantifiers
You can follow any token in your data identifier pattern with a quantifier. The
quantifier specifies how many occurrences of the pattern to match. See Table 26-29
for a description of the quantifiers available in the data identifier pattern language.
Quantifier Description
? This quantifier specifies that the expression should match zero or one
occurrences of the preceding token.
{n} This quantifier specifies that the expression should match exactly n
occurrences of the preceding token.
{n, m} This quantifier specifies that the expression should match between
n and m occurrences of the preceding token (inclusive).
Detecting content using data identifiers 696
Creating custom data identifiers
Table 26-30 Available validators for system and custom data identifiers
Validator Description
ABA Checksum Every ABA routing number must start with the following two digits:
00-15,21-32,61-72,80 and pass an ABA specific, position-weighted check sum.
Advanced KRRN Validation Validates that 3rd and 4th digits are a valid month, that 5th and 6th digits are a valid
day, and the checksum matches the check digit.
Detecting content using data identifiers 697
Creating custom data identifiers
Table 26-30 Available validators for system and custom data identifiers
(continued)
Validator Description
Advanced SSN Validator checks whether SSN contains zeros in any group, the area number (first
group) is less than 773 and not 666, the delimiter between the groups is the same,
the number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
Argentinian Tax Identity Number Computes the checksum and validates the pattern against it.
Validation Check
Australian Company Number Computes the checksum and validates the pattern against it.
Validation Check
Australian Medicare Number Computes the checksum and validates the pattern against it.
Validation Check
Australian Tax File validation Computes the checksum and validates the pattern against it.
check
Austrian Social Security Number Computes the checksum and validates the pattern against it.
Validation Check
Belgian National Number Computes the checksum and validates the pattern against it.
Validation Check
Belgium VAT Number Validation Computes the checksum and validates the pattern against it.
Check
Brazil Election Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Brazilian Bank Account Number Computes the checksum and validates the pattern against it.
Validation Check
Brazilian National Registry of Computes the checksum and validates the pattern against it.
Legal Entities Number Validation
Check
Brazilian Natural Person Computes the checksum and validates the pattern against it.
Registry Number Validation
Check
British Columbia Personal Computes the checksum and validates the pattern against it.
Healthcare Number Validation
Check
Detecting content using data identifiers 698
Creating custom data identifiers
Table 26-30 Available validators for system and custom data identifiers
(continued)
Validator Description
Bulgarian Uniform Civil Number Computes the checksum and validates the pattern against it.
Validation Check
Chilean National Identification Computes the checksum and validates the pattern against it.
Number Validation Check
China ID checksum validator Computes the checksum and validates the pattern against it.
Codice Fiscale Control Key Computes the control key and checks if it is valid.
Check
Cusip Validation Validator checks for invalid CUSIP ranges and computes the CUSIP checksum
(Modulus 10 Double Add Double algorithm).
Custom Script* Enter a custom script to validate pattern matches for this Data identifier breadth.
Czech Personal Identity Number Computes the checksum and validates the pattern against it.
Validation Check
Denmark Personal Identification Computes the checksum and validates the pattern against it.
Number Validation Check
DNI control key check Computes the control key and checks if it is valid.
Driver's License Number WA Computes the checksum and validates the pattern against it.
State Validation Check
Driver's License Number WI Computes the checksum and validates the pattern against it.
State Validation Check
Drug Enforcement Agency Computes the checksum and validates the pattern against it.
Number Validation Check
Duplicate digits Ensures that a string of digits are not all the same.
Dutch Tax Identification Number Computes the checksum and validates the pattern against it.
Validation Check
Exact Match* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Detecting content using data identifiers 699
Creating custom data identifiers
Table 26-30 Available validators for system and custom data identifiers
(continued)
Validator Description
Exclude beginning characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Note: Beginning and ending validators concern the text of the match itself. Prefix
and suffix validators concern characters before and after matched text.
Exclude ending characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude exact match* Enter a comma-separated list of values. Each value can be of any length.
Exclude prefix* Enter a comma-separated list of values. Each value can be of any length.
Note: Prefix and suffix validators concern characters before and after matched text.
Beginning and ending validators concern the text of the match itself.
Exclude suffix* Enter a comma-separated list of values. Each value can be of any length.
Find keywords* Enter a comma-separated list of values. Each value can be of any length.
Finnish Personal Identification Computes the checksum and validates the pattern against it.
Number Validation Check
France VAT Number Validation Computes the checksum and validates the pattern against it.
Check
French Social Security Number Computes the checksum and validates the pattern against it.
Validation Check
German ID Number Validation Computes the checksum and validates the pattern against it.
Check
German Passport Number Computes the checksum and validates the pattern against it.
Validation Check
Germany VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Greek Tax Identification Number Computes the checksum and validates the pattern against it.
Validation Check
Hong Kong ID Computes the checksum and validates the pattern against it.
Hungarian Social Security Computes the checksum and validates the pattern against it.
Validation Check
Detecting content using data identifiers 700
Creating custom data identifiers
Table 26-30 Available validators for system and custom data identifiers
(continued)
Validator Description
Hungarian Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Hungarian VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Indonesian Kartu Tanda Computes the checksum and validates the pattern against it.
Penduduk Validation Check
INSEE Control Key Validator computes the INSEE control key and compares it to the last 2 digits of the
pattern.
IP Basic Check Every IP address must match the format x.x.x.x and every number must be less than
256.
IP Octet Check Every IP address must match the format x.x.x.x, every number must be less than
256, and no IP address can contain only single-digit numbers (1.1.1.2).
IP Reserved Range Check Checks whether the IP address falls into any of the "Bogons" ranges. If so the match
is invalid.
IPv6 Basic Validation Check Every IPv6 address must match the format xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx
and every number must be lower than ffff.
Ipv6 Medium Validation Check Every IPv6 address must match the format xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx
and every number must be lower than ffff. No IPv6 address can start with 0.
Ipv6 Reserved Validation Check Every IPv6 address must match the format xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx
and every number must be lower than ffff. No IPv6 address can start with 0. Each
IPv6 address must be fully compressed.
Irish Personal Public Service Computes the checksum and validates the pattern against it.
Number Validation Check
Israel Personal Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Italy VAT Number Validation Computes the checksum and validates the pattern against it.
Check
Japanese Juki-Net ID Validation Computes the checksum and validates the pattern against it.
Check
Japanese My Number Validation Computes the checksum and validates the pattern against it.
Check
Detecting content using data identifiers 701
Creating custom data identifiers
Table 26-30 Available validators for system and custom data identifiers
(continued)
Validator Description
Luhn Check Validator computes the Luhn checksum which every Canadian Insurance Number
must pass.
Luxembourg National Register Computes the checksum and validates the pattern against it.
of Individuals Number Validation
Check
Malaysian MyKad Number Computes the checksum and validates the pattern against it.
Validation Check
Mexican Unique Population Computes the checksum and validates the pattern against it.
Registry Code Validation Check
Mexico CLABE Number Computes the checksum and validates the pattern against it.
Validation Check
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the complete match.
National Provider Identifier Computes the checksum and validates the pattern against it.
Number Validation Check
National Securities Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Netherlands VAT Number Computes the checksum and validates the pattern against it.
Validation Check
New Zealand National Health Computes the checksum and validates the pattern against it.
Index Number Validation Check
Norwegian Birth Number Computes the checksum and validates the pattern against it.
Validation Check
Polish ID Number Validation Computes the checksum and validates the pattern against it.
Check
Polish REGON Number Computes the checksum and validates the pattern against it.
Validation Check
Polish Social Security Number Computes the checksum and validates the pattern against it.
Validation Check
Detecting content using data identifiers 702
Creating custom data identifiers
Table 26-30 Available validators for system and custom data identifiers
(continued)
Validator Description
Polish Tax ID Number Validation Computes the checksum and validates the pattern against it.
Check
Require beginning characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Require ending characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Romanian Numerical Personal Computes the checksum and validates the pattern against it.
Code Check
Russian Taxpayer Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Singapore NRIC Computes the Singapore NRIC checksum and validates the pattern against it.
South African Personal Computes the checksum and validates the pattern against it.
Identification Number Validation
Check
Spanish Customer Account Computes the checksum and validates the pattern against it.
Number Validation Check
Spanish SSN Number Validation Computes the checksum and validates the pattern against it.
Check
Spanish Tax ID Number Computes the checksum and validates the pattern against it.
Validation Check
SSN Area-Group number For a given area number (first group), not all group numbers (second group) might
have been assigned by the SSA. Validator eliminates SSNs with invalid group
numbers.
Swedish Personal Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Swiss Social Security Number Computes the checksum and validates the pattern against it.
Validation Check
Thailand Personal Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Detecting content using data identifiers 703
Creating custom data identifiers
Table 26-30 Available validators for system and custom data identifiers
(continued)
Validator Description
Turkish Identification Number Computes the checksum and validates the pattern against it.
Validation Check
UK Drivers License Every UK drivers license must be 16 characters and the number at the 8th and 9th
position must be larger than 00 and smaller than 32.
Venezuela Identification Number Computes the checksum and validates the pattern against it.
Validation Check
Verhoeff Validation Check Computes the checksum and validates the pattern against it.
Ukraine Identity Card Check Computes the checksum and validates the pattern against it.
Note: The active validators that allow for and define input are not to be confused
with the "Optional validators" that can be configured for any runtime instance of a
particular data identifier. Optional validators are always configurable at the instance
level. Active validators are only configurable at the system level.
Select a validator from the "Validation Checks" list on the left, then click Add
Validator to the right. If the validator requires input, provide the required data using
a comma-separated list and then click Add Validator.
See “Selecting pattern validators” on page 703.
Detecting content using data identifiers 704
Creating custom data identifiers
6 Click Add Validator when you are done entering the values.
The validator is added to the Active Validators list.
7 To remove a validator, select it in the Active Validators list and click the red
X icon.
8 Click Save to save the configuration of the data identifier.
Normalizer Description
Note: Refer to the Symantec Data Loss Prevention Detection Customziation Guide
for details on using the Symantec Data Loss Prevention Scripting Language.
This section provides best practices for implementing data identifier policies.
Table 26-32 summarizes the best practices in this section.
Use data identifiers instead of regular expressions when See “Use data identifiers instead of regular expressions
possible. to improve accuracy” on page 706.
Modify data identifier definitions when you want tuning to See “Modify data identifier definitions when you want tuning
apply globally. to apply globally” on page 707.
Close system-defined data identifiers before modifying See “Clone system-defined data identifiers before
them. modifying to preserve original state” on page 707.
Consider using multiple data identifier breadth in parallel See “Consider using multiple breadths in parallel to detect
different severities of confidential data” on page 708.
Avoid matching on the Envelope over HTTP See “Avoid matching on the Envelope over HTTP to reduce
false positives” on page 708.
Use the Randomized US SSN data identifier to detect See “Use the Randomized US SSN data identifier to detect
traditional and randomized SSNs SSNs” on page 708.
Use unique match counting to improve accuracy and ease See “Use unique match counting to improve accuracy and
remediation ease remediation” on page 709.
Note: The data identifier pattern language is a limited subset of the regular
expression language. Not all regular expression constructs or characters are
supported for data identifier patterns. See “Using the data identifier pattern language”
on page 693.
to SSNs issued on or after June 25, 2011. It does not apply to SSNs issued before
that date.
To support the new randomized SSN scheme, Symantec Data Loss Prevention
provides the system-defined Randomized US Social Security Number (SSN)
data identifier.
See “Randomized US Social Security Number (SSN)” on page 1051.
The Randomized US SSN data identifier detects both traditional and randomized
SSNs. The Randomized US SSN data identifier replaces the US SSN data identifier,
which only detects traditional SSNs. In addition, the patterns for the Randomized
US SSN data identifier are updated for version 14.0.
Symantec recommends that you use the Randomized US SSN data identifier for
all new policies that you want to use to detect SSNs, and that you update your
existing SSN policies to use the Randomized US SSN data identifier. For your
existing policies that already implement the traditional US SSN data identifier, you
can add the Randomized US SSN data identifier as an OR'd rule so that both run
in parallel as you test the policy to ensure it accurately detects both styles of SSNs.
See “Updating policies to use the Randomized US SSN data identifier” on page 689.
Chinese, Japanese, and Korean (CJK) languages with token verification enabled for the
server
See “About keyword matching for Chinese, Japanese, and Korean (CJK) languages”
on page 711.
Mixed languages
Server Enable token verification on the detection server and use whole word matching
See “Enabling and using CJK token verification for server keyword matching” on page 719.
Behavior Description
Whole word matching With whole word matching, keywords match at word boundaries only (\W in the regular
expression lexicon). Any characters other than A-Z, a-z, and 0-9 are interpreted as word
boundaries.
With whole word matching, keywords must have at least one alphanumeric character (a letter
or a number). A keyword consisting of only white-space characters, such as "..", is ignored.
Quotation marks Do not use quotation marks when you enter keywords or phrases because quotes are interpreted
literally and will be required in the match.
White space The systems strips out the white space before and after keywords or key phrases. Each
whitespace within a keyword phrase is counted. In addition to actual spaces, all characters
other than A-Z, a-z, and 0-9 are interpreted as white spaces.
Case sensitivity The case sensitivity option that you choose applies to all keywords in the list for that condition.
Detecting content using keyword matching 713
Introducing keyword matching
Behavior Description
Plurals and verb All plurals and verb inflections must be specifically listed. If the number of enumerations
inflections becomes complicated use the wildcard character (asterisk [*]) to detect a keyword suffix (in
whole word mode only).
Keyword phrases You can enter keyword phrases, such as social security number (without quotes). The system
looks for the entire phrase without returning matches on individual constituent words (such as
social or security).
Keyword variants The system only detects the exact keyword or key phrase, not variants. For example, if you
specify the key phrase social security number, detection does not match a phrase that
contains two spaces between the words.
Matching multiple The system implies an OR between keywords. That is, a message component matches if it
keywords contains any of the keywords, not necessarily all of them. To perform an ALL (or AND) keyword
match, combine multiple keyword conditions in a compound rule or exception.
Alpha-numeric During keyword matching, only a letter or a digit is considered a valid keyword start position.
characters Special characters (non-alphanumeric) are treated as delimiters (ignored). For example, the
ampersand character ("&") and the underscore character ("_") are special characters and are
not considered for keyword start position.
____keyword__
Keyword
&&akeyword&&
123Keyword__
For these examples, the valid keyword start positions are as follows: k, K, a, and 1.
Note: This same behavior applies to keyword validators implemented in data identifiers.
Proximity The word distance (proximity value) is exclusive of detected keywords. Thus, a word distance
of 10 allows for a proximity window of 12 words.
®CONFIDENTIAL
key phrase internal use only internal use only internal use
hacker hacker
hacks
privilege prevent
privy
privity
privs
priv
keyword dictionary account number, account ps, american If any keyword or phrase is amx
express, americanexpress, amex, bank present, the data is matched:
creditcard
card, bankcard, card num, card number,
cc #, cc#, ccn, check card, checkcard, amex master card
credit card, credit card #, credit card credit card car
number, credit card#, debit card,
debitcard, diners club, dinersclub, mastercard
discover, enroute, japanese card bureau,
jcb, mastercard, mc, visa, (etc....)
If token verification is enabled, the message size must be sufficient for the token
validator to recognize the language. For example: the message “東京都市部の人
口” is too small fo a message for the token validation process to recognize the
language of the message. The following message is a sufficient size for token
validation processing:
今朝のニュースによると東京都市部の人口は増加傾向にあるとのことでした。 全
国的な人口減少の傾向の中、東京への一極集中を表しています。
See “About keyword matching for Chinese, Japanese, and Korean (CJK) languages”
on page 711.
Token validation for CJK language keywords is not available on the endpoint. To
match CJK on the endpoint, you configure the condition to match on whole words
only.
See “Updating the Drug, Disease, and Treatment keyword lists for your HIPAA and
Caldicott policies” on page 720.
See “Keep the keyword lists for your HIPAA and Caldicott policies up to date”
on page 722.
See “HIPAA and HITECH (including PHI) policy template” on page 1194.
See “Caldicott Report policy template” on page 1124.
Match on whole or partial keywords Separate each keyword or phrase by a newline or comma.
and key phrases
See “Keyword matching examples” on page 713.
Match on the wildcard asterisk (*) Match the wildcard at the end of a keyword, in whole word mode only.
character
See “Keyword matching examples” on page 713.
Find keywords Implement one or more keywords in data identifiers to refine the scope of
detection.
Policy rules and exceptions You can implement keyword matching conditions in policy rules and exceptions.
Keyword dictionary If you have a large dictionary of keywords, you can index the keyword list.
See “Use VML to generate and maintain large keyword dictionaries” on page 723.
CJK token verification Enable on the detection server for CJK languages and match on whole words
only.
Action Description
Enter the match type. Select if you want the keyword match to be:
Choose the keyword Select the keyword separator you to delimit multiple keywords:
separator.
Newline or Comma.
Match any keyword. Enter the keyword(s) or key phrase(s) you want to match. Use the separator you have selected
(newline or comma) to delimit multiple keyword or key phrase entries.
You can use the asterisk (*) wildcard character at the end of any keyword to match one or more
suffix characters in that keyword. If you use the asterisk wildcard character, you must match
on whole words only. For example, a keyword entry of confid* would match on "confidential"
and "confide," but not "confine." As long as the keyword prefix matches, the detection engine
matches on the remaining characters using the wildcard.
Action Description
Configure keyword Keyword proximity matching lets you specify a range of detection among keyword pairs.
proximity matching
See “About keyword proximity” on page 712.
(optional).
To implement keyword proximity matching:
■ Select (check) the Keyword Proximity matching option in the "Conditions" section of the
rule builder interface.
■ Click Add Pair of Keywords.
■ Enter a pair of keywords.
■ Specify the Word distance.
The maximum distance between keywords is 999, as limited by the three-digit length of the
“Word distance” field. The word distance is exclusive of detected keywords. For example,
a word distance of 10 allows for a range of 12 words, including the two words comprising
the keyword pair.
■ Repeat the process to add additional keyword pairs.
The system connects multiple keyword pair entries the OR Boolean operator, meaning that
the detection engine evaluates each keyword pair independently.
Match on whole or Select the option On whole words only to match on whole keywords only (by default this
partial keywords. option is selected).
You must match on whole words only if you use the asterisk (*) wildcard character in any
keyword you enter in the list.
Configure match Keyword matching lets you specify how you want to count condition matches.
conditions. Select one of the following options:
Action Description
Select components Keyword matching detection supports matching across message components.
to match on.
See “Selecting components to match on” on page 400.
Select one or more message components to match on:
Note: On the endpoint the DLP Agent matches on the entire message, not individual
components.
Also match one or Select this option to create a compound condition. All conditions must be met to report a match.
more additional
You can Add any available condition from the list.
conditions.
See “Configuring compound match conditions” on page 406.
Enable keyword token verification for CJK describes how to enable and use token
verification for CJK keywords.
Detecting content using keyword matching 720
Configuring keyword matching
Updating the Drug, Disease, and Treatment keyword lists for your
HIPAA and Caldicott policies
If you have created a policy derived from the HIPAA or Caldicott template and have
not made any changes or customizations to the derived policy, after upgrade you
can create a new policy from the appropriate template and remove the old policy
from production. If you have made changes to a policy derived from either the
HIPAA or Caldicott policy template and you want to preserve these changes, you
can copy the updated keyword lists from either the HIPAA or Caldicott policy
template and use the copied keyword lists to update your HIPAA or Caldicott policies.
See “About updates to the Drug, Disease, and Treatment keyword lists” on page 715.
See “Keep the keyword lists for your HIPAA and Caldicott policies up to date”
on page 722.
To update the Drug, Disease, and Treatment keyword lists for HIPAA and Caldicott
policies provides instructions for updating the keyword lists for your HIPAA and
Caldicot policies.
Detecting content using keyword matching 721
Best practices for using keyword matching
To update the Drug, Disease, and Treatment keyword lists for HIPAA and Caldicott
policies
1 Create a new policy from a template and choose either the HIPAA or Caldicott
template.
See “Creating a policy from a template” on page 374.
2 Edit the detection rules for the policy.
See “Configuring policy rules” on page 394.
3 Select the Patient Data and Drug Keywords (Keyword Match) rule.
4 Select the Content Matches Keyword condition.
5 Select all the keywords in the Match any Keyword data field and copy them
to the Clipboard.
6 Paste the copied keywords to a text file named Drug Keywords.txt.
7 Cancel the rule edit operation to return to the policy Detection tab.
8 Repeat the same process for the Patient Data and Treatment Keywords
(Keyword Match) rule.
9 Copy and paste the keywords from the condition to a text file named Treatment
Keywords.txt.
10 Repeat the same process for the Patient Data and Disease Keywords
(Keyword Match) rule.
11 Copy and paste the keywords from the condition to a text file named Disease
Keywords.txt.
12 Update your HIPAA and Caldicott policies derived from the HIPAA or Caldicott
templates using the keyword *.txt files you created.
13 Test your updated HIPAA and Caldicott policies.
Enable linguistic validation for CJK keyword See “Enable token verification on the server to reduce false
detection on the server. positives for CJK keyword detection” on page 722.
Update keyword lists for your Caldicott and HIPAA See “Keep the keyword lists for your HIPAA and Caldicott policies
policies. up to date” on page 722.
Tune keyword validators to improve data identifier See “Tune keywords lists for data identifiers to improve match
accuracy. accuracy” on page 723.
Use VML to profile long keyword lists and See “Use VML to generate and maintain large keyword
dictionaries dictionaries” on page 723.
Use keyword matching for metadata detection. See “Use keyword matching to detect document metadata”
on page 723.
Keep the keyword lists for your HIPAA and Caldicott policies up to
date
For each Symantec Data Loss Prevention relese, the Drug, Disease, and Treatment
keyword lists are updated based on information from the U.S. Federal Drug
Administration (FDA) and other sources. These keyword lists are used in the HIPAA
and HITECH (including PHI) and Caldicott Report policy templates.
See “About updates to the Drug, Disease, and Treatment keyword lists” on page 715.
Detecting content using keyword matching 723
Best practices for using keyword matching
If you have upgraded to the latest Data Loss Prevention version and you have
existing policies derived from either the HIPAA or Caldicott policy template, consider
updating your HIPAA and Caldicott policies to use the Drug, Disease, and Treatment
keyword lists provided with this Data Loss Prevention version.
See “Updating the Drug, Disease, and Treatment keyword lists for your HIPAA and
Caldicott policies” on page 720.
Note: Data Identifier pattern matching is based on the regular expression syntax.
However, not all regular expression constructs listed in the table below are supported
by Data Identifier patterns. See “About data identifier patterns” on page 646.
[] Elements inside brackets are a character class (For example, [abc] matches 1 character:
a, b, or c.)
Detecting content using regular expressions 727
Configuring the Content Matches Regular Expression condition
^ At the beginning of a character class, negates it (For example, [^abc] matches anything
except a, b, or c.)
+ Following a regular expression means 1 or more (For example, \d+ means 1 or more digit.)
* Following a regular expression means any number (For example, \d* means 0, 1, or more
digits.)
(?i) At the beginning of a regular expression makes the expression case-insensitive (Regular
expressions are case-sensitive by default.)
| Means OR (For example, A|B means regular expression A or regular expression B.)
Action Description
Check for existence reports a match count of 1 if there are one or more matches. For
compound rules or exceptions, all conditions must be configured this way.
Count all matches reports the sum of all matches; applies if any condition uses this
parameter.
Match on one or more Configure cross-component matching by selecting one or more message components to
message components. match on.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Use Data Identifiers instead of regular expressions where See “Use regular expressions sparingly to support efficient
possible. performance” on page 730.
Detecting content using regular expressions 729
Best practices for using regular expression matching
Use regular expressions sparingly to support efficient policy See “Test regular expressions before deployment to
performance. improve accuracy” on page 730.
Use look ahead and behind characters to improve regular See “Use look ahead and look behind characters to
expression performance. improve regular expression accuracy” on page 729.
Test regular expressions for accuracy and performance. See “Test regular expressions before deployment to
improve accuracy” on page 730.
Operation Construct
Table 28-4 Look ahead and look behind standard sections (continued)
Operation Construct
and
(?<=(^|(?:[^)+\d][^-\w+])|\t))
Canadian Social Insurance Numbers This policy detects patterns indicating Canadian social insurance numbers.
UK Data Protection Act 1998 This policy protects personal identifiable information.
EU Data Protection Directives This policy detects personal data specific to the EU directives.
UK Human Rights Act 1998 This policy enforces Article 8 of the act for UK citizens.
SWIFT Codes (International banking) This policy detects codes that banks use to transfer money across
international borders.
UK National Health Service Number This policy detects personal identification numbers issued by the NHS.
See “UK National Health Service (NHS) Number policy template” on page 1232.
Codice Fiscale Italian codice fiscal, dati anagrafici, partita tax code, personal data, VAT
I.V.A., p. iva number, VAT number
French INSEE Code French INSEE, numéro de sécu, code sécu INSEE, social security number,
social security code
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
Central
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
East
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
West
Swiss AHV Number French Numéro AVS, numéro d'assuré, AVS number, insurance number,
identifiant national, numéro national identifier, national
d'assurance vieillesse, numéro de insurance number, social security
sécurité soclale, Numéro AVH number, AVH number
Note: File type matching does not detect the content of the file; it only detects the
file type based on its binary signature. To detect content, use a content matching
condition.
See “Configuring the Message Attachment or File Type Match condition” on page 740.
See “About custom file type identification” on page 737.
Note: The Symantec Data Loss Prevention Scripting Language only identifies
custom file formats; it does not extract content from custom file types.
the total file count is more than five files. An email with six files attached would
match this condition, but an email with a single ZIP archive file attachment would
not match, even if the ZIP archive contained 20 files.
The default value for the Total Attachment File Count condition is zero. This
condition has a character limit of seven digits. You will encounter validation
errors if you include decimal points or other characters when specifying this
value.
Note: If the Total Attachment File Size and Total Attachment File Count
conditions are ANDed together with a content matching rule, the rules will be applied
to all message components. Components will only match one condition in an
incident, even if they violate more than one of the conditions.
The Total Attachment File Size and Total Attachment File Count rules are
available on both Windows and Mac endpoints. On Windows, they apply to Microsoft
Outlook and IBM (Lotus) Notes events. On Mac, they apply to Outlook for Mac
events.
See “Configuring the Message Attachment or File Size Match condition” on page 741.
Message Attachment or File Detect or except specific files and attachments by type.
Type Match
See “About file type matching” on page 736.
See “Configuring the Message Attachment or File Type Match condition” on page 740.
Detecting file properties 740
Configuring file property matching
Message Attachment or File Detect or except specific files and attachments by size.
Size Match
See “About file size matching” on page 738.
See “Configuring the Message Attachment or File Size Match condition” on page 741.
Message Attachment or File Detect or except specific files and attachments by name.
Name Match
See “About file name matching” on page 739.
See “Configuring the Message Attachment or File Name Match condition” on page 742.
Action Description
Select the file type or types Select all of the formats you want to match.
to match.
See “Supported formats for file type identification” on page 790.
To select all formats within a certain category (for example, all word-processing formats),
click the section heading.
The system implies an OR operator among all file types you select. For example, if you
select Microsoft Word and Microsoft Excel file type attachments, the system detects all
messages with Word or Excel documents attached, not messages with both attachment
types
Match on attachments only. This condition only matches on the Message Attachments component.
Also match on one or more Select this option to create a compound condition. All conditions must match to trigger
additional conditions. or except an incident.
Action Description
Single File Size Select More Than to specify the minimum file size of the file to match or Less Than to
specify the maximum file size to qualify a match.
Enter a number, and select the unit of measure: bytes, kilobytes (KB), megabytes (MB),
or gigabytes (GB).
Total Attachment File Size Enter a number, and select the unit of measure: bytes, kilobytes (KB), megabytes (MB),
or gigabytes (GB) to qualify a match.
Total Attachment File Enter a number to specify the number of files to qualify a match
Count
Match on the. Select one or both of the following message components on which to base the match:
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Action Description
Specify the File Name. Specify the file name to match using the DOS pattern matching language to represent
patterns in the file name.
Separate multiple matching patterns with commas or by placing them on separate lines.
Match on attachments. This condition only matches on the Message Attachments component.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Operator Description
* Use an asterisk as a wild card to match any number of characters (including none).
To match a Word file name that begins with ENG- followed ENG-????????.doc
by any eight characters:
If you are not sure how many characters are in the name: ENG-*.*
To match all file names that begin with ENG- and all file Enter as comma separated values:
names that begin with ITA-:
ENG-*.*,ITA-*
ENG-*.*
ITA-*
Action Description
Enter the Script Name. Specify the name of the script. The name must be unique across policies.
Detecting file properties 746
Best practices for using file property matching
Action Description
Enter the custom file Enter the File Type Matches Signature script for detecting the binary signature of the custom
type script. file type.
See the Symantec Data Loss Prevention Detection Customization Guide for details on
writing custom scripts.
Match only on This condition only matches on the Message Attachments component.
attachments.
See “Detection messages and message components” on page 368.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
For custom file type detection, use the DLP Scripting Language. Refer to the
Symantec Data Loss Prevention Detection Customization Guide.
Example
Any characters you enter (other than the DOS operators) match exactly.
For example, to match a Word file name that begins with ENG- followed by any eight characters, enter:
ENG-????????.doc
If you are not sure how many characters follow ENG-, enter: ENG-*.*
To match all file names that begin with ENG- and all file names that begin with ITA-, enter: ENG-*.*,ITA-* (comma
separated), or you can separate the file names by line space.
Protocol Description
Email/SMTP Simple Mail Transfer Protocol (SMTP) is a protocol for sending email messages between servers.
FTP The file transfer protocol (FTP) is used on the Internet for transferring files from one computer
to another.
HTTP The hypertext transfer protocol (HTTP) is the underlying protocol that supports the World Wide
Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers
and browsers should take in response to various commands.
HTTP/SSL Hypertext transfer protocol over Secure Sockets Layer (HTTPS) is a protocol for sending data
securely between a client and server.
Detecting network incidents 750
Configuring the Protocol Monitoring condition for network detection
Protocol Description
IM:MSN Instant messaging is a type of communications service that enables you to create a private chat
room with another individual.
IM:AIM
Data Loss Prevention supports detection on the following IM channels.:
IM:AIM
■ AIM instant messaging
■ MSN instant messaging
■ Yahoo! Instant messaging
NNTP Network News Transport Protocol (NNTP), which is used to send, distribute, and retrieve USENET
messages.
TCP:custom_protocol The Transmission Control Protocol (TCP) is used to reliably exchange data between computers
across the Internet. This option is only available if you have defined a custom TCP port.
Action Description
Add or modify the Protocol Add a new Protocol or Endpoint Monitoring condition to a policy rule or exception, or
or Endpoint Monitoring modify an existing rule or exception condition.
condition.
See “Configuring policies” on page 390.
Action Description
Select one or more To detect Network incidents, select one or more Protocols.
protocols to match.
■ Email/SMTP
■ FTP
■ HTTP
■ HTTPS/SSL
■ IM:AIM
■ IM:MSN
■ IM:Yahoo
■ NNTP
Configure endpoint See “Configuring the Endpoint Monitoring condition” on page 756.
monitoring.
Match on the entire The Protocol Monitoring condition matches on the entire message, not individual message
message. components.
The Envelope option is selected by default. You cannot select individual message
components.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Protocol Description
Email/SMTP Simple Mail Transfer Protocol (SMTP) is a protocol for sending email messages between servers.
Detecting endpoint events 754
Introducing endpoint event detection
Protocol Description
FTP The file transfer protocol (FTP) is used on the Internet for transferring files from one computer
to another.
HTTP The hypertext transfer protocol (HTTP) is the underlying protocol that supports the World Wide
Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers
and browsers should take in response to various commands.
HTTP/SSL Hypertext transfer protocol over Secure Sockets Layer (HTTPS) is a protocol for sending data
securely between a client and server.
Destination Description
CD/DVD The CD/DVD burner on the endpoint computer. This destination can be any type of
third-party CD/DVD burning software.
Removable Storage Device Detect data that is transferred to any eSATA, FireWire, or USB connected storage
device.
Copy to Network Share Detect data that is transferred to any network share or remote file access.
Printer/Fax Detect data that is transferred to a printer or to a fax that is connected to the endpoint
computer. This destination can also be print-to-file documents.
Clipboard The Windows Clipboard used to copy and paste data between Windows applications.
Endpoint Device or Class ID Detect when users move endpoint data to a specific device.
Endpoint Location Detect when the endpoint is on or off the corporate network.
Note: This topic does not address network protocol monitoring configuration.
See “Configuring the Protocol Monitoring condition for network detection”
on page 750.
Detecting endpoint events 757
Configuring endpoint event detection conditions
Action Description
Add or modify the Add a new Protocol or Endpoint Monitoring condition to a policy
Endpoint Monitoring rule or exception, or modify an existing rule or exception condition.
condition.
See “Configuring policy rules” on page 394.
Select one or more To detect Endpoint incidents, select one or more Endpoint Protocols:
endpoint protocols
■ Email/SMTP
to match.
■ HTTP
■ HTTPS/SSL
■ IM:MSN
■ IM:AIM
■ IM:Yahoo
■ FTP
Select one or more To detect when users move data on the endpoint, select one or more
endpoint Endpoint Destinations:
destinations.
■ Local Drive
■ CD/DVD
■ Removable Storage Device
■ Copy to Network Share
■ Printer/Fax
■ Clipboard
Monitor endpoint To detect when endpoint applications access files, select the
applications. Application File Access option.
Match on the entire The DLP Agent evaluates the entire message, not individual message
message. components.
Action Description
Also match one or Select this option to create a compound condition. All conditions must
more additional match to trigger or except an incident.
conditions.
You can Add any condition available from the list.
Action Description
Add or modify the Add a new Endpoint Location detection condition to a policy rule or
Endpoint Location exception, or modify an existing policy rule or exception.
condition.
See “Configuring policy rules” on page 394.
Select the location Select one of the following endpoint locations to monitor:
to monitor.
■ Off the corporate network
Select this option to detect or except events when the endpoint
computer is off of the corporate network.
■ On the corporate network
Select this option to detect or except events when the endpoint
computer is on the corporate network.
This option is the default selection.
Match on the entire The DLP Agent evaluates the entire message, not individual message
message. components.
Action Description
Also match one or Select this option to create a compound condition. All conditions must
more additional match to trigger or except an incident.
conditions.
You can Add any condition available from the list.
Action Description
Add or modify an Add a new Endpoint Device Class or ID condition to a policy rule or
Endpoint Device exception, or modify an existing one.
condition.
See “Configuring policy rules” on page 394.
Select one or The condition matches when users move data from an endpoint computer
more devices. to the selected device(s).
Match on the The DLP Agent matches on the entire message, not individual message
entire message. components.
Action Description
Also match one Select this option to create a compound condition. All conditions must
or more match to trigger or except an incident.
additional
You can Add any condition available from the drop-down menu.
conditions.
See “Configuring compound match conditions” on page 406.
Note: You can use the DeviceID utility for Windows and Mac endpoints to generate
removable storage device information. See “About the Device ID utilities”
on page 1997.
CD Drive IDE\\DISKST9160412ASG__________________0002SDM1\\4&F4ACADA&0&0\.0\.0
SD Card SDC&346128262
■ You might often combine group and detection methods on the endpoint. Keep
in mind that the policy language ANDs detection and group methods, whereas
methods of the same type, two rules for example, are ORed.
See “Policy detection execution” on page 371.
Chapter 33
Detecting described
identities
This chapter includes the following topics:
fr, cu All SMTP email that is addressed Any email that is addressed to
to a .fr (France) or .cu (Cuba) French company with the .com
addresses. extension instead of .fr.
company.com All SMTP email that is addressed Any SMTP email that is not
to the specific domain URL, such addressed to the specific domain
as symantec.com. URL.
3rdlevel.company.com All SMTP email that is addressed Any SMTP email that is not
to the specific 3rd level domain, addressed to the specific 3rd level
such as dlp.symantec.com. domain.
[email protected] All SMTP email that is addressed Any email not specifically
to [email protected]. addressed to [email protected],
such as:
All SMTP email that is addressed
to [email protected] (the ■ [email protected]
pattern is not case-sensitive). ■ [email protected]
■ [email protected]
*/dlp/qa/test/local/Sym*
Sender/User Matches Pattern Matches on an email address, domain address, IP address, Windows user
name, or IM screen name/handle.
Recipient Matches Pattern Matches on an email address, domain address, IP address, or newsgroup.
Action Description
john.smith, jsmith
IM Screen Name
Enter one or more IM screen names that are used in instant messaging systems, for
example:
john_smith, jsmith
IP Address
Enter one or more IP addresses that map to the domain you want to match, for example:
Select a Reusable Sender You can select a Sender Pattern that you have saved for reuse in your policies. Select
Pattern Reusable Sender Pattern, then choose the pattern you want from the dropdown list.
Detecting described identities 768
Configuring described identity matching policy conditions
Action Description
Match on the entire message. This condition matches on the entire message. The Envelope option is selected by
default. You cannot select any other message component.
Also match additional Select this option to create a compound condition. All conditions must match to trigger
conditions. an incident.
5 To edit a saved Reusable Sender Pattern, on the Manage > Policies >
Sender/Recipient Patterns page, click the dropdown arrow next to the name
of the pattern you want to edit, then select Edit.
6 To delete a saved Reusable Sender Pattern, on the Manage > Policies >
Sender/Recipient Patterns page, click the dropdown arrow next to the name
of the pattern you want to delete, then select Delete.
Note: You cannot delete a Reusable Sender Pattern that is currently in use in
any policy.
Action Description
Enter one or more IP address patterns that resolve to the domain that you want to
match. You can use the asterisk (*) wildcard character for one or more fields. You can
enter both IPv4 and IPv6 addresses separated by commas.
URL Domain
Enter one or more URL Domains to match Web-based traffic, including Web-based
email and postings to a Web site. For example, if you want to prohibit the receipt of
certain types of data using Hotmail, enter hotmail.com.
Detecting described identities 770
Configuring described identity matching policy conditions
Action Description
Select a Reusable Recipient You can select a Recipient Pattern that you have saved for reuse in your policies.
Pattern Select Reusable Recipient Pattern, then choose the pattern you want from the
dropdown list.
Configure match counting. Select one of the following options to specify the number of email recipients that must
match:
■ All recipients must match (Email Only) does not count a match unless ALL email
message recipients match the specified pattern.
■ At least _ recipients must match (Email Only) lets you specify the minimum
number of email message recipients that must match to be counted.
Select one of the following options to specify how you want to count the matches:
Match on the entire message. This condition matches on the entire message. The Envelope option is selected by
default. You cannot select any other message component.
Also match additional Select this option to create a compound condition. All conditions in a rule or exception
conditions. must match to trigger an incident.
You can Add any available condition from the list.
Note: You cannot delete a Reusable Recipient Pattern that is currently in use
in any policy.
For both described identity matching rules, the system implies an OR between all
comma-separated list items and between all fields. For example, if any single email
address among a list of email addresses matches, the condition reports (or excepts)
an incident. Or, if either an email address, a domain name, or an IP address
matches, the condition reports (or excepts) an incident.
See “Detection messages and message components” on page 368.
Table 33-5 describes the types of patterns you can use for described identity
matching.
The email address field does not match the sender or recipient of a Web post. For
example, the email address [email protected] does not match if Bob uses a Web
browser to send or receive email. In this case, you must use the domain pattern
mail.yahoo.com to match [email protected].
The system does not resolve URL domains to IP addresses. For example, you
specify an IP address of 192.168.1.1 for a specific domain. If users access the
domain URL using a Web browser, the system does not match emails that are
Detecting described identities 773
Best practices for using described identity matching
Group that contains the CEO's identity as a sole group member. You then define
a policy exception that references the CEO User Group. At runtime the policy will
ignore messages sent or received by the CEO.
See “User Groups” on page 349.
Note: DLP Agents installed on Mac endpoints do not support User Groups that use
Active Directory (AD) group conditions in policies. The Mac agent treats such
conditions as Not Matched.
Note: If this is the first time you are configuring the User Group, you must select
the option Refresh the group directory index on Save to populate the User
Group.
4 After you locate the users you want, use the Add and Remove options to
include or exclude them in the User Group.
5 Click Save.
Action Description
Enter the group The Group Name is the name that you want to use to identify this group.
name.
Use a descriptive name so that you can easily identify it later on.
View which policies Initially, when you create a new User Group, the Used in Policy field displays None.
use the group.
If the User Group already exists and you modify it, the system displays a list of the policies that
implement the User Group, assuming one or more group-based policies is created for this User
Group.
Refresh the group Select (check) the Refresh the group directory index on Save option to synchronize the user
directory index on group profile with the most recent directory server index immediately on Save of the profile. If
Save. you leave this box unselected (unchecked), the profile is synchronized with the directory server
index based on the Directory Connection setting.
If this is the first time you are configuring the User Group profile, you must select the Refresh
the group directory index on Save option to populate the profile with the latest directory server
index replication.
Select the directory Select the directory server you want to use from the Directory Server list.
server.
You must establish a connection to the directory server before you create the User Group profile.
Action Description
Search the directory Enter the search string in the search field and click Search to search the directory for specific
for specific users. users. You can search using literal text or wildcard characters (*).
The search results display the Common Name (CN) and the Distinguished Name (DN) of the
directory server that contains the user. These names give you the specific user identity. Results
are limited to 1000 entries.
Click Clear to clear the results and begin a new search of the directory.
Literal text search criteria options:
Browse the directory You can browse the directory tree for groups and users by clicking on the individual nodes and
for user groups. expanding them until you see the group or node that you want.
The browse results display the name of each node. These names give you the specific user
identity.
The results are limited to 20 entries by default. Click See More to view up to 1000 results.
Add a user group to To add a group or user to the User Group profile, select it from the tree and click Add.
the profile.
After you select and add the node to the Added Groups column, the system displays the
Common Name (CN) and the Distinguished Name (DN).
Save the user group. Click Save to save the User Group profile you have configured.
the User Group with the directory server. You then associate the User Groups
with the Sender/User based on a Directory Server Group group rule or the
Recipient matches User Group based on a Directory Server group rule.
See “Introducing synchronized Directory Group Matching (DGM)” on page 774.
Table 34-2 describes the process for implementing synchronized DGM.
1 Create the connection to the Establish the connection from the Enforce Server to a directory server such
directory server. as Microsoft Active Directory.
2 Create the User Group. Create one or more User Groups on the Enforce Server and populate the
User Groups with the exact identities from the users, groups, and business
units that are defined in the directory server
4 Configure one or more group Choose the type of synchronized DGM rule you want to implement and
rules or exceptions. reference the User Group. After the policy and the group are linked, the
policy applies only to those identifies in the referenced User Group.
Note: If the identity being detected is a user, the user must be actively logged on
to a DLP Agent-enabled system for the policy to match.
Detecting synchronized identities 779
Configuring synchronized DGM policy conditions
Parameter Description
Select User Groups to Select one or more User Groups that you want this policy to detect.
include in this policy
If you have not created a User Group, click Create a new User Group.
Match On This condition matches on the entire message. The Envelope option is selected by default.
You cannot select any other message component.
Also Match Select this option to create a compound condition. All conditions in a rule or exception
must match to trigger an incident.
1 Select User Groups to Select the User Group(s) that you want this policy to match on.
include in this policy
If you have not created a User Group, click Create a new Endpoint User
Group option.
2 Match On This rule detects the entire message, not individual components. The Envelope
option is selected by default. You cannot select any other message component.
3 Also Match Select this option to create a compound condition. All conditions in a rule or
exception must match to trigger an incident.
See “About two-tier detection for EDM on the endpoint” on page 445.
You cannot combine either type of profiled DGM condition with an Endpoint: Block
or Endpoint: Notify response rule in a policy. If you do, the system reports that
the policy is misconfigured.
See “Troubleshooting policies” on page 423.
1 Create the data source file. Create a data source file from the directory server or database you want to
profile. Make sure the data source file contains the appropriate fields.
The following fields are supported for profiled DGM:
■ Email address
■ IP address
■ Window user name (in the format domain\user)
■ IM screen name
See “Creating the exact data source file for profiled DGM” on page 449.
2 Prepare the data source See “Configuring Exact Data profiles” on page 446.
file for indexing.
See “Preparing the exact data source file for indexing” on page 449.
3 Create the Exact Data This includes uploading the data source file to the Enforce Server, mapping
Profile. the data fields, and indexing the data source.
See “Uploading exact data source files to the Enforce Server” on page 451.
4 Define the profiled DGM See “Configuring the Sender/User based on a Profiled Directory condition”
condition. on page 784.
5 Test the profiled DGM Use a test policy group and verify that the matches the policy generates are
policy. accurate.
See “Test and tune policies to improve match accuracy” on page 430.
Sender/User based on a Directory If this condition is implemented as a policy rule, a match occurs only if the
from <EDM Profile> sender or user of the data is contained in the index profile. If this condition is
implemented as a policy exception, the data will be excepted from matching
if it is sent by a sender/user listed in the index profile
Recipient based on a Directory from If this condition is implemented as a policy rule, a match occurs only if the
<EDM Profile> recipient of the data is contained in the index profile. If this condition is
implemented as a policy exception, the data will be excepted from matching
if it is received by a recipient listed in the index profile.
After you select the Exact Data Profile, when you configure the rule, the directory
you selected and the sender identifier(s) appear at the top of the page.
Table 35-3 describes the parameters for configuring the Sender/User based on a
Directory an EDM Profile condition.
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing,Sales in the text
box. If the condition is implemented as a rule, in this example a match occurs only if the sender or
user works in Marketing or Sales (as long as the other input content meets all other detection criteria).
If the condition is implemented as an exception, in this example the system ignores from matching
messages from a sender or user who works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any sender
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
Table 35-4 Configuring the Recipient based on a Directory from an EDM profile
condition
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing, Sales in the text
box. For a detection rule, this example causes the system to capture an incident only if at least one
recipient works in Marketing or Sales (as long as the input content meets all other detection criteria).
For an exception, this example prevents the system from capturing an incident if at least one recipient
works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any recipient
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
Include an email address field in the Exact Data Profile for profiled
DGM
You must include the appropriate fields in the Exact Data Profile to implement
profiled DGM.
See “Creating the exact data source file for profiled DGM” on page 449.
If you include the email address field in the Exact Data Profile for profiled DGM and
map it to the email data validator, email address will appear in the Directory EDM
drop-down list (at the remediation page).
Detecting profiled identities 787
Best practices for using profiled DGM
Use profiled DGM for Network Prevent for Web identity detection
If you want to implement DGM for Network Prevent for Web, use one of the profiled
DGM conditions to implement identity matching. For example, you may want to use
identity matching to block all web traffic for a specific users. For Network Prevent
for Web, you cannot use synchronized DGM conditions for this use case.
See “Creating the exact data source file for profiled DGM” on page 449.
See “Configuring the Sender/User based on a Profiled Directory condition”
on page 784.
Chapter 36
Supported file formats for
detection
This chapter includes the following topics:
Note: While there is some overlap among file types supported for extraction and
for identification (because if the system can crack the file it must be able to identify
its type), the supported formats for each operation are distinct and implemented
using different match conditions. The number of file formats supported for type
identification is much broader than those supported for content extraction.
File type Symantec Data Loss Prevention does Explicitly using the Message See “Supported formats for file
identification not rely on file extensions to identify the Attachment or File Type type identification”
format. File type is identified by the Match file property condition. on page 790.
unique binary signature of the file
format.
File contents File contents is any text-based content Implicitly using one or more See “Supported formats for
extraction that can be viewed through the native content match conditions, content extraction”
or source application. including EDM, IDM, VML, on page 806.
data identifiers, keyword,
regular expressions.
Subfile Subfiles are files encapsulated in a Implicitly using one or more See “Supported encapsulation
extraction parent file. Subfiles are extracted and content match conditions, formats for subfile extraction”
(Subfile) processed individually for identification including EDM, IDM, VML, on page 813.
and content extraction. If the subfile data identifiers, keyword,
format is not supported by default, a regular expressions.
custom method can be used to detect
and crack the file.
Supported file formats for detection 790
Supported formats for file type identification
Metadata Metadata is information about the file, Available for content-based See “Supported file formats
extraction such as author, version, or user-defined match conditions. Must be for metadata extraction”
(Metadata) tags. Generally limited to Microsoft enabled. on page 815.
Office documents (OLE-enabled) and
Adobe PDF files. Metadata support may
differ between agent and server.
ACT
Adobe FrameMaker
Adobe PDF
ANSI
Apple Double
Apple Single
Applix Alis
Applix Asterix
Applix Graphics
Applix Presents
Applix Spreadsheets
Applix Words
Supported file formats for detection 792
Supported formats for file type identification
ARC/PAK Archive
ASCII
AutoCAD Drawing
AutoDesk WHIP
AutoShade Rendering
BinHex
Corel Presentations
CorelDRAW
CPT Communication
dBase Database
DCX Fax
DECdx
DG CEOwrite
DIF Spreadsheet
DisplayWrite
ENABLE
Enhanced Metafile
Envoy (EVY)
Executable- Other
Executable- UNIX
Executable- VAX
Executable- SUN
FileMaker (Macintosh)
Framework
Framework II
Fujitsu Oasys
GIF
GZIP
Harvard Graphics
Hewlett-Packard
HTML
IBM DCA-FFT
iCalendar
Informix SmartWare II
Interleaf
Java Archive
JPEG
JustSystems Ichitaro
KW ODA G4 (G4)
Lasergraphics Language
Legato Extender
Lotus Pic
Lotus SmartMaster
Lyrix MacBinary
MacBinary
Macintosh Raster
Supported file formats for detection 797
Supported formats for file type identification
MacPaint
MacWrite
MacWrite II
MASS-11
Micrografx Designer
Microsoft Access
Microsoft OneNote
Microsoft Outlook
Microsoft PowerPoint PC
Microsoft Project
Microsoft Publisher
Microsoft Visio
Microsoft Word PC
Microsoft Works
Microstation
MIDI
MPEG-1 Video
MPEG-2 Audio
MultiMate 4.0
Multiplan Spreadsheet
Navy DIF
NeXT/Sun Audio
NIOS TOP
Nota Bene
ODA/ODIF
Office Writer
OLIDIF
OmniOutliner (OO3)
Open PGP
PC COM executable
PC Library Module
PC Object Module
PC PaintBrush
PCD Image
PeachCalc Spreadsheet
Persuasion Presentation
Philips Script
Supported file formats for detection 802
Supported formats for file type identification
PKZIP
Plan Perfect
PostScript File
PRIMEWORD
QuickTime Movie
RAR archive
Real Audio
Reflex Database
RIFF MIDI
SAMNA Word IV
SGML
SMTP document
Supercalc Spreadsheet
SYLK Spreadsheet
Symphony Spreadsheet
Tape Archive
Truevision Targa
Ultracalc Spreadsheet
Supported file formats for detection 804
Supported formats for file type identification
Unicode Text
Uniplex (V6.01)
UNIX Compress
UNKNOWN
Usenet format
UUEncoding
Vcard
VCF
Volkswriter
VRML
WANG PC
Wang WITA
Windows Bitmap
Windows Metafile
Windows Palette
WinZip
Word Connection
WordERA (V 1.0)
WordPad
WordPerfect Graphics 1
WordPerfect Graphics 2
WordStar
WordStar 2000
WordStar 6.0
WriteNow
X Bitmap (XBM)
X Image
X Pixmap (XPM)
XHTML
XML (generic)
XyWrite
Supported file formats for detection 806
Supported formats for content extraction
Word-processing file formats See “Supported word-processing formats for content extraction” on page 806.
Presentation file formats See “Supported presentation formats for content extraction” on page 808.
Spreadsheet file formats See “Supported spreadsheet formats for content extraction” on page 809.
Text and markup file formats See “Supported text and markup formats for content extraction” on page 810.
Email file formats See “Supported email formats for content extraction” on page 811.
CAD file formats See “Supported CAD formats for content extraction” on page 811.
Graphics file formats See “Supported graphics formats for content extraction” on page 812.
Database file formats See “Supported database formats for content extraction” on page 812.
Other file formats See “Other file formats supported for content extraction” on page 813.
Encapsulation file formats See “Supported encapsulation formats for subfile extraction” on page 813.
ApplixWords AW
DisplayWrite IP
OpenOfficeWriter SXW
OpenOfficeWriter ODT
StarOfficeWriter SXW
StarOfficeWriter ODT
WordPad RTF
XyWrite XY4
Applix Presents AG
Applix Spreadsheets AS
Table 36-7 Supported text and markup file formats for content extraction
ANSI TXT
ASCII TXT
HTML HTM
Table 36-7 Supported text and markup file formats for content extraction
(continued)
XHTML HTM
Microstation DGN
iCalendar ICS
File Share Encryption (PGP You can decrypt Symantec File Share encrypted files and extract file contents for
Netshare) policy evaluation using the File Share plugin. Refer to the Symantec Data Loss
Prevention Encryption Insight Implementation Guide.
Note: Encryption Insight is only available with Network Discover.
Custom You can write a plug-in to perform content, subfile, and metadata extraction
operations on custom file formats. Refer to the Symantec Data Loss Prevention
Content Extraction Plug-in Developers Guide.
Note: Content extraction plug-ins are limited to detection servers.
Virtual Card File VCF and VCARD electronic business card files
7-Zip 7Z
BinHex HQX
GZIP GZ
iCalendar ICS
PKZIP ZIP
WinZip ZIP
UNIX Compress Z
Supported file formats for detection 815
Supported file formats for metadata extraction
UUEncoding UUE
Virtual Card File VCF and VCARD electronic business card files
Example fields:
Microsoft Office documents, for
example: ■ Title
For Microsoft Office documents, the
■ Subject
■ Word (DOC, DOCX) system extracts Object Linking and
Embedding (OLE) metadata. ■ Author
■ Excel (XLS, XLSX)
■ Keywords
■ PowerPoint (PPT, PPTX)
■ Other custom fields
Example fields:
For Adobe PDF files, the system
extracts Document Information ■ Author
Dictionary (DID) metadata. The system ■ Title
Adobe PDF files
does not support Adobe Extensible ■ Subject
Metadata Platform (XMP) metadata ■ Creation
extraction.
■ Update dates
Use the filter utility to verify metadata See “Always use the filter utility to
Other file formats (including binary and
extraction for other file formats. verify file format metadata support”
text)
on page 818.
Supported file formats for detection 816
Supported file formats for metadata extraction
Consideration Topic
Always use filter to verify file format metadata support. See “Always use the filter utility to verify file format
metadata support” on page 818.
Enable metadata detection only if it is necessary. See “Distinguish metadata from file content and application
data” on page 820.
Avoid generating false positives by selecting keywords See “Use and tune keyword lists to avoid false positives
carefully. on metadata” on page 821.
Understand resource implications of endpoint metadata See “Understand performance implications of enabling
extraction. endpoint metadata detection” on page 822.
Create a separate endpoint configuration for metadata See “Create a separate endpoint configuration for
detection. metadata detection” on page 822.
Use response rules to add metadata tags to incidents. See “Use response rules to tag incidents with metadata”
on page 822.
Supported file formats for detection 818
Supported file formats for metadata extraction
Note: The data output by the filter utility is in ASCII format. Symantec Data Loss
Prevention processes data in Unicode format. Therefore, you may rely on the
existence of the fields returned by the filter utility, but the metadata detected by
Symantec Data Loss Prevention may not look identical to the filter output.
3 Issue the following command to run the filter program and display its syntax
and optional parameters.
filter -help
As indicated by the help, you use the following syntax to execute the filter utility:
filter [options] inputfile outputfile
The inputfile is an instance of the file format you want to verify. The
outputfile is a file the filter utility writes the extracted data to.
4 Execute filter against an instance of the file format to verify metadata extraction.
For example, on Windows you would issue the following command:
filter -i \temp\myfile.doc \temp\metadata_output.txt
Where myfile.doc is a file containing metadata you want to verify and have
copied to the \temp directory, and metadata_output.txt is the name of the file
you want the system to generate and write the extracted data to.
5 Review the filter output. The output data should be similar to the following:
1 2 1252 CodePage
1 1 "S" Title
0 0 (null)
1 1 "P" Author
0 0 (null)
0 0 (null)
0 1 "" (null)
1 1 "m" LastAuthor
1 1 "1" RevNumber
1 = valid field The type of data: The data payload for the The name of the field (empty
field. or null if the field is invalid).
0 = invalid field 1 = String
Note: You may ignore rows 2 = Integer
where the first column is 0.
3 = Date/Time
5 = Boolean
Note: This list is not exhaustive and is provided for quick reference only. There may
be other types of data that are not extracted as metadata. The best practice is to
use the filter utility to verify file format metadata support. See “Always use the filter
utility to verify file format metadata support” on page 818.
Application data Application data including message transport information is extracted separately from
file format extraction. For all inbound messages, the system extracts message envelope
(header) and subject information as text at the application layer. The type of application
data that is extracted depends on the channels supported by the detection server or
endpoint.
Headers and footers Document header and footer text is extracted as content, not metadata. To avoid false
positives, it is recommended that you remove or whitelist headers and footers from
documents.
See “Use white listing to exclude non-sensitive content from partial matching”
on page 569.
See the Indexed Document Matching (IDM) chapter in the Symantec Data Loss
Prevention Administration Guide for details.
Supported file formats for detection 821
Supported file formats for metadata extraction
Markup text Markup text is extracted as content, not metadata. Markup text extraction is supported
for HTML, XML, SGML, and more. Markup text extraction is disabled by default.
See the "Advanced Server Settings" topic in the Symantec Data Loss Prevention
Administration Guide to enable it.
Hidden text Hidden text is extracted as content, not metadata. Hidden text extraction in the form
of tracked changes is supported for some Microsoft Office file formats. Hidden text
extraction is disabled by default.
See the "Advanced Server Settings" topic in the Symantec Data Loss Prevention
Administration Guide to enable it.
Watermarks Text-based watermarks are extracted as content, not metadata. Text-based watermark
detection is supported for Microsoft Word documents (versions 2003 and 2007). It is
not supported for other file formats.
■ Burgerservicenummer
■ Codice Fiscale
■ Colombian Addresses
■ CUSIP Number
■ Hong Kong ID
■ IBAN Central
■ IBAN East
■ IBAN West
■ IP Address
Library of system data identifiers 826
■ IPv6 Address
■ Spanish DNI ID
■ SWIFT Code
■ Taiwan ROC ID
■ UK Passport Number
■ UK Tax ID Number
■ US Passport Number
■ The narrow breadth validates the detected number using the final check digit,
eliminates common test numbers, and requires the presence of an ABA-related
keyword.
See “ABA Routing Number narrow breadth” on page 830.
Pattern
[0123678]\d{8}
[0123678]\d{3}-\d{4}-\d
ABA Checksum Every ABA routing number must start with the following
two digits: 00-15,21-32,61-72,80 and pass an ABA-specific,
position-weighted checksum.
Pattern
[0123678]\d{8}
[0123678]\d{3}-\d{4}-\d
ABA Checksum Every ABA routing number must start with the following
two digits: 00-15,21-32,61-72,80 and pass an ABA specific,
position-weighted check sum.
Library of system data identifiers 830
ABA Routing Number
Exclude beginning characters At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Input: 123456789
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[0123678]\d{8}
[0123678]\d{3}-\d{4}-\d
ABA Checksum Every ABA routing number must start with the following
two digits: 00-15,21-32,61-72,80 and pass an ABA specific,
position-weighted checksum.
Exclude beginning characters With this option selected, data beginning with any of the
following list of values will not be matched.
Input: 123456789
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 831
Argentina Tax Identification Number
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Pattern
20-\d{8}-\d
23-\d{8}-\d
27-\d{8}-\d
30-\d{8}-\d
33-\d{8}-\d
34-\d{8}-\d
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
20-\d{8}-\d
23-\d{8}-\d
27-\d{8}-\d
30-\d{8}-\d
33-\d{8}-\d
34-\d{8}-\d
Argentinian Tax Identity Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
20-\d{8}-\d
23-\d{8}-\d
27-\d{8}-\d
30-\d{8}-\d
33-\d{8}-\d
34-\d{8}-\d
Duplicate digits Ensures that a string of digits is not all the same.
Argentinian Tax Identity Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 834
Australian Business Number
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Tax ID, tax number, Tax No., taxpayer ID, tax identity
number, tax identification no, tax identification number,
TaxID#, taxidnumber#, taxpayer number, Argentina
taxpayer ID
Pattern
\d{11}
Library of system data identifiers 835
Australian Business Number
Pattern
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{11}
Australian Business Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{11}
Library of system data identifiers 836
Australian Company Number
Pattern
Duplicate digits Ensures that a string of digits is not all the same.
Australian Business Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
Australian Company Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
Australian Company Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 838
Australian Medicare Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[2-6]\d{10}
[2-6]\d{9}
Library of system data identifiers 839
Australian Medicare Number
Pattern
[2-6]\d{3}-\d{5}-\d{1}
[2-6]\d{9}[ -/]\d{1}
[2-6]\d{3}-\d{5}-\d{1}[ -/]\d{1}
[2-6]\d{3} \d{5} \d \d
[2-6]\d{3}-\d{5}-\d-\d
Validator Description
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[2-6]\d{10}
[2-6]\d{9}
[2-6]\d{3}-\d{5}-\d{1}
[2-6]\d{9}[ -/]\d{1}
[2-6]\d{3}-\d{5}-\d{1}[ -/]\d{1}
[2-6]\d{3} \d{5} \d \d
[2-6]\d{3}-\d{5}-\d-\d
Library of system data identifiers 840
Australian Medicare Number
Validator Description
Australian Medicare Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[2-6]\d{10}
[2-6]\d{9}
[2-6]\d{3}-\d{5}-\d{1}
[2-6]\d{9}[ -/]\d{1}
[2-6]\d{3}-\d{5}-\d{1}[ -/]\d{1}
[2-6]\d{3} \d{5} \d \d
[2-6]\d{3}-\d{5}-\d-\d
Validator Description
Duplicate digits Ensures that a string of digits is not all the same.
Australian Medicare Number Validation Check Computes the checksum and validates the pattern against
it.
Validator Description
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
[XBCEGTHJLMNP]\d{7}
[XBCEGTHJLMNP] \d{7}
Exclude ending characters Any number ending with the following characters is
excluded from matching:
Pattern
[XBCEGTHJLMNP]\d{7}
[XBCEGTHJLMNP] \d{7}
Exclude ending characters This validator excludes the following characters at the end
of the number:
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{8}
\d{9}
Australian Tax File validation check Computes the checksum and validates the pattern against
it.
Pattern
\d{8}
\d{9}
Australian Tax File validation check Computes the checksum and validates the
pattern against it.
Inputs:
Patterns
\l[ ]\d{7}
\l\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\l[ ]\d{7}
\l\d{7}
Library of system data identifiers 845
Austria Tax Identification Number
Duplicate digits Ensures that a string of digits is not all the same.
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
\d{2}-\d{3}/\d{4}
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 846
Austrian Social Security Number
Patterns
\d{2}-\d{3}/\d{4}
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
\d{4}-\d{6}
\d{4} \d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
\d{4}-\d{6}
\d{4} \d{6}
Library of system data identifiers 848
Austrian Social Security Number
Austrian Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{10}
\d{4}-\d{6}
\d{4} \d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Austrian Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
\d{11}
\d{2}.\d{2}.\d{2}-\d{3}.\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{11}
\d{2}.\d{2}.\d{2}-\d{3}.\d{2}
Belgian National Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{11}
\d{2}.\d{2}.\d{2}-\d{3}.\d{2}
Belgian National Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 852
Belgium Driver's License Number
Pattern
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\l{2}\d{6}
Patterns
\l{2}\d{6}
Library of system data identifiers 854
Belgium Tax Identification Number
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{2}[01]\d[0123]\d{6}
\d{2}.[01]\d.[0123]\d-\d{3}.\d{2}
Library of system data identifiers 855
Belgium Tax Identification Number
Patterns
Duplicate digits Ensures that a string of digits is not all the same.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{2}[01]\d[0123]\d{6}
\d{2}.[01]\d.[0123]\d-\d{3}.\d{2}
Belgian Tax Identification Number Validation Check Checksum validator for Belgium Tax Identification Number.
Library of system data identifiers 856
Belgium Value Added Tax (VAT) Number
Duplicate digits Ensures that a string of digits is not all the same.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 37-71 Belgium Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Bb][Ee][0][123456789]\d{8}
[Bb][Ee][0][123456789].\d{4}.\d{4}
[Bb][Ee][0][123456789]-\d{4}-\d{4}
Table 37-72 Belgium Value Added Tax (VAT) Number wide-breadth validator
Table 37-73 Belgium Value Added Tax (VAT) Number medium breadth patterns
Patterns
[Bb][Ee][0][123456789]\d{8}
[Bb][Ee][0][123456789].\d{4}.\d{4}
[Bb][Ee][0][123456789]-\d{4}-\d{4}
Table 37-74 Belgium Value Added Tax (VAT) Number medium-breadth validators
Belgium VAT Number Validation Check Checksum validator for the Belgian Value Added Tax (VAT)
Number.
Table 37-75 Belgium Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Bb][Ee][0][123456789]\d{8}
[Bb][Ee][0][123456789].\d{4}.\d{4}
[Bb][Ee][0][123456789]-\d{4}-\d{4}
Table 37-76 Belgium Value Added Tax (VAT) Number narrow-breadth validators
Belgium VAT Number Validation Check Checksum validator for the Belgian Value Added Tax (VAT)
Number.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d\d\d[,;-]\d\d\d\d\d[,;-]\d
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d\d\d[,;-]\d\d\d\d\d[,;-]\d
Brazilian Bank Account Number Validation Check Validator computes Brazilian Bank Account Number
checksum every Brazilian Bank Account Number must
pass.
Pattern
\d\d\d[,;-]\d\d\d\d\d[,;-]\d
Duplicate digits Ensures that a string of digits is not all the same.
Brazilian Bank Account Number Validation Check. Validator computes Brazilian Bank Account Number
checksum every Brazilian Bank Account Number must
pass.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{5}[0]\d{3}
\d{5}[12]\d\d{2}
\d{6}[0]\d{3}
\d{6}[0]\d[/]\d{2}
\d{6}[12]\d\d{2}
\d{6}[12]\d[/]\d{2}
\d{7}[0]\d{3}
\d{7}[0]\d[/]\d{2}
\d{7}[12]\d[/]\d{2}
\d{7}[12]\d\d{2}
\d{8}[0]\d{3}
\d{8}[0]\d[/]\d{2}
\d{8}[0]\d{3}[/]\d{2}
\d{8}[12]\d[/]\d{2}
\d{8}[12]\d\d{2}
\d{8}[12]\d\d{2}[/]\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 862
Brazilian Election Identification Number
Pattern
\d{5}[0]\d{3}
\d{5}[12]\d\d{2}
\d{6}[0]\d{3}
\d{6}[0]\d[/]\d{2}
\d{6}[12]\d\d{2}
\d{6}[12]\d[/]\d{2}
\d{7}[0]\d{3}
\d{7}[0]\d[/]\d{2}
\d{7}[12]\d[/]\d{2}
\d{7}[12]\d\d{2}
\d{8}[0]\d{3}
\d{8}[0]\d[/]\d{2}
\d{8}[0]\d{3}[/]\d{2}
\d{8}[12]\d[/]\d{2}
\d{8}[12]\d\d{2}
\d{8}[12]\d\d{2}[/]\d{2}
Brazil Election Identification Number Validation Check Computes Brazil Election Identification Number checksum
every Brazil Election Identification Number must pass.
Library of system data identifiers 863
Brazilian Election Identification Number
Pattern
\d{5}[0]\d{3}
\d{5}[12]\d\d{2}
\d{6}[0]\d{3}
\d{6}[0]\d[/]\d{2}
\d{6}[12]\d\d{2}
\d{6}[12]\d[/]\d{2}
\d{7}[0]\d{3}
\d{7}[0]\d[/]\d{2}
\d{7}[12]\d[/]\d{2}
\d{7}[12]\d\d{2}
\d{8}[0]\d{3}
\d{8}[0]\d[/]\d{2}
\d{8}[0]\d{3}[/]\d{2}
\d{8}[12]\d[/]\d{2}
\d{8}[12]\d\d{2}
\d{8}[12]\d\d{2}[/]\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Brazil Election Identification Number Validation Check Computes Brazil Election Identification Number checksum
every Brazil Election Identification Number must pass.
Library of system data identifiers 864
Brazilian National Registry of Legal Entities Number
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{14}
\d{8}[/]\d{6}
\d{8}[/]\d{4}-\d{2}
\d{2}.\d{3}.\d{3}[/]\d{4}-\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{14}
\d{8}[/]\d{6}
\d{8}[/]\d{4}-\d{2}
\d{2}.\d{3}.\d{3}[/]\d{4}-\d{2}
Brazilian National Registry of Legal Entities Number Computes the checksum and validates the pattern against
Validation Check it.
Library of system data identifiers 866
Brazilian Natural Person Registry Number (CPF)
Pattern
\d{14}
\d{8}[/]\d{6}
\d{8}[/]\d{4}-\d{2}
\d{2}.\d{3}.\d{3}[/]\d{4}-\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Brazilian National Registry of Legal Entities Number Computes the checksum and validates the pattern against
Validation Check it.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{11}
\d{9}[-]\d{2}
\d{3}[.]\d{3}[.]\d{3}[-]\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{11}
\d{9}[-]\d{2}
\d{3}[.]\d{3}[.]\d{3}[-]\d{2}
Library of system data identifiers 868
Brazilian Natural Person Registry Number (CPF)
Brazilian Natural Person Registry Number Validation Check Computes Brazilian Natural Person Registry Number
checksum every Brazilian Natural Person Registry Number
must pass.
Pattern
\d{11}
\d{9}[-]\d{2}
\d{3}[.]\d{3}[.]\d{3}[-]\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Brazilian Natural Person Registry Number Validation Check Computes Brazilian Natural Person Registry Number
checksum every Brazilian Natural Person Registry Number
must pass.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[9]\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[9]\d{9}
British Columbia Personal Healthcare Number Validation Computes British Columbia Personal Healthcare Number
Check checksum that every British Columbia Personal Healthcare
Number must pass.
Pattern
[9]\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
British Columbia Personal Healthcare Number Validation Computes British Columbia Personal Healthcare Number
Check checksum that every British Columbia Personal Healthcare
Number must pass.
Library of system data identifiers 871
Bulgarian Uniform Civil Number - EGN
Pattern
\d\d[024][123456789]0[123456789]\d{4}
\d\d[135][012]0[123456789]\d{4}
\d\d[024][123456789][12]\d{5}
\d\d[135][012][12]\d{5}
\d\d[024][123456789]3[01]\d{4}
\d\d[135][012]3[01]\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d\d[024][123456789]0[123456789]\d{4}
\d\d[135][012]0[123456789]\d{4}
\d\d[024][123456789][12]\d{5}
\d\d[135][012][12]\d{5}
\d\d[024][123456789]3[01]\d{4}
\d\d[135][012]3[01]\d{4}
Bulgarian Uniform Civil Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d\d[024][123456789]0[123456789]\d{4}
\d\d[135][012]0[123456789]\d{4}
\d\d[024][123456789][12]\d{5}
\d\d[135][012][12]\d{5}
\d\d[024][123456789]3[01]\d{4}
\d\d[135][012]3[01]\d{4}
Library of system data identifiers 873
Burgerservicenummer
Duplicate digits Ensures that a string of digits is not all the same.
Bulgarian Uniform Civil Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Burgerservicenummer
In the Netherlands, the Burgerservicenummer is used to uniquely identify citizens
and is printed on driving licenses, passports and international ID cards under the
header Personal Number.
The Burgerservicenummer data identifier detects an 8- or 9-digit number that passes
checksum validation.
The Burgerservicenummer data identifier provides two breadths of detection:
■ The wide breadth detects an 8- or 9-digit number that passes checksum
validation.
See “Burgerservicenummer wide breadth” on page 873.
■ The narrow breadth detects an 8- or 9-digit number that passes checksum
validation. It also requires the presence of a Burgerservicenummer-related
keyword.
See “Burgerservicenummer narrow breadth” on page 874.
Pattern
\d{9}
Burgerservicenummer Check Computes the checksum and validates the pattern against
it.
Pattern
\d{9}
Burgerservicenummer Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
The Canadian Social Insurance Number data identifier provides three breadths of
detection:
■ The wide breadth detects 9-digit numbers with the format DDD-DDD-DDD
separated by dashes, spaces, periods, slashes, or without separators. It also
performs Luhn-check validation.
See “Canadian Social Insurance Number wide breadth” on page 875.
■ The medium breadth detects 9-digit numbers with the format DDD-DDD-DDD
separated by dashes, spaces, or periods. It also performs Luhn check validation
and eliminates non-assigned numbers and common test numbers.
See “Canadian Social Insurance Number medium breadth” on page 876.
■ The narrow breadth detects 9-digit numbers with the format DDD-DDD-DDD
separated by dashes or spaces. It also performs Luhn-check validation;
eliminates non-assigned numbers, fictitiously assigned numbers, and common
test numbers; and requires the presence of Social Insurance-related keywords.
See “Canadian Social Insurance Number narrow breadth” on page 876.
Pattern
\d{9}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
\d{3}-\d{3}-\d{3}
Pattern
\d{3}.\d{3}.\d{3}
\d{3}-\d{3}-\d{3}
Exclude beginning characters With this option selected, data beginning with any of the
following list of values will not be matched.
Input:
8, 123456789
Pattern
\d{3}-\d{3}-\d{3}
Library of system data identifiers 877
Chilean National Identification Number
Exclude beginning characters With this option selected, data beginning with any of the
following list of values will not be matched.
Input:
0, 8, 123456789
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{7}[0123456789Kk]
\d{7}[-][0123456789Kk]
\d[.]\d{3}[.]\d{3}[-][0123456789Kk]
\d{8}[0123456789Kk]
\d{8}[-][0123456789Kk]
\d{2}[.]\d{3}[.]\d{3}[-][0123456789Kk]
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{7}[0123456789Kk]
\d{7}[-][0123456789Kk]
\d[.]\d{3}[.]\d{3}[-][0123456789Kk]
\d{8}[0123456789Kk]
\d{8}[-][0123456789Kk]
\d{2}[.]\d{3}[.]\d{3}[-][0123456789Kk]
Chilean National Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 879
China Passport Number
Pattern
\d{7}[0123456789Kk]
\d{7}[-][0123456789Kk]
\d[.]\d{3}[.]\d{3}[-][0123456789Kk]
\d{8}[0123456789Kk]
\d{8}[-][0123456789Kk]
\d{2}[.]\d{3}[.]\d{3}[-][0123456789Kk]
Duplicate digits Ensures that a string of digits is not all the same.
Chilean National Identification Number Validation Check Computes the checksum and validates the pattern against
it .
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
The China Passport Number data identifier provides two breadths of detection:
■ The wide breadth detects a 9- to 10-character identifier.
See “China Passport Number wide breadth” on page 880.
■ The narrow breadth detects a 9- 10-character identifier. It also requires the
presence of Chinese passport-related keywords.
See “China Passport Number narrow breadth” on page 880.
Pattern
\d{9}
\l\d{8}
\l{2}\d{8}
Pattern
\d{9}
\l\d{8}
\l{2}\d{8}
Library of system data identifiers 881
Codice Fiscale
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Codice Fiscale
The Codice Fiscale uniquely identifies an Italian citizen or permanent resident alien
and issuance of the code is centralized to the Ministry of Treasure. The Codice
Fiscale is issued to every Italian at birth.
The Codice Fiscale data identifier provides two breadths of detection:
■ The wide breadth detects a 16-character identifier that passes checksum
validation.
See “Codice Fiscale wide breadth” on page 881.
■ The narrow breadth detects a 16-character identifier that passes checksum
validation. It also requires the presence of Codice Fiscale-related keywords.
See “Codice Fiscale narrow breadth” on page 882.
Pattern
[A-Z]{6}[0-9LMNPQRSTUV]{2}[ABCDEHLMPRST][0-9LMNPQRSTUV]{2}[A-Z] [0-9LMNPQRSTUV]{3}[A-Z]
Codice Fiscale Control Key Check Computes the control key and checks if it is valid.
Pattern
[A-Z]{6}[0-9LMNPQRSTUV]{2}[ABCDEHLMPRST][0-9LMNPQRSTUV]{2}[A-Z] [0-9LMNPQRSTUV]{3}[A-Z]
Codice Fiscale Control Key Check Computes the control key and checks if it is valid.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Colombian Addresses
The Colombian Addresses data identifier detects home addresses and physical
locations in Columbia.
The Colombian Addresses data identifier provides two breadths of detection:
■ The wide breadth detects an address without validation.
See “ Colombian Addresses wide breadth” on page 883.
■ The narrow breadth detects an address with keyword validation.
See “Colombian Addresses narrow breadth” on page 884.
Library of system data identifiers 883
Colombian Addresses
Pattern
\d{1,3} \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3}[A-Za-z] \d{1,3}-\d{1,3}
\d{1,3} # \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3}[A-Za-z] No \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} # \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] # \d{1,3}-\d{1,3}
\d{1,3} No \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] No \d{1,3}-\d{1,3}
Pattern
\d{1,3}[A-Za-z] # \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} No \d{1,3}[A-Za-z]-\d{1,3}
The wide breadth of the Colombian Addresses data identifier does not include a
validator.
Pattern
\d{1,3} \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3}[A-Za-z] \d{1,3}-\d{1,3}
\d{1,3} # \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3}[A-Za-z] No \d{1,3}[A-Za-z]-\d{1,3}
Library of system data identifiers 885
Colombian Cell Phone Number
Pattern
\d{1,3} # \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] # \d{1,3}-\d{1,3}
\d{1,3} No \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] No \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] # \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} No \d{1,3}[A-Za-z]-\d{1,3}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{8}
\d{2}.\d{3}.\d{3}
\d{2}/\d{3}/\d{3}
\d{2}-\d{3}-\d{3}
\d{2},\d{3},\d{3}
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
\d{10}
\d{1}/\d{3}/\d{3}/\d{3}
\d{1},\d{3},\d{3},\d{3}
\d{1}.\d{3}.\d{3}.\d{3}
\d{1}-\d{3}-\d{3}-\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 887
Colombian Cell Phone Number
Pattern
\d{8}
\d{2}.\d{3}.\d{3}
\d{2}/\d{3}/\d{3}
\d{2}-\d{3}-\d{3}
\d{2},\d{3},\d{3}
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
\d{10}
\d{1}/\d{3}/\d{3}/\d{3}
\d{1},\d{3},\d{3},\d{3}
\d{1}.\d{3}.\d{3}.\d{3}
\d{1}-\d{3}-\d{3}-\d{3}
Require beginning characters This validator requires the following characters at the
beginning of the number:
300, 301, 302, 310, 311, 312, 313, 314, 315, 316, 317,
318, 319, 320, 321, 350
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{9}
Library of system data identifiers 889
Colombian Personal Identification Number
Pattern
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
Library of system data identifiers 890
Colombian Tax Identification Number
Exclude beginning characters Excludes the following characters from the beginning of
the number:
300, 301, 302, 310, 310, 312, 313, 314, 315, 316, 317,
318, 319, 320, 321, 350
$ ,$
.00
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
cedula, cédula, c.c., c.c, C.C., C.C, cc, CC, NIE., NIE,
nie., nie, cedula de ciudadania, cédula de ciudadanía,
cc#, CC #, documento de identificacion, documento
de identificación, Nit.
Pattern
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
Library of system data identifiers 892
Credit Card Magnetic Stripe Data
Require beginning characters Requires these characters at the beginning of the number:
800, 860, 890, 900
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
;1800\d{11}= %B3[068]\d{12}^[A-Z]{1}
;6011-\d{4}-\d{4}-\d{4}= %B3[068]\d{2} \d{6} \d{4}^[A-Z]{1}
;6011\d{12}= %B4\d{12}^[A-Z]{1}
;3[068]\d{12}= %B3[47]\d{2}-\d{6}-\d{5}^[A-Z]{1}
;4\d{12}= %B4\d{15}^[A-Z]{1}
;3[47]\d{2}-\d{6}-\d{5}= %B3[47]\d{13}^[A-Z]{1}
;5[1-5]\d{2}-\d{4}-\d{4}-\d{4}= %B5[1-5]\d{14}^[A-Z]{1}
;4\d{3}-\d{4}-\d{4}-\d{4}= %B2131\d{11}^[A-Z]{1}
;3\d{3}-\d{4}-\d{4}-\d{4}= %B3\d{15}^[A-Z]{1}
;2149\d{11}= %B2149-\d{6}-\d{5}^[A-Z]{1}
;2014\d{11}= %B2014-\d{6}-\d{5}^[A-Z]{1}
;2014-\d{6}-\d{5}=
%B1800\d{11}^[A-Z]{1}
%B6011-\d{4}-\d{4}-\d{4}^[A-Z]{1}
%B6011\d{12}^[A-Z]{1}
Library of system data identifiers 894
Credit Card Number
Validator Description
Luhn Check Computes the Luhn checksum which every instance must
pass.
2014\d{11} \d{4}.\d{4}.\d{4}.\d{4}
2014-\d{6}-\d{5} 1800\d{11}
3[47]\d{2}.\d{6}.\d{5} 2131\d{11}
3[068]\d{2}.\d{6}.\d{4} 2149\d{11}
3[47]\d{2}-\d{6}-\d{5} 2149.\d{6}.\d{5}
3[068]\d{2}-\d{6}-\d{4}
3[47]\d{13}
3[068]\d{12}
Luhn Check Computes the Luhn checksum, which every credit card number must pass.
1800\d{11} 2720.\d{4}.\d{4}.\d{4}
2131\d{11} 2720-\d{4}-\d{4}-\d{4}
3\d{3}-\d{4}-\d{4}-\d{4} 2720\d{12}
3\d{15} 6221.[2][6-8]\d{2}.\d{4}.\d{4}
4\d{3}.\d{4}.\d{4}.\d{4} 6221-[2][6-8]\d{2}-\d{4}-\d{4}
4\d{15} 622[2-8].\d{4}.\d{4}.\d{4}
4\d{12} 622[2-8]-\d{4}-\d{4}-\d{4}
5[1-5]\d{2}-\d{4}-\d{4}-\d{4} 6229[2][0-5]\d{10}
2149.\d{6}.\d{5} 6229.[2][0-5]\d{2}.\d{4}.\d{4}
2149-\d{6}-\d{5} 2014-\d{6}-\d{5}
2149\d{11} 2014\d{11}
2014.\d{6}.\d{5} 6011.\d{4}.\d{4}.\d{4}
222[1-9]\d{12} 6011-\d{4}-\d{4}-\d{4}
22[3-9]\d{13} 6011\d{12}
22[3-9]\d[.-]\d{4}[.-]\d{4}[.-]\d{4} 3[068]\d{2}.\d{6}.\d{4}
2[3-6]\d{14} 3[068]\d{2}-\d{6}-\d{4}
2[3-6]\d{2}-\d{4}-\d{4}-\d{4} 3[068]\d{12}
27[0-1]\d{13} 3[47]\d{2}.\d{6}.\d{5}
27[0-1]\d-\d{4}-\d{4}-\d{4} 3[47]\d{2}-\d{6}-\d{5}
27[0-1]\d \d{4} \d{4} \d{4}
Exclude exact match Excludes anything that matches the specified text.
Luhn Check Validator computes the Luhn checksum, which every credit card number must
pass.
for testing by credit card issuers. It also requires presence of a credit card-related
keyword.
Library of system data identifiers 900
Credit Card Number
222[1-9]\d{12}
222[1-9][.-]\d{4}[.-]\d{4}[.-]\d{4}
22[3-9]\d{13}
22[3-9]\d[.-]\d{4}[.-]\d{4}[.-]\d{4}
2[3-6]\d{14}
2[3-6]\d{2}.\d{4}.\d{4}.\d{4}
2[3-6]\d{2}-\d{4}-\d{4}-\d{4}
27[0-1]\d{13}
27[0-1]\d.\d{4}.\d{4}.\d{4}
27[0-1]\d-\d{4}-\d{4}-\d{4}
2720.\d{4}.\d{4}.\d{4}
2720-\d{4}-\d{4}-\d{4}
2720\d{12}
6221[2][6-8]\d{10}
6221.[2][6-8]\d{2}.\d{4}.\d{4}
6221-[2][6-8]\d{2}-\d{4}-\d{4}
622[2-8]\d{12}
622[2-8].\d{4}.\d{4}.\d{4}
622[2-8]-\d{4}-\d{4}-\d{4}
6229[2][0-5]\d{10}
6229.[2][0-5]\d{2}.\d{4}.\d{4}
6229-[2][0-5]\d{2}-\d{4}-\d{4}
2014\d{11}
2014-\d{6}-\d{5}
6011-\d{4}-\d{4}-\d{4}
6011\d{12}
3[068]\d{12}
3[068]\d{2}-\d{6}-\d{4}
3[47]\d{2}-\d{6}-\d{5}
3[47]\d{13}
4\d{3}-\d{4}-\d{4}-\d{4}
3\d{3}.\d{4}.\d{4}.\d{4}
2149.\d{6}.\d{5}
2014.\d{6}.\d{5}
6011.\d{4}.\d{4}.\d{4}
3[068]\d{2}.\d{6}.\d{4}
3[47]\d{2}.\d{6}.\d{5}
4\d{3}.\d{4}.\d{4}.\d{4}
1800\d{11}
4\d{12}
4\d{15}
5[1-5]\d{2}-\d{4}-\d{4}-\d{4}
5[1-5]\d{14}
5[1-5]\d{2}.\d{4}.\d{4}.\d{4}
Library of system data identifiers 902
Credit Card Number
2131\d{11}
3\d{3}-\d{4}-\d{4}-\d{4}
3\d{15}
2149\d{11}
Exclude exact match Excludes anything that matches the specified text.
Luhn Check Validator computes the Luhn checksum which every Credit Card Number must
pass.
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Library of system data identifiers 903
CUSIP Number
Find keywords inputs account number, account ps, american express, americanexpress, amex,
bank card, bankcard, card num, card number, cc #, cc#, ccn, check card,
checkcard, credit card, credit card #, credit card number, credit card#, debit
card, debitcard, diners club, dinersclub, discover, enroute, japanese card
bureau, jcb, mastercard, mc, visa
CUSIP Number
The CUSIP number is a unique identifier assigned to North American stock or other
securities. This number is issued by the Committee on Uniform Security Identification
Procedures (CUSIP) to assist in clearing and settling trades. CINS is an extension
of CUSIP used to identify securities outside of North America.
The CUSIP Number data identifier detects 9-character strings.
This data identifier provides three breadths of detection:
■ The wide breadth validates the final check digit.
See “CUSIP Number wide breadth” on page 903.
■ The medium breadth validates the final check digit and requires the presence
of a keyword.
See “CUSIP Number medium breadth” on page 904.
■ The narrow validates the final check digit and requires the presence of a keyword,
excluding the "NNA" keyword.
See “CUSIP Number narrow breadth” on page 904.
Pattern
w\d\w{6}\d
\w\d\w{4} \w{2} \d
Library of system data identifiers 904
CUSIP Number
Cusip Validation Validator checks for invalid CUSIP ranges and computes the CUSIP checksum
(Modulus 10 Double Add Double algorithm).
Pattern
w\d\w{6}\d
\w\d\w{4} \w{2} \d
Cusip Validation Validator checks for invalid CUSIP ranges and computes the
CUSIP checksum (Modulus 10 Double Add Double algorithm).
Find keywords With this option selected, at least one of the following keywords
or key phrases must be present for the data to be matched.
This of the data identifier is narrower than the medium breadth because it does not
include the "NNA" abbreviation as a keyword.
Pattern
w\d\w{6}\d
\w\d\w{4} \w{2} \d
Cusip Validation Validator checks for invalid CUSIP ranges and computes the CUSIP checksum
(Modulus 10 Double Add Double algorithm).
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Find keywords input cusip, c.u.s.i.p., Committee on Uniform Security Identification Procedures,
American Bankers Association, Standard & Poor's, S&P, National Numbering
Association, National Securities Identification Number
Pattern
\d\d[0156]\d[0123]\d[/]\d\d\d
\d\d[0156]\d[0123]\d[/]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d\d[0156]\d[0123]\d[/]\d\d\d
\d\d[0156]\d[0123]\d[/]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d\d
Library of system data identifiers 907
Czech Personal Identification Number
Czech Personal Identity Number Computes the checksum and validates the pattern against it.
Validation Check
Pattern
\d\d[0156]\d[0123]\d[/]\d\d\d
\d\d[0156]\d[0123]\d[/]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Czech Personal Identity Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 908
Denmark Personal Identification Number
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{6}[ -]\d{4}
Library of system data identifiers 909
Denmark Personal Identification Number
Pattern
\d{6}[ -]\l{4}
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{6}[ -]\d{4}
\d{6}[ -]\l{4}
\d{10}
Denmark Personal Identification Number Checksum validator for the Denmark Personal
Validation Check Identification Number.
Pattern
\d{6}[ -]\d{4}
\d{6}[ -]\l{4}
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Denmark Personal Identification Number Validation Check Checksum validator for the Denmark Personal Identification
Number.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\l\d{7}
Pattern
\l\d{7}
Find keywords With this option selected, at least one of the following keywords or key phrases must
be present for the data to be matched.
Find keywords input driver license, drivers license, driver's license, driver licenses, drivers licenses,
driver's licenses, dl#, dls#, lic#, lics#
Find keywords With this option selected, at least one of the following keywords or key phrases must
be present for the data to be matched.
Table 37-181 Drivers License Number- FL, MI, MN States wide-breadth patterns
Patterns
\l\d{12}
\l\d{3}-\d{3}-\d{2}-\d{3}-\d
\l-\d{3}-\d{3}-\d{3}-\d{3}
Table 37-182 Drivers License Number- FL, MI, MN States medium-breadth patterns
Pattern
\l\d{12}
\l\d{3}-\d{3}-\d{2}-\d{3}-\d
\l-\d{3}-\d{3}-\d{3}-\d{3}
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Find keywords input driver license, drivers license, driver's license, driver licenses, drivers
licenses, driver's licenses, dl#, dls#, lic#, lics#
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Pattern
\l\d{3}-\d{4}-\d{4}
\l\d{11}
Pattern
\l\d{3}-\d{4}-\d{4}
\l\d{11}
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Find keywords input driver license, drivers license, driver's license, driver
licenses, drivers licenses, driver's licenses, dl#, dls#,
lic#, lics#
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
The Drivers License Number - NJ State data identifier detects the presence of a
New Jersey drivers license number.
This data identifier provides two breadths of validation:
■ The wide breadth detects the presence of a 15 character string.
See “Drivers License Number- NJ State wide breadth” on page 915.
■ The medium breadth narrows the scope by requiring the presence of keywords.
See “Drivers License Number- NJ State medium breadth” on page 915.
Note: The wide breadth option does not include any validators.
Patterns
\l\d{14}
Pattern
\l\d{3}-\d{4}-\d{4}
\l\d{11}
Library of system data identifiers 916
Drivers License Number - NY State
Validators Description
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Find keywords input driver license, drivers license, driver's license, driver
licenses, drivers licenses, driver's licenses, dl#, dls#,
lic#, lics#
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Note: The wide breadth option does not include any validators.
Pattern
\d{9}
Library of system data identifiers 917
Driver's License Number - WA State
Pattern
\l\d{3}-\d{4}-\d{4}
\l\d{11}
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Find keywords input driver license, drivers license, driver's license, driver
licenses, drivers licenses, driver's licenses, dl#, dls#,
lic#, lics#
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Pattern
\l{5}\l[A-Za-z*]\d{3}\w{2}
\l{4}[*]\l[A-Za-z*]\d{3}\w{2}
\l{3}[*]{2}\l[A-Za-z*]\d{3}\w{2}
\l{2}[*]{3}\l[A-Za-z*]\d{3}\w{2}
\l{1}[*]{4}\l[A-Za-z*]\d{3}\w{2}
The wide breadth of the Driver's License Number - WA State data identifier does
not include a validator.
Pattern
\l{5}\l[A-Za-z*]\d{3}\w{2}
\l{4}[*]\l[A-Za-z*]\d{3}\w{2}
\l{3}[*]{2}\l[A-Za-z*]\d{3}\w{2}
\l{2}[*]{3}\l[A-Za-z*]\d{3}\w{2}
\l{1}[*]{4}\l[A-Za-z*]\d{3}\w{2}
Driver's License Number - WA State Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 919
Driver's License Number - WI State
Pattern
\l{5}\l[A-Za-z*]\d{3}\w{2}
\l{4}[*]\l[A-Za-z*]\d{3}\w{2}
\l{3}[*]{2}\l[A-Za-z*]\d{3}\w{2}
\l{2}[*]{3}\l[A-Za-z*]\d{3}\w{2}
\l{1}[*]{4}\l[A-Za-z*]\d{3}\w{2}
Driver's License Number - WA State Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\l\d{3}-\d{4}-\d{4}-\d{2}
\l\d{13}
Exclude ending characters Excludes the following characters from the end of the
number:
Pattern
\l\d{3}-\d{4}-\d{4}-\d{2}
\l\d{13}
Library of system data identifiers 921
Driver's License Number - WI State
Driver's License Number - WI State Validation Check Computes the checksum and validates the pattern against
it.
Exclude ending characters Excludes the following characters from the end of the
number:
Pattern
\l\d{3}-\d{4}-\d{4}-\d{2}
\l\d{13}
Driver's License Number - WI State Validation Check Computes the checksum and validates the pattern against
it.
Exclude ending characters Excludes the following characters from the end of the
number:
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[ABFGMPR]\l\d{7}
[ABFGMPR]\d{8}
Library of system data identifiers 923
Drug Enforcement Agency (DEA) Number
The wide breadth of the Drug Enforcement Agency (DEA) Number data identifier
includes no validators.
Pattern
[ABFGMPR]\l\d{7}
[ABFGMPR]\d{8}
Drug Enforcement Agency Number Validation Check Computes the checksum and validates the pattern against
it.
5555555, 55555555
Pattern
[ABFGMPR]\l\d{7}
[ABFGMPR]\d{8}
Drug Enforcement Agency Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 924
Finnish Personal Identification Number
5555555, 55555555
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{6}[-+Aa]\d{3}\w
The wide breadth of the Finnish Personal Identification Number wide breadth
includes no validators.
Pattern
\d{6}[-+Aa]\d{3}\w
Finnish Personal Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{6}[-+Aa]\d{3}\w
Finnish Personal Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 926
France Driver's License Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{12}
Library of system data identifiers 927
France Health Insurance Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
The France Health Insurance Number data identifier provides two breadths of
detection:
■ The wide breadth detects a 21-character number without checksum validation.
See “France Health Insurance Number wide breadth” on page 928.
■ The narrow breadth detects a 21-character number without checksum validation.
It also requires the presence of related keywords.
See “France Health Insurance Number narrow breadth” on page 928.
Pattern
\d{10} \d{10} \d
\d{21}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10} \d{10} \d
\d{21}
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 929
France Tax Identification Number
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[0123]\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 930
France Value Added Tax (VAT) Number
Pattern
[0123]\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
See “France Value Added Tax (VAT) Number wide breadth” on page 931.
■ The medium breadth detects a 13-character alphanumeric pattern with checksum
validation.
See “France Value Added Tax (VAT) Number medium breadth” on page 931.
■ The narrow breadth detects a 13-character alphanumeric pattern with checksum
validation. It also requires the presence of related keywords.
See “France Value Added Tax (VAT) Number narrow breadth” on page 932.
Table 37-226 France Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Ff][Rr][0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{9}
[Ff][Rr] [0-9A-Za-z]{2}\d{9}
[Ff][Rr]-[0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{3}-\d{3}-\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3}.\d{3}.\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3},\d{3},\d{3}
Table 37-227 France Value Added Tax (VAT) Number wide-breadth validator
Table 37-228 France Value Added Tax (VAT) Number medium breadth patterns
[Ff][Rr][0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{9}
[Ff][Rr] [0-9A-Za-z]{2}\d{9}
[Ff][Rr]-[0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{3}-\d{3}-\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3}.\d{3}.\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3},\d{3},\d{3}
Table 37-229 France Value Added Tax (VAT) Number medium breadth validators
France VAT Number Validation Check Checksum validator for the France Value Added Tax (VAT
Number.
Table 37-230 France Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Ff][Rr][0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{9}
[Ff][Rr] [0-9A-Za-z]{2}\d{9}
[Ff][Rr]-[0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{3}-\d{3}-\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3}.\d{3}.\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3},\d{3},\d{3}
Library of system data identifiers 933
French INSEE Code
Table 37-230 France Value Added Tax (VAT) Number narrow-breadth patterns
(continued)
Pattern
Table 37-231 France Value Added Tax (VAT) Number narrow-breadth validators
France VAT Number Validation Check Checksum validator for the France Value Added Tax (VAT
Number.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
after the first 13 digits is optional. The last two digits of the INSEE code encode a
control key used to validate a checksum.
Pattern
\d{13} \d{2}
d{15}
INSEE Control Key This validator computes the INSEE control key and compares it to the last 2 digits
of the pattern.
Pattern
\d{13} \d{2}
d{15}
Inputs:
Pattern
\d{2}\w{2}\w{5}
Pattern
\d{2}\w{2}\w{5}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[12]\d{2}[012]\d{2}[AB1234567890]\d{8}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[12]\d{2}[012]\d{2}[AB1234567890]\d{8}
French Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[12]\d{2}[012]\d{2}[AB1234567890]\d{8}
Library of system data identifiers 938
German Passport Number
Duplicate digits Ensures that a string of digits is not all the same.
French Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\w{9}\dD
\w{10}[dD]
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\w{9}\dD
\w{10}[dD]
German Passport Number Validation Check Computes the checksum every German Passport Number
must pass.
Pattern
\w{9}\dD
\w{10}[dD]
Library of system data identifiers 940
German Personal ID Number
Duplicate digits Ensures that a string of digits is not all the same.
German Passport Number Validation Check Computes the checksum every German Passport Number
must pass.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Pattern
\w{9}\dD
Library of system data identifiers 941
German Personal ID Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\w{9}\dD
German ID Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\w{9}\dD
Duplicate digits Ensures that a string of digits is not all the same.
German ID Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 942
Germany Driver's License Number
Find Keywords If you select this option, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\w\d{2}\w{6}\d\w
Library of system data identifiers 943
Germany Driver's License Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\w\d{2}\w{6}\d\w
Duplicate digits Ensures that a string of digits is not all the same.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 37-262 Germany Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Dd][Ee]\d{9}
[Dd][Ee] \d{9}
Table 37-263 Germany Value Added Tax (VAT) Number wide-breadth validators
Table 37-264 Germany Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Dd][Ee]\d{9}
[Dd][Ee] \d{9}
Table 37-265 Germany Value Added Tax (VAT) Number medium breadth validators
Germany VAT Number Validation Check Checksum validator for the Germany Value Added Tax
(VAT) Number.
Table 37-266 Germany Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Dd][Ee]\d{9}
[Dd][Ee] \d{9}
Table 37-267 Germany Value Added Tax (VAT) Number narrow-breadth validators
Germany VAT Number Validation Check Checksum validator for the Germany Value Added Tax
(VAT) Number.
Library of system data identifiers 946
Greek Tax Identification Number
Table 37-267 Germany Value Added Tax (VAT) Number narrow-breadth validators
(continued)
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{9}
Library of system data identifiers 947
Greek Tax Identification Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
Greek Tax Identification Number Validation Check Computes Greek Tax Identification Number checksum
every Greek Tax Identification Number must pass.
Pattern
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Greek Tax Identification Number Validation Check Computes Greek Tax Identification Number checksum
every Greek Tax Identification Number must pass.
Library of system data identifiers 948
Hong Kong ID
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Hong Kong ID
The Hong Kong ID is the unique identifier for all residents of Hong Kong and appears
on the Hong Kong Identity Card.
The Hong Kong ID data identifier detects the presence of Hong Kong IDs.
The Hong Kong ID data identifier provides two breadths of detection:
■ The wide breadth detects eight characters in the form LDDDDDD(D) or
LDDDDDD(A). The last character in the detected string is used to validate a
checksum.
See “Hong Kong ID wide breadth” on page 948.
■ The narrow breadth detects eight characters in the form LDDDDDD(D) or
LDDDDDD(A). The last character in the detected string is used to validate a
checksum. It also requires the presence of Hong Kong ID-related keywords.
See “Hong Kong ID narrow breadth” on page 949.
Patterns
\w\d{6}(\d)
U\w\d{6}(\d)
\w{2}\d{6}(\d)
\w\d{6}(A)
U\w\d{6}(A)
\w{2}\d{6}(A)
Hong Kong ID Computes the checksum and validates the pattern against it.
Patterns
\w\d{6}(\d)
U\w\d{6}(\d)
\w{2}\d{6}(\d)
\w\d{6}(A)
U\w\d{6}(A)
\w{2}\d{6}(A)
Library of system data identifiers 950
Hungarian Social Security Number
Hong Kong ID Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{9}
Library of system data identifiers 951
Hungarian Social Security Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
Hungarian Social Security Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Hungarian Social Security Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 952
Hungarian Tax Identification Number
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[8]\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[8]\d{9}
Hungarian Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[8]\d{9}
Library of system data identifiers 954
Hungarian VAT Number
Duplicate digits Ensures that a string of digits is not all the same.
Hungarian Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
HU\d{8}
hu\d{8}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
HU\d{8}
hu\d{8}
Hungarian VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
HU\d{8}
Library of system data identifiers 956
IBAN Central
Pattern
hu\d{8}
Duplicate digits Ensures that a string of digits is not all the same.
Hungarian VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
IBAN Central
The International Bank Account Number (IBAN) is an international standard for
identifying bank accounts across national borders.
The IBAN Central data identifier detects IBAN numbers for Andorra, Austria, Belgium,
Germany, Italy, Liechtenstein, Luxembourg, Malta, Monaco, San Marino, and
Switzerland.
The IBAN West data identifier provides two breadths of detection:
■ The wide breadth detects a country-specific IBAN number that passes a
checksum.
See “IBAN Central wide breadth” on page 957.
■ The narrow breadth detects a country-specific IBAN number that passes a
checksum. It also requires the presence of IBAN-related keywords.
See “IBAN Central narrow breadth” on page 958.
Library of system data identifiers 957
IBAN Central
Note: Do not add the NIB validation to any IBAN data identifiers that apply to DLP
Agents. The NIB validator is only for use with server-side detection.
Pattern Description
AD\d{2}-\d{4}-\d{4}-\w{4}-\w{4}-\w{4}
AT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
BE\d{2}-\d{4}-\d{4}-\d{4}
CH\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w
DE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
IT\d{2}-[A-Z]\d{3}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{3}
LI\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w
Library of system data identifiers 958
IBAN Central
Pattern Description
LU\d{2}-\d{3}\w-\w{4}-\w{4}-\w{4}
MC\d{2}-\d{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{4}-\w\d{2}
MT\d{2}[A-Z]{4}\d{4}\d\w{3}\w{4}\w{4}\w{4}\w{3} Malta
MT\d{2}-[A-Z]{4}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w{4}-\w{3}
SM\d{2}-[A-Z]\d{3}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{3}
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Pattern Description
AD\d{2}-\d{4}-\d{4}-\w{4}-\w{4}-\w{4}
Library of system data identifiers 959
IBAN Central
Pattern Description
AT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
BE\d{2}-\d{4}-\d{4}-\d{4}
CH\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w
DE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
IT\d{2}-[A-Z]\d{3}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{3}
LI\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w
LU\d{2}-\d{3}\w-\w{4}-\w{4}-\w{4}
MC\d{2}-\d{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{4}-\w\d{2}
Library of system data identifiers 960
IBAN East
Pattern Description
MT\d{2}[A-Z]{4}\d{4}\d\w{3}\w{4}\w{4}\w{4}\w{3} Malta
MT\d{2}-[A-Z]{4}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w{4}-\w{3}
SM\d{2}-[A-Z]\d{3}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{3}
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
IBAN East
The International Bank Account Number (IBAN) is an international standard for
identifying bank accounts across national borders.
The IBAN East data identifier detects IBAN numbers for Bosnia, Bulgaria, Croatia,
Cyprus, Czech Republic, Estonia, Greece, Hungary, Israel, Latvia, Lithuania,
Macedonia, Montenegro, Poland, Romania, Serbia, Slovakia, Slovenia, Turkey,
and Tunisia.
The IBAN West data identifier provides two breadths of detection:
■ The wide breadth detects a country-specific IBAN number that passes a
checksum.
See “IBAN East wide breadth” on page 961.
■ The narrow breadth detects a country-specific IBAN number that passes a
checksum. It also requires the presence of IBAN-related keywords.
Library of system data identifiers 961
IBAN East
Note: Do not add the NIB validation to any IBAN data identifiers that apply to DLP
Agents. The NIB validator is only for use with server-side detection.
Pattern Description
BA\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
BG\d{2}-[A-Z]{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{2}
CY\d{2}-\d{4}-\d{4}-\w{4}-\w{4}-\w{4}-\w{4}
CZ\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
EE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
GR\d{2}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{4}-\w{3}
Library of system data identifiers 962
IBAN East
Pattern Description
HR\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d
HU\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
IL\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{3}
LT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
LV\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w
ME\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
MK\d{2}-\d{3}\w-\w{4}-\w{4}-\w\d{2}
PL\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
RO\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w{4}
Library of system data identifiers 963
IBAN East
Pattern Description
RS\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
SI\d{2}-\d{4}-\d{4}-\d{4}-\d{3}
SK\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
TN59-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
TR\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w{4}-\w{2}
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Pattern Description
BA\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
BG\d{2}-[A-Z]{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{2}
CY\d{2}-\d{4}-\d{4}-\w{4}-\w{4}-\w{4}-\w{4}
CZ\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
EE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
GR\d{2}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{4}-\w{3}
HR\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d
HU\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
Library of system data identifiers 965
IBAN East
Pattern Description
IL\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{3}
LT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
LV\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w
ME\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
MK\d{2}-\d{3}\w-\w{4}-\w{4}-\w\d{2}
PL\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
RO\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w{4}
RS\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
SI\d{2}-\d{4}-\d{4}-\d{4}-\d{3}
Library of system data identifiers 966
IBAN West
Pattern Description
SK\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
TN59-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
TR\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w{4}-\w{2}
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
IBAN West
The International Bank Account Number (IBAN) is an international standard for
identifying bank accounts across national borders.
The IBAN West data identifier detects IBAN numbers for Denmark, Faroe Islands,
Finland, France, Gibraltar, Greenland, Iceland, Ireland, Netherlands, Norway,
Portugal, Spain, Sweden, and the United Kingdom.
The IBAN West data identifier provides two breadths of detection:
■ The wide breadth detects a country-specific IBAN number that passes a
checksum.
See “IBAN West wide breadth” on page 967.
Library of system data identifiers 967
IBAN West
Note: Do not add the NIB validation to any IBAN data identifiers that apply to DLP
Agents. The NIB validator is only for use with server-side detection.
Pattern Description
DK\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
ES\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
FI\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
FO\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
FR\d{2}-\d{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{4}-\w\d{2}
GB\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{4}-\d{2}
Library of system data identifiers 968
IBAN West
Pattern Description
GI\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w{3}
GL\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
IE\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{4}-\d{2}
IS\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
NL\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{2}
NO\d{2}-\d{4}-\d{4}-\d{3}
PT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d
SE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
Library of system data identifiers 969
IBAN West
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Pattern Description
DK\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
ES\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
FI\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
FO\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
FR\d{2}-\d{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{4}-\w\d{2}
GB\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{4}-\d{2}
Library of system data identifiers 970
IBAN West
Pattern Description
GI\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w{3}
GL\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
IE\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{4}-\d{2}
IS\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
NL\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{2}
NO\d{2}-\d{4}-\d{4}-\d{3}
PT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d
SE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
Library of system data identifiers 971
Indian Aadhaar Card Number
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
[2-9]\d{11}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[2-9]\d{11}
Exclude ending characters Any number ending with the following characters is
excluded from matching:
333333333333,666666666666,999999999999
Verheoff validation check Computes the checksum and validates the pattern against
it.
Pattern
[2-9]\d{11}
Exclude ending characters Any number ending with the following characters is
excluded from matching:
333333333333,666666666666,999999999999
Verheoff validation check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[A-Za-z]{3}[CPHFATBLJGcphfatbljg][A-Za-z]\d{4}[A-Za-z]
Library of system data identifiers 974
Indonesian Identity Card Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[A-Za-z]{3}[CPHFATBLJGcphfatbljg][A-Za-z]\d{4}[A-Za-z]
Duplicate digits Ensures that a string of digits is not all the same.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The narrow breadth detects a 16-digit number that passes checksum validation.
It also requires the presence of Indonesian Identity Card Number-related
keywords.
See “Indonesian Identity Card Number narrow breadth” on page 975.
Pattern
\d{2}[01237]\d{3}[01234567]\d[01]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{2}[01237]\d{3}[01234567]\d[01]\d{7}
Indonesian Kartu Tanda Penduduk Validation Check Validator computes the checksum that every Indonesian
Kartu Tanda Penduduk must pass.
Pattern
\d{2}[01237]\d{3}[01234567]\d[01]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Indonesian Kartu Tanda Penduduk Validation Check Validator computes the checksum that every Indonesian
Kartu Tanda Penduduk must pass.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{15}
\d{2}-\d{6}-\d{6}-\d
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{15}
\d{2}-\d{6}-\d{6}-\d
Luhn Check Computes the Luhn checksum and validates the pattern
against it.
Exclude beginning characters Excludes the following characters from the beginning of
the number:
000000000000000
Pattern
\d{15}
\d{2}-\d{6}-\d{6}-\d
Luhn Check Computes the Luhn checksum and validates the pattern
against it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
imei, IMEI, imei no, IMEI No, IMEI Number, imei number,
International Mobile Station Equipment Identity
Number, International Mobile Station Equipment
Identity
Library of system data identifiers 979
International Securities Identification Number
Pattern
\l{2}\w{9}\d
Pattern
\l{2}\w{9}\d
International Securities Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Library of system data identifiers 980
IP Address
Pattern
\l{2}\w{9}\d
International Securities Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
IP Address
An IP address is the computer networking code that is used to identify devices and
facilitate communications.
The IP Address data identifier detects IPv4 addresses.
This data identifier offers three breadths of detection:
■ The wide breadth detects IP addresses and validates their format.
See “IP Address wide breadth” on page 981.
■ The medium breadth detects IP addresses, validates their format, and eliminates
fictitious addresses.
See “IP Address medium breadth” on page 981.
Library of system data identifiers 981
IP Address
■ The narrow breadth detects IP addresses, validates their format, and eliminates
fictitious and unassigned addresses.
See “IP Address narrow breadth” on page 982.
Pattern
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[0-9]
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[1-2][0-9]?
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[3][0-2]?
Validator Description
IP Basic Check Every IP address must match the format x.x.x.x and every
number must be less than 256.
Pattern
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[0-9]
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[1-2][0-9]?
Library of system data identifiers 982
IP Address
Pattern
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[3][0-2]?
IP Octet Check Every IP address must match the format x.x.x.x, every number must be less than 256,
and no IP address can contain only single-digit numbers (1.1.1.2).
Pattern
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[0-9]
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[1-2][0-9]?
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[3][0-2]?
IP Octet Check Every IP address must match the format x.x.x.x, every number must be less than 256,
and no IP address can contain only single-digit numbers (1.1.1.2).
IP Octet Check Checks whether the IP address falls into any of the "Bogons" ranges. If so, the match
is invalid.
Library of system data identifiers 983
IPv6 Address
IPv6 Address
Internet Protocol version 6 (IPv6) is the latest version of the Internet Protocol (IP),
the communications protocol that provides an identification and location system for
computers on networks and routes traffic across the Internet.
This data identifier offers three breadths of detection:
■ The wide breadth detects IPv6 addresses and validates their format.
See “IPv6 Address wide breadth” on page 983.
■ The medium breadth detects IPv6 addresses and validates their format. It also
validates that they do not begin with the numeral 0.
See “IPv6 Address medium breadth” on page 984.
■ The narrow breadth detects IPv6 addresses and validates their format. It also
validates that they do not begin with the numeral 0. Address strings are fully
compressed, not normalized.
See “IPv6 Address narrow breadth” on page 984.
Pattern
[0-9A-Fa-f:./%]{11,19}
[0-9A-Fa-f:./%]{2,10}
[0-9A-Fa-f:./%]{20,28}
[0-9A-Fa-f:./%]{29,37}
[0-9A-Fa-f:./%]{38,46}
[0-9A-Fa-f:./%]{47,48}
Validator Description
IPv6 Address Basic Validation Check Checks every IPv6 address and verifies that they match
the xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx format.
Library of system data identifiers 984
IPv6 Address
Pattern
[0-9A-Fa-f:./%]{11,19}
[0-9A-Fa-f:./%]{2,10}
[0-9A-Fa-f:./%]{20,28}
[0-9A-Fa-f:./%]{29,37}
[0-9A-Fa-f:./%]{38,46}
[0-9A-Fa-f:./%]{47,48}
IPv6 Address Medium Checks every IPv6 address and verifies that they match the
Validation Check xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx format, and that addresses do not start with
the numeral 0.
Pattern
[0-9A-Fa-f:./%]{11,19}
[0-9A-Fa-f:./%]{2,10}
[0-9A-Fa-f:./%]{20,28}
[0-9A-Fa-f:./%]{29,37}
[0-9A-Fa-f:./%]{38,46}
Library of system data identifiers 985
Irish Personal Public Service Number
Pattern
[0-9A-Fa-f:./%]{47,48}
IPv6 Address Reserved Checks every IPv6 address and verifies that they match the
Validation Check xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx format, do not start with the numeral 0, and
are fully compressed.
normalizer Description
Pattern
\d{7}[a-wA-W]
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{7}[a-wA-W]
Irish Personal Public Service Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{7}[a-wA-W]
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 987
Israel Personal Identification Number
Irish Personal Public Service Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
Israeli Identity Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{9}
Library of system data identifiers 989
Italy Driver's License Number
Israel Personal Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\l[AVav]\w{7}\l
\l[AVav] \w{7} \l
\l[AVav]-\w{7}-\l
Pattern
\l[AVav]\w{7}\l
\l[AVav] \w{7} \l
\l[AVav]-\w{7}-\l
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[A-Z]{6}[0-9LMNPQRSTUV]{2}[ABCDEHLMPRST][0-9LMNPQRSTUV]
Library of system data identifiers 992
Italy Health Insurance Number
Pattern
{2}[A-Z][0-9LMNPQRSTUV]{3}[A-Z]
[0-9LMNPQRSTUV]{2} [A-Z][0-9LMNPQRSTUV]{3}[A-Z]
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Pattern
[A-Z]{6}[0-9LMNPQRSTUV]{2}[ABCDEHLMPRST][0-9LMNPQRSTUV]
{2}[A-Z][0-9LMNPQRSTUV]{3}[A-Z]
[0-9LMNPQRSTUV]{2} [A-Z][0-9LMNPQRSTUV]{3}[A-Z]
Codice Fiscale Control Key Check Computes the control key and checks if it is valid.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Pattern
\l{2}\d{7}
Pattern
\l{2}\d{7}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 37-372 Italy Value Added Tax (VAT) Number wide-breadth pattern
Pattern
[Ii][Tt]\d{11}
[Ii][Tt] \d{11}
[Ii][Tt].\d{11}
[Ii][Tt]-\d{11}
[Ii][Tt],\d{11}
Table 37-373 Italy Value Added Tax (VAT) Number wide-breadth validator
Table 37-374 Italy Value Added Tax (VAT) Number medium-breadth patterns
[Ii][Tt]\d{11}
[Ii][Tt] \d{11}
[Ii][Tt].\d{11}
[Ii][Tt]-\d{11}
[Ii][Tt],\d{11}
Library of system data identifiers 996
Japan Passport Number
Table 37-375 Italy Value Added Tax (VAT) Number medium-breadth validator
Italy VAT Number Validation Check Checksum validator for the Italy Value Added
Tax (VAT) Number.
Table 37-376 Italy Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Ii][Tt]\d{11}
[Ii][Tt] \d{11}
[Ii][Tt].\d{11}
[Ii][Tt]-\d{11}
[Ii][Tt],\d{11}
Table 37-377 Italy Value Added Tax (VAT) Number narrow-breadth validators
Italy VAT Number Validation Check Checksum validator for the Italy Value Added Tax (VAT)
Number.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\l{2}\d{3}\l\d{2}\l\d
\l{2}\d{4}\l\d\l\d
\l\d{4}\l\d{2}\l\d
\l\d{4}\l\d{2}\l{2}\d
\l{2}\d{3}\l\d{2}\l{2}\d
\l{2}\d{8}
\l{2}\d{7}
\l\d{8}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\l{2}\d{3}\l\d{2}\l\d
Library of system data identifiers 998
Japanese Juki-Net Identification Number
Patterns
\l{2}\d{4}\l\d\l\d
\l\d{4}\l\d{2}\l\d
\l\d{4}\l\d{2}\l{2}\d
\l{2}\d{3}\l\d{2}\l{2}\d
\l{2}\d{8}
\l{2}\d{7}
\l\d{8}
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{11}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{11}
Japanese Juki-Net Id Validation Check Validator computes checksum number that every Japanese
Juki-net card number must pass.
Pattern
\d{11}
Library of system data identifiers 1000
Japanese My Number - Corporate
Duplicate digits Ensures that a string of digits is not all the same.
Japanese Juki-Net Id Validation Check Validator computes checksum number that every Japanese
Juki-net card number must pass..
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{13}
Library of system data identifiers 1001
Japanese My Number - Personal
Duplicate digits Ensures that a string of digits is not all the same.
Japanese My Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{13}
Duplicate digits Ensures that a string of digits is not all the same.
Japanese My Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude beginning characters Excludes the following characters from the beginning of
the number: 000000000000
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
マイナンバー, 共通番号
Pattern
\d{12}
Japanese My Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude beginning characters Excludes the following characters from the beginning of
the number: 000000000000
Pattern
\d{12}
\d{4}-\d{4}-\d{4}
\d{4}.\d{4}.\d{4}
Library of system data identifiers 1003
Korea Passport Number
Japanese My Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude beginning characters Excludes the following characters from the beginning of
the number: 000000000000
Pattern
\d{12}
\d{4}-\d{4}-\d{4}
\d{4}.\d{4}.\d{4}
Japanese My Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude beginning characters Excludes the following characters from the beginning of
the number: 000000000000
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
The Korea Passport Number data identifier provides two breadths of detection:
■ The wide breadth detects a valid Korean Passport Number pattern.
See “Korea Passport Number wide breadth” on page 1004.
■ The narrow breadth detects a valid Korean Passport Number pattern. It also
requires the presence of related keywords.
See “Korea Passport Number narrow breadth” on page 1004.
Patterns
\l{2}\d{7}
\l\d{8}
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\l{2}\d{7}
\l\d{8}
\d{9}
Library of system data identifiers 1005
Korea Residence Registration Number for Foreigners
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
KRRN Foreign Validation Check Validates that the third and fourth digits represent a valid
month, and that the fifth and sixth digits represent a valid
day. Validates the checksum of the pattern.
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
KRRN Foreign Validation Check Validates that the third and fourth digits represent a valid
month, and that the fifth and sixth digits represent a valid
day. Validates the checksum of the pattern.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Library of system data identifiers 1009
Korea Residence Registration Number for Korean
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Advanced KRRN Validation Validates that the third and fourth digits represent a valid
month, and that the fifth and sixth digits represent a valid
day. Validates the checksum of the pattern.
Pattern
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Advanced KRRN Validation Validates that the third and fourth digits represent a valid
month, and that the fifth and sixth digits represent a valid
day. Validates the checksum of the pattern.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{11}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{11}
Luxembourg National Register of Individuals Number Validator computes checksum number that every
Validation Check Luxembourg Registre national des personnes physiques
Number must pass.
Library of system data identifiers 1012
Luxembourg National Register of Individuals Number
Pattern
\d{11}
Duplicate digits Ensures that a string of digits is not all the same.
Luxembourg National Register of Individuals Number Validator computes checksum number that every
Validation Check Luxembourg Registre national des personnes physiques
Number must pass.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{12}
\d{6}-\d{2}-\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{12}
\d{6}-\d{2}-\d{4}
Malaysian My Kad Number Validation Check Validator computes checksum number that every
Malaysian My Kad Number must pass.
Pattern
\d{12}
\d{6}-\d{2}-\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Malaysian MyKad Number Validation Check Validator computes checksum number that every
Malaysian MyKad Number must pass.
Library of system data identifiers 1015
Mexican Personal Registration and Identification Number
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{2}-\d{3}-\d{2}-\d{7}-\w
Exclude ending characters Any number ending with the following characters is
excluded from matching:
00000000000000, 11111111111111,
22222222222222, 33333333333333,
44444444444444, 55555555555555,
66666666666666, 77777777777777,
88888888888888, 99999999999999
Pattern
\d{2}-\d{3}-\d{2}-\d{7}-\w
Library of system data identifiers 1017
Mexican Personal Registration and Identification Number
Exclude ending characters Any number ending with the following characters is
excluded from matching:
00000000000000, 11111111111111,
22222222222222, 33333333333333,
44444444444444, 55555555555555,
66666666666666, 77777777777777,
88888888888888, 99999999999999
Mexican CRIP Validation Check Computes the checksum for every number matched and
validates the pattern against it.
Pattern
\d{2}-\d{3}-\d{2}-\d{7}-\w
Exclude ending characters Any number ending with the following characters is
excluded from matching:
Mexican CRIP Validation Check Computes the checksum for every number matched and
validates the pattern against it.
Library of system data identifiers 1018
Mexican Tax Identification Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\l{4}\d{2}[01]\d[0-3]\d\w{3}
\l{4}[- ]\d{2}[01]\d[0-3]\d\w{3}
Library of system data identifiers 1019
Mexican Tax Identification Number
Patterns
\l{3}\d{2}[01]\d[0-3]\d\w{3}
\l{3}[- ]\d{2}[01]\d[0-3]\d\w{3}
Patterns
\l{4}\d{2}[01]\d[0-3]\d\w{3}
\l{4}[- ]\d{2}[01]\d[0-3]\d\w{3}
\l{3}\d{2}[01]\d[0-3]\d\w{3}
\l{3}[- ]\d{2}[01]\d[0-3]\d\w{3}
Mexican TAX ID Validation Check Computes the checksum for every number matched and
validates the pattern against it.
Patterns
\l{4}\d{2}[01]\d[0-3]\d\w{3}
\l{4}[- ]\d{2}[01]\d[0-3]\d\w{3}
\l{3}\d{2}[01]\d[0-3]\d\w{3}
Library of system data identifiers 1020
Mexican Unique Population Registry Code
Patterns
\l{3}[- ]\d{2}[01]\d[0-3]\d\w{3}
Mexican TAX ID Validation Check Computes the checksum for every number matched and
validates the pattern against it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\w[AEIOUaeiou]\w{2}\d{2}[0-1]\d[0-3]\d[HMhm]\w{7}
Pattern
\w[AEIOUaeiou]\w{2}\d{2}[0-1]\d[0-3]\d[HMhm]\w{7}
Mexican Personal ID Code Number Validation Check Validator computes checksum number that every Mexican
Personal ID Code Number must pass.
Pattern
\w[AEIOUaeiou]\w{2}\d{2}[0-1]\d[0-3]\d[HMhm]\w{7}
Mexican Personal ID Code Number Validation Check Validator computes checksum number that every Mexican
Personal ID Code Number must pass.
Library of system data identifiers 1022
Mexico CLABE Number
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{18}
Library of system data identifiers 1023
Mexico CLABE Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{18}
Mexico CLABE Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude beginning characters Excludes the following characters from the beginning of
the number: 555555555555555555
Pattern
\d{18}
Mexico CLABE Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1024
National Drug Code (NDC)
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
*?\d{4}-\d{4}-\d{2}
\d{5}-*?\d{3}-\d{2}
\d{5}-\d{4}-*?\d
\d{5}-\d{4}-\d{2}
Note: The medium breadth of this data identifier does not include any validators.
Pattern
*?\d{4}-\d{4}-\d{2}
\d{5}-*?\d{3}-\d{2}
\d{5}-\d{4}-*?\d
\d{5}-\d{4}-\d{2}
This data identifier also detects the HIPAA format, an 11-digit number in the format
5-4-2. The HIPAA format may include a single asterisk to represent a missing digit.
This data identifier also requires the presence of an NDC-related keyword.
Pattern
*?\d{4}-\d{4}-\d{2}
\d{5}-*?\d{3}-\d{2}
\d{5}-\d{4}-*?\d
\d{5}-\d{4}-\d{2}
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Pattern
\d{10}
80840\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
80840\d{10}
National Provider Identifier Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{10}
80840\d{10}
Library of system data identifiers 1028
Netherlands Driver's License Number
National Provider Identifier Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
Library of system data identifiers 1029
Netherlands Passport Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\w{9}
Pattern
\w{9}
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{9}
\d{3}-\d{3}-\d{3}
\d{3}.\d{3}.\d{3}
Pattern
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
\d{3}-\d{3}-\d{3}
\d{3}.\d{3}.\d{3}
Dutch Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{9}
\d{3}-\d{3}-\d{3}
\d{3}.\d{3}.\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Dutch Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1034
Netherlands Value Added Tax (VAT) Number
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 37-472 Netherlands Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Nn][Ll]\d{9}[Bb]\d{2}
[Nn][Ll]-\d{9}-[Bb]\d{2}
[Nn][Ll].\d{9}.[Bb]\d{2}
Table 37-473 Netherlands Value Added Tax (VAT) Number wide-breadth validator
Pattern
[Nn][Ll]\d{9}[Bb]\d{2}
[Nn][Ll]-\d{9}-[Bb]\d{2}
Pattern
[Nn][Ll].\d{9}.[Bb]\d{2}
Table 37-475 Netherlands Value Added Tax (VAT) Number medium breadth
validator
Netherlands VAT Number Validation Check Checksum validator for the Netherlands Value Added Tax
(VAT) Number.
Pattern
[Nn][Ll]\d{9}[Bb]\d{2}
[Nn][Ll]-\d{9}-[Bb]\d{2}
[Nn][Ll].\d{9}.[Bb]\d{2}
Netherlands VAT Number Validation Check Checksum validator for the Netherlands Value Added Tax
(VAT) Number.
Library of system data identifiers 1037
New Zealand National Health Index Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 37-478 New Zealand National Health Index Number wide-breadth pattern
Pattern
\l{3}\d{4}
Table 37-479 New Zealand National Health Index Number medium-breadth pattern
Pattern
\l{3}\d{4}
New Zealand National Health Index Number Validation Computes the checksum and validates the pattern against
Check it.
Table 37-481 New Zealand National Health Index Number narrow-breadth patterns
Pattern
\l{3}\d{4}
New Zealand National Health Index Number Validation Computes the checksum and validates the pattern against
Check it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[01234567]\d[012345]\d[56789]\d[567]\d{4}
[01234567]\d[012345]\d\d\d[01234]\d{4}
[01234567]\d[012345]\d[456789]\d[9]\d{4}
Library of system data identifiers 1040
Norwegian Birth Number
Pattern
[01234567]\d[012345]\d[0123]\d[56789]\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[01234567]\d[012345]\d[56789]\d[567]\d{4}
[01234567]\d[012345]\d\d\d[01234]\d{4}
[01234567]\d[012345]\d[456789]\d[9]\d{4}
[01234567]\d[012345]\d[0123]\d[56789]\d{4}
Norwegian Birth Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[01234567]\d[012345]\d[56789]\d[567]\d{4}
[01234567]\d[012345]\d\d\d[01234]\d{4}
[01234567]\d[012345]\d[456789]\d[9]\d{4}
[01234567]\d[012345]\d[0123]\d[56789]\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Norwegian Birth Number Validation Check Computes the checksum and validates the pattern against
it.
Norwegian Birth Number Validation Check With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{17}[Xx]
\d{18}
China ID checksum validator Computes the checksum and validates the pattern against
it.
Table 37-491
Pattern
\d{17}[Xx]
\d{18}
Table 37-492
Mandatory validator Description
Inputs:
身份证,居民信息,居民身份信息, Identity
Card, Information of resident, Information
of resident identification
Library of system data identifiers 1043
Polish Identification Number
Pattern
[A-Z]{3}\d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[A-Z]{3}\d{6}
Polish ID Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[A-Z]{3}\d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Polish ID Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1045
Polish REGON Number
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{9}
Library of system data identifiers 1046
Polish REGON Number
Pattern
\d{3}-\d{2}-\d{2}-\d{2}
\d{14}
\d{9}-\d{5}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
\d{3}-\d{2}-\d{2}-\d{2}
\d{14}
\d{9}-\d{5}
Polish REGON Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{9}
\d{3}-\d{2}-\d{2}-\d{2}
\d{14}
\d{9}-\d{5}
Duplicate digits Ensures that a string of digits is not all the same.
Polish REGON Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{2}[012389]\d[0-3]\d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Table 37-507 Polish Social Security Number (PESEL) medium breadth pattern
Pattern
\d{2}[012389]\d[0-3]\d{6}
Table 37-508 Polish Social Security Number (PESEL) medium breadth validators
Polish Social Security Number Validation Check Validator computes checksum number that every Polish
Social Security Number must pass
Table 37-509 Polish Social Security Number (PESEL) narrow breadth patterns
Pattern
\d{2}[012389]\d[0-3]\d{6}
Table 37-510 Polish Social Security Number (PESEL) narrow breadth validator
Duplicate digits Ensures that a string of digits is not all the same.
Polish Social Security Number Validation Check Validator computes checksum number that every Polish
Social Security Number must pass.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
Polish Social Security Number Validation Check Validator computes checksum number that every Polish
Tax ID number must pass.
Pattern
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Polish Tax ID Number Validation Check Validator computes checksum number that every Polish
Tax ID number must pass.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
In Symantec Data Loss Prevention version 12.5, the Randomized US SSN data
identifier replaced the US Social Security Number (SSN) data identifier. All policy
templates that implement the US SSN data identifier are updated to use the
system-defined Randomized US SSN data identifier. In addition, in version 14.0
the patterns and validators for the Randomized US SSN data identifier were updated
from the 12.5 version of the Randomized US SSN data identifier. Symantec
recommends that you update your policies to use the version 14.0 or later
Randomized US SSN data identifier.
See “Updating policies to use the Randomized US SSN data identifier” on page 689.
See “Use the Randomized US SSN data identifier to detect SSNs” on page 708.
The Randomized US SSN data identifier provides two breadths of detection:
■ The medium breadth detects a 9-digit number in the format DDD-DD-DDDD.
The digits must be in assigned number ranges.
See “Randomized US Social Security Number (SSN) medium breadth”
on page 1052.
■ The narrow breadth detects a 9-digit number in the format DDD-DD-DDDD. The
digits must be in assigned number ranges. It also requires the presence of
SSN-related keywords.
See “Randomized US Social Security Number (SSN) narrow breadth”
on page 1053.
Exclude beginning characters 666, 000, 123456789, 111111111, See “Using pattern validators”
222222222, 333333333, 444444444, on page 696.
555555555, 666666666, 77777777,
888888888
Number Delimiter
Pattern
[0-8]\d{3}[1-9]\d{4}
[0-8]\d{2}[1-9]\d{5}
[0-8]\d{2}-\d{1}[1-9]-\d{4}
[0-8]\d{2}-[1-9]\d{1}-\d{4}
Table 37-520
Validator Description
Validator Description
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Randomized US Social Security Number Validation Computes the checksum and validates the pattern against
Check it.
Pattern
[1-9]\d\d[0-1]\d[0-3]\d{7}
Library of system data identifiers 1055
Romanian Numerical Personal Code
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[1-9]\d\d[0-1]\d[0-3]\d{7}
Romanian Numerical Personal Code Check Validator computes checksum number that every
Romanian Numerical Personal Code number must pass.
Pattern
[1-9]\d\d[0-1]\d[0-3]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Romanian Numerical Personal Code Check Validator computes checksum every Romanian Numerical
Personal Code must pass.
Library of system data identifiers 1056
Russian Passport Identification Number
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
\d{4}[ ]\d{6}
Library of system data identifiers 1057
Russian Passport Identification Number
Pattern
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
\d{4}[ ]\d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Find Keywords If you select this option, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
\d{12}
Russian Taxpayer Identification Number Validation Check Validator computes checksum number that every Russian
Taxpayer Identification number must pass.
Pattern
\d{10}
\d{12}
Duplicate digits Ensures that a string of digits is not all the same
Russian Taxpayer Identification Number Validation Check Validator computes checksum number that every Russian
Taxpayer Identification number must pass.
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1060
Singapore NRIC data identifier
Find keywords If you select this option, you have to use at least one of
the following keywords or key phrases must be present
for the data to be matched.
Inputs:
Pattern
[SFTGsftg]\d{7}\w
Pattern
[0123678]\d{8}
[0123678]\d{3}-\d{4}-\d
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}[01]\d{2}
Library of system data identifiers 1062
South African Personal Identification Number
South African Personal Identification Number Validation Validator computes checksum number that every South
Check African Personal Identification number must pass.
Pattern
\d{10}[01]\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
South African Personal Identification Number Validation Validator computes checksum number that every South
Check African Personal Identification number must pass.
Library of system data identifiers 1063
Spain Driver's License Number
Find Keywords If you select this option selected, at least one of the
following keywords or key phrases must be present for the
data to be matched.
Inputs:
Pattern
\d{8}\w
Library of system data identifiers 1064
Spain Driver's License Number
Pattern
\d{8}[- ]\w
\d{8}[ ][-]\w
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{8}\w
\d{8}[- ]\w
Library of system data identifiers 1065
Spanish Customer Account Number
Pattern
\d{8}[ ][-]\w
DNI control key check Computes the control key and checks if it is valid.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The narrow breadth detects a 20-digit number that passes checksum validation.
It also requires the presence of Spanish Customer Account Number-related
keywords.
See “Spanish Customer Account Number narrow breadth” on page 1067.
Pattern
\d{20}
0128\d{16}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{20}
0128\d{16}
Library of system data identifiers 1067
Spanish Customer Account Number
Spanish Customer Account Number Validation Check Validator computes checksum number that every Spanish
Customer Account number must pass.
Pattern
\d{20}
0128\d{16}
Duplicate digits Ensures that a string of digits is not all the same.
Spanish Customer Account Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords At least one of the following keywords or key phrases must
be present for he data to match when you use this option.
Inputs:
Spanish DNI ID
The Spanish DNI ID appears on the Documento nacional de identidad (DNI) and
is issued by the Spanish Hacienda Publica to every citizen of Spain. It is the most
important unique identifier in Spain used for opening accounts, signing contracts,
taxes, and elections.
The Spanish DNI ID data identifier provides two breadths of detection:
■ The wide breadth detects an 8-digit number followed by a hyphen and letter.
The last letter must match a checksum algorithm.
See “Spanish DNI ID wide breadth” on page 1068.
■ The narrow breadth detects an 8-digit number followed by a hyphen and letter.
The last letter must match a checksum algorithm. It also requires the presence
of Spanish DNI-related keywords.
See “Spanish DNI ID narrow breadth” on page 1068.
Pattern
\d{7}\w
\d{7}[- ]\w
\d{7}[ ][-]\w
DNI control key check Computes the control key and checks if it is valid.
Pattern
\d{7}\w
\d{7}[- ]\w
\d{7}[ ][-]\w
DNI control key check Computes the control key and checks if it is valid.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Patterns
\l{2}\d{6}
\l{2}-\d{6}
\l{2} \d{6}
\l{3}\d{6}
\l{3}-\d{6}
\l{3} \d{6}
Patterns
\l{2}\d{6}
\l{2}-\d{6}
\l{2} \d{6}
\l{3}\d{6}
\l{3}-\d{6}
\l{3} \d{6}
Library of system data identifiers 1071
Spanish Social Security Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{12}
\d{2}[/]\d{8}[/]\d{2}
Library of system data identifiers 1072
Spanish Social Security Number
Pattern
\d{2}[-]\d{8}[-]\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{12}
\d{2}[/]\d{8}[/]\d{2}
\d{2}[-]\d{8}[-]\d{2}
Spanish SSN Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{12}
\d{2}[/]\d{8}[/]\d{2}
Library of system data identifiers 1073
Spanish Tax Identification (CIF)
Table 37-567 Spanish Social Security Number narrow breadth patterns (continued)
Pattern
\d{2}[-]\d{8}[-]\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Spanish SSN Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
[KPQS]\d{7}[A-J]
[KPQS]-\d{7}[A-J]
[ABEH]\d{7}[0-9]
[ABEH]-\d{7}[0-9]
[CDFGJLMNRUVW]\d{7}[A-J0-9]
[CDFGJLMNRUVW]-\d{7}[A-J0-9]
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[KPQS]\d{7}[A-J]
[KPQS]-\d{7}[A-J]
[ABEH]\d{7}[0-9]
[ABEH]-\d{7}[0-9]
[CDFGJLMNRUVW]\d{7}[A-J0-9]
[CDFGJLMNRUVW]-\d{7}[A-J0-9]
Library of system data identifiers 1075
Spanish Tax Identification (CIF)
Spanish Tax ID Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[KPQS]\d{7}[A-J]
[KPQS]-\d{7}[A-J]
[ABEH]\d{7}[0-9]
[ABEH]-\d{7}[0-9]
[CDFGJLMNRUVW]\d{7}[A-J0-9]
[CDFGJLMNRUVW]-\d{7}[A-J0-9]
Duplicate digits Ensures that a string of digits is not all the same.
Spanish Tax ID Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1076
Swedish Passport Number
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
tax ID, tax ID number, CIF ID, CIF no, spanish CIF ID,
cif, tax file no, spanish CIF number, tax file number,
spanish CIF no, tax no, tax number, tax id, taxid#,
taxno#, CIFid#, CIFID#, spanishCIFID#, spanishCIFno#,
cifid#, número de contribuyente, número de impuesto
corporativo, número de Identificación fiscal, CIF
número, CIFnúmero#
Patterns
\d{8}
\d{2}-\d{6}
\l{2}-\d{6}
Library of system data identifiers 1077
Swedish Personal Identification Number
Patterns
\d{8}
\d{2}-\d{6}
\l{2}-\d{6}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d\d[01]\d[01236789]\d[-]\d\d\d\d
\d\d[01]\d[01236789]\d[+]\d\d\d\d
\d\d[01]\d[01236789]\d\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[-]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[+]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d\d[01]\d[01236789]\d[-]\d\d\d\d
\d\d[01]\d[01236789]\d[+]\d\d\d\d
Library of system data identifiers 1079
Swedish Personal Identification Number
Pattern
\d\d[01]\d[01236789]\d\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[-]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[+]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d\d\d\d\d
Swedish Personal Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d\d[01]\d[01236789]\d[-]\d\d\d\d
\d\d[01]\d[01236789]\d[+]\d\d\d\d
\d\d[01]\d[01236789]\d\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[-]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[+]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1080
SWIFT Code
Swedish Personal Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
SWIFT Code
The SWIFT Code is a unique identifier for banks and is managed by the Society
for Worldwide Interbank Financial Telecommunications (SWIFT). The SWIFT Code
is required for monetary transfers between financial institutions. It is also known as
the Bank Identifier Code (BIC).
The SWIFT Code data identifier detects the presence of the SWIFT Code.
This data identifier provides two breadths of validation:
■ Wide breadth
See “SWIFT Code wide breadth” on page 1080.
■ Narrow breadth
See “SWIFT Code narrow breadth” on page 1081.
Pattern
[A-Z]{6}\w{2}
[A-Z]{6}\w{5}
Require beginning characters With this option selected, any of the following list of values are required at the
beginning of the matched data.
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Find keywords input bic, bic#, international organization for standardization 9362, iso 9362,
iso9362, swift, swift#, swiftcode, swiftnumber, swiftroutingnumber
Pattern
[A-Z]{6}\w{2}
[A-Z]{6}\w{5}
Validator Description
Require beginning characters With this option selected, any of the following list of values are required at the
beginning of the matched data.
Find keywords With this option selected, at least one of the following keywords or keyphrases
must be present for the data to be matched.
Find keywords input bic#, international organization for standardization 9362, iso 9362, iso9362,
swift#, swiftcode, swiftnumber, swiftroutingnumber, swift code, swift
number, swift routing number, bic number, bic code, bic #
Library of system data identifiers 1082
Swiss AHV Number
Pattern
\d{3}.\d{2}.\d{3}.\d{3}
\d{11}
Pattern
\d{3}.\d{2}.\d{3}.\d{3}
\d{11}
Library of system data identifiers 1083
Swiss Social Security Number (AHV)
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
[7][5][6]\d{10}
[7][5][6][.]\d{4}[.]\d{4}[.]\d{2}
Validator Description
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[7][5][6]\d{10}
[7][5][6][.]\d{4}[.]\d{4}[.]\d{2}
Validator Description
Swiss Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[7][5][6]\d{10}
[7][5][6][.]\d{4}[.]\d{4}[.]\d{2}
Library of system data identifiers 1085
Taiwan ROC ID
Validator Description
Duplicate digits Ensures that a string of digits is not all the same.
Swiss Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Versicherungsnummer, Identifikationsnummer,
einzigartige Identität nicht,
Sozialversicherungsnummer, identification
personnelle ID, numéro de sécurité sociale
Taiwan ROC ID
In Taiwan an ID card is mandatory for all citizens who are over 14-years old. The
ID card has been uniformly numbered since 1965.
The Taiwan ROC ID data identifier detects the presence of Taiwan identification
number based on two types of common ID patterns. The last character matched is
used to validate a checksum.
The Taiwan ROC ID data identifier provides two breadths of detection:
■ The wide breadth detects a Taiwan ROC ID number with checksum validation.
See “Taiwan ROC ID wide breadth” on page 1086.
■ The narrow breadth detects a Taiwan ROC ID number with checksum validation.
It also requires the presence of Taiwan ROC ID-related keywords.
See “Taiwan ROC ID narrow breadth” on page 1086.
Library of system data identifiers 1086
Taiwan ROC ID
Patterns
[A-Z][12][0-3]\d{7}
[A-Z][ABCD]\d{8}
Validator Description
Patterns
[A-Z][12][0-3]\d{7}
[A-Z][ABCD]\d{8}
Validator Description
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
[1-8]\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[1-8]\d{12}
Thailand Personal ID Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[1-8]\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Thailand Personal ID Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
ประกันภัยจำนวน, หมายเลขประจำตัวส่วนบุคคล,
หมายเลขประจำตัวที่ไม่ซ้ำกัน, ประกันภัยจำนวน#,
หมายเลขประจำตัวส่วนบุคคล#, หมายเลขประจำตัวทีไ ่ มซ้ำกัน#
Library of system data identifiers 1089
Turkish Identification Number
Pattern
[123456789]\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[123456789]\d{10}
Turkish Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1090
UK Drivers Licence Number
Pattern
[123456789]\d{10}
Turkish Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
The UK Drivers Licence Number data identifier detects the presence of UK Drivers
Licence numbers.
This data identifier provides three breadths of validation:
■ Wide
See “UK Drivers Licence Number wide breadth” on page 1091.
■ Medium
See “UK Drivers Licence Number medium breadth” on page 1091.
■ Narrow
See “UK Drivers Licence Number narrow breadth” on page 1092.
Pattern
\w{5}\d[0156]\d{4}\w{3}\l{2}
\w{5}\d[0156]\d{4}\w{3}\l{2}\d{2}
Pattern
\w{5}\d[0156]\d{4}\w{3}\l{2}
\w{5}\d[0156]\d{4}\w{3}\l{2}\d{2}
UK Drivers License Every UK drivers license must be 16 characters and the number at the 8th and 9th
position must be larger than 00 and smaller than 32.
Pattern
\w{5}\d[0156]\d{4}\w{3}\l{2}
\w{5}\d[0156]\d{4}\w{3}\l{2}\d{2}
UK Drivers License Every UK drivers license must be 16 characters and the number at the 8th and 9th
position must be larger than 00 and smaller than 32.
Library of system data identifiers 1093
UK Electoral Roll Number
Find keywords: driver's At least one of the following keywords or key phrases must be present for the data
license-related to match:
Find keywords: UK-related At least one of the following keywords or keyphrases must be present for the data
to match:
Pattern
\l{2,3}\d{1,4}
The narrow breadth of the Electoral Roll Number data identifier implements two
validators to require the presence of an electoral number-related keyword and a
UK-related keyword.
Validator Description
Find keywords: electoral At least one of the following keywords or key phrases must be present for the data
number-related to match:
electoral #, electoral number, electoral roll #, electoral roll no., electoral roll
number, electoral roll#, electoral#, electoralnumber, electoralroll#,
electoralrollno
Library of system data identifiers 1094
UK National Health Service (NHS) Number
Validator Description
Find keywords: UK-related At least one of the following keywords or key phrases must be present for the data
to match:
Note: This data identifier does not provide a wide breadth option.
Pattern Description
The medium breadth implements three validators: one to validate the NHS
checksum, another to perform numerical validation using the final digit, and a third
to check for the presence of an NHS-related keyword.
Validator Description
Find keywords: NHS-related At least one of the following keywords or key phrases must
be present for the data to match:
Pattern Description
The narrow breadth implements four validators: one to validate the NHS checksum,
another to perform numerical validation using the final digit, a third to require the
presence of an NHS-related keyword, and a fourth to require the presence of a
UK-related keyword.
Find keywords: NHS-related At least one of the following keywords or key phrases must
be present for the data to match:
Find keywords: UK-related At least one of the following keywords or key phrases must
be present for the data to match:
Pattern Description
Pattern Description
Pattern Description
Pattern Description
Pattern Description
The narrow breadth implements a validator that requires the presence of a national
insurance-related keyword.
Find keywords: Insurance-related At least one of the following keywords or key phrases must be present for the
data to match:
UK Passport Number
The UK Passport Number identifies a United Kingdom passport using the current
official specification of the UK Government Standards of the UK Cabinet Office.
The UK Passport Number data identifier detects the presence of the UK Passport
Number.
This data identifier provides three breadths of validation:
■ Wide
See “UK Passport Number wide breadth” on page 1098.
■ Medium
See “UK Passport Number medium breadth” on page 1099.
■ Narrow
See “UK Passport Number narrow breadth” on page 1099.
Pattern Description
Pattern Description
The medium breadth implements three validators: one to eliminate common test
numbers, such as 123456789; another to eliminate numbers with all the same digits;
and a third that requires the presence of a passport-related keyword.
Exclude beginning characters Data beginning with any of the following list of values will not be matched:
123456789
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords: Passport-related At least one of the following keywords or key phrases must be present for the
data to match:
Pattern Description
The narrow breadth implements four validators: one to eliminate common test
numbers, such as 123456789; another to eliminate numbers with all the same digits;
Library of system data identifiers 1100
UK Tax ID Number
a third that requires the presence of a passport-related keyword; and a fourth that
requires the presence of a UK-related keyword.
Exclude beginning characters Data beginning with any of the following list of values will not be matched:
123456789
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords: Passport-related At least one of the following keywords or key phrases must be present for the
data to match:
Find keywords: UK-related At least one of the following keywords or key phrases must be present for the
data to match:
UK Tax ID Number
The UK Tax ID Number is a personal identification number provided by the UK
Government Standards of the UK Cabinet Office.
The UK Tax ID Number data identifier detects the presence of the UK Tax ID
numbers.
This data identifier provides three breadths of validation:
■ Wide
See “UK Tax ID Number wide breadth” on page 1100.
■ Medium
See “UK Tax ID Number medium breadth” on page 1101.
■ Narrow
See “UK Tax ID Number narrow breadth” on page 1101.
Note: The wide breadth of the UK Tax ID Number data identifier does not include
any validators.
Library of system data identifiers 1101
UK Tax ID Number
Pattern Description
Pattern Description
The medium breadth implements two validators: one to eliminates common test
numbers, such as 1234567890, and another to eliminate numbers with all the same
digit.
Duplicate digits Ensures that a string of digits is not all the same.
Exclude beginning characters Data beginning with any of the following list of values will
not be matched:
Pattern Description
The narrow breadth implements three validators: one to eliminates common test
numbers, such as 1234567890; another to eliminate numbers with all the same
digit; and a third that requires the presence of a tax identification-related keyword.
Library of system data identifiers 1102
Ukraine Passport (Domestic)
Duplicate digits Ensures that a string of digits is not all the same.
Exclude beginning characters Data beginning with any of the following list of values will
not be matched:
Find keywords: Tax ID-related At least one of the following keywords or key phrases must
be present for the data to match:
Pattern
\d{9}
Duplicate digits Ensures that a string of digits are not all the same.
Library of system data identifiers 1103
Ukraine Identity Card
Pattern
\d{9}
Duplicate digits Ensures that a string of digits are not all the same.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{4}[01]\d[0123]\d-\d{7}
\d{4}[01]\d[0123]\d{8}
\d{4}[01]\d[0123]\d \d{7}
Duplicate digits Ensures that a string of digits are not all the same.
\d{4}[01]\d[0123]\d-\d{7}
\d{4}[01]\d[0123]\d{8}
\d{4}[01]\d[0123]\d \d{7}
Duplicate digits Ensures that a string of digits are not all the same.
Ukraine Identity Card Check Validates that the first eight digits are a correctly formatted
date.
Library of system data identifiers 1105
Ukraine Passport (International)
Pattern
\d{4}[01]\d[0123]\d-\d{7}
\d{4}[01]\d[0123]\d{8}
\d{4}[01]\d[0123]\d \d{7}
Duplicate digits Ensures that a string of digits are not all the same.
Ukraine Identity Card Check Validates that the first eight digits are a correctly formatted
date.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\w{2}\d{6}
Duplicate digits Ensures that a string of digits are not all the same.
Pattern
\w{2}\d{6}
Duplicate digits Ensures that a string of digits are not all the same.
Find Keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{15}
\d{3}-\d{4}-\d{7}-\d{1}
Table 37-655 United Arab Emirates Personal Number wide breadth validators
Duplicate digits Ensures that a string of digits is not all the same.
Table 37-656 United Arab Emirates Personal Number medium breadth patterns
Pattern
\d{15}
Library of system data identifiers 1108
United Arab Emirates Personal Number
Table 37-656 United Arab Emirates Personal Number medium breadth patterns
(continued)
Pattern
\d{3}-\d{4}-\d{7}-\d{1}
Table 37-657 United Arab Emirates Personal Number medium breadth validator
Luhn Check Computes the Luhn checksum and validates the pattern
against it.
Pattern
\d{15}
\d{3}-\d{4}-\d{7}-\d{1}
Duplicate digits Ensures that a string of digits is not all the same.
Luhn Check Computes the Luhn checksum and validates the pattern
against it.
Library of system data identifiers 1109
US Individual Tax Identification Number (ITIN)
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
, هوية فريدة, التأمين رقم, فريدة من نوعها هوية رقم,الهوية الشخصية رقم
التأمينرقم#
Note: The wide breadth of the US Individual Tax Identification Number (ITIN) data
identifier does not include any validators.
Pattern Description
9\d{2} [78]\d \d{4} Pattern for detecting the ITIN format separated by spaces.
Pattern Description
9\d{2} [78]\d \d{4} Pattern for detecting the ITIN format separated by spaces.
Pattern Description
9\d{2} [78]\d \d{4} Pattern for detecting the ITIN format separated by spaces.
The narrow breadth implements three validators: one to check the surrounding
characters, another to ensure that the digits in the ITIN string are not all the same,
and a third that requires the presence of a ITIN-related keyword.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords: ITIN-related At least one of the following keywords or key phrases must
be present for the data to be matched.
US Passport Number
United States passports are passports issued to citizens and non-citizen nationals
of the United States of America. They are issued exclusively by the U.S. Department
of State.
The US Passport Number data identifier provides two breadths of detection:
■ The wide breadth detects a valid US Passport Number pattern.
See “US Passport Number wide breadth” on page 1112.
■ The narrow breadth detects a valid US Passport Number pattern. It also requires
the presence of related keywords.
See “US Passport Number narrow breadth” on page 1112.
Library of system data identifiers 1112
US Passport Number
Table 37-665
Patterns
\d{8}
\d{9}
Table 37-666
Mandatory validator Description
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{8}
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern Description
\d{3}-\d{2}-\d{4} Matches the standard SSN format, which is any three digits followed by a hyphen,
two digits, a hyphen, and any four digits.
Pattern Description
The wide breadth implements three validators to ensure that the detected SSN is
within validly assigned number ranges, eliminate common test numbers, such as
123456789, and all the same digit.
Validator Description
Advanced SSN Checks whether SSN contains zeros in any group, the area number (first group)
is less than 773 and not 666, the delimiter between the groups is the same, the
number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
SSN Area-Group number For a given area number (first group), not all group numbers (second group) might
have been assigned by the SSA. Validator eliminates SSNs with invalid group
numbers.
Pattern Description
\d{3}-\d{2}-\d{4} Matches the standard SSN format, which is any three digits followed by a hyphen,
two digits, a hyphen, and any four digits.
The medium breadth implements three validators to ensure that the detected SSN
is within validly assigned number ranges, is not a common test number (such as
123456789), and is not all the same digit.
Library of system data identifiers 1115
US Social Security Number (SSN)
Validator Description
Advanced SSN Checks whether SSN contains zeros in any group, the area number (first group)
is less than 773 and not 666, the delimiter between the groups is the same, the
number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
SSN Area-Group number For a given area number (first group), not all group numbers (second group) might
have been assigned by the SSA. Validator eliminates SSNs with invalid group
numbers.
Pattern Description
\d{3}-\d{2}-\d{4} Matches the standard SSN format, which is any three digits followed by a hyphen,
two digits, a hyphen, and any four digits.
The narrow breadth implements four validators to ensure that the detected SSN is
within validly assigned number ranges, is not a common test number (such as
123456789), is not all the same digit, and the message containing the SSN includes
a keyword.
Advanced SSN Checks whether SSN contains zeros in any group, the area number (first group)
is less than 773 and not 666, the delimiter between the groups is the same, the
number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
Library of system data identifiers 1116
US ZIP+4 Postal Codes
SSN Area-Group number For a given area number (first group), not all group numbers (second group)
might have been assigned by the SSA. Validator eliminates SSNs with invalid
group numbers.
Find keywords: Social At least one of the following keywords or key phrases must be present for the
security-related data to be matched:
Pattern
\l{2}[ ]\d{5}[-]\d{4}
\l{2}[ ]\d{9}
Library of system data identifiers 1117
US ZIP+4 Postal Codes
Exclude ending characters Any number ending with the following characters is
excluded from matching:
Patterns
\l{2}[ ]\d{5}[-]\d{4}
\l{2}[ ]\d{9}
Exclude ending characters Any number ending with the following characters is
excluded from matching:
Zip+4 Postal Codes Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\l{2}[ ]\d{5}[-]\d{4}
Library of system data identifiers 1118
Venezuela National Identification Number
Patterns
\l{2}[ ]\d{9}
Exclude ending characters Any number ending with the following characters is
excluded from matching:
Zip+4 Postal Codes Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[VEJPGvejpg][-]\d{2}.\d{3}.\d{3}[-]\d
[VEJPGvejpg][-]\d{8}[-]\d
[VEJPGvejpg]\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[VEJPGvejpg][-]\d{2}.\d{3}.\d{3}[-]\d
[VEJPGvejpg][-]\d{8}[-]\d
[VEJPGvejpg]\d{9}
Venezuela National ID Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1120
Venezuela National Identification Number
Pattern
[VEJPGvejpg][-]\d{2}.\d{3}.\d{3}[-]\d
[VEJPGvejpg][-]\d{8}[-]\d
[VEJPGvejpg]\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Venezuela National ID Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
■ NASD Rule 2711 and NYSE Rules 351 and 472 policy template
Patient Data and Compound EDM and This compound rule looks for a match among the following EDM data
Drug Keywords Keyword Rule fields in combination with a keyword from the "Prescription Drug
Names" dictionary. Both conditions must be satisfied for the rule to
trigger an incident.
■ Account number
■ Email
■ ID card number
■ Last name
■ Phone
■ UK NHS (National Health Service) number
■ UK NIN (National Insurance Number)
Patient Data and Compound EDM and This compound rule looks for a match among the following EDM data
Disease Keywords Keyword Rule fields in combination with a keyword from the "Disease Names"
dictionary. Both conditions must be satisfied for the rule to trigger an
incident.
■ Account number
■ Email
■ ID card number
■ Last name
■ Phone
■ UK NHS (National Health Service) number
■ UK NIN (National Insurance Number)
Library of policy templates 1125
Canadian Social Insurance Numbers policy template
Patient Data and Compound EDM and This compound rule looks for a match among the following EDM data
Treatment Keyword Rule fields in combination with a keyword from the "Medical Treatment
Keywords Keywords" dictionary. Both conditions must be satisfied for the rule
to trigger an incident:
■ Account number
■ Email
■ ID card number
■ Last name
■ Phone
■ UK NHS (National Health Service) number
■ UK NIN (National Insurance Number)
UK NHS Number Simple DCM Rule This rule looks for a keyword from "UK NIN Keywords" dictionary in
and Drug Keywords combination with a pattern matching the UK NIN data identifier and a
keyword from the "Prescription Drug Names" dictionary.
UK NHS Number Simple DCM Rule This rule looks for a keyword from "UK NIN Keywords" dictionary in
and Disease combination with a pattern matching the UK NIN data identifier and a
Keywords keyword from the "Disease Names" dictionary.
UK NHS Number Simple DCM Rule This rule looks for a keyword from "UK NIN Keywords" dictionary in
and Treatment combination with a pattern matching the UK NIN data identifier and a
Keywords keyword from the "Medical Treatment Keywords" dictionary.
This rule looks for a match to the Canadian Social Insurance Number
data identifier and a keyword from the "Canadian Social Ins. No. Words"
dictionary.
Table 38-2 Detection exception: Exclude emails that contain the mandated
keywords
Simple exception Content Matches Exclude emails that contain the mandated keywords (Keyword Match):
Keyword (DCM)
■ Match keyword from "[physical postal address]" or "advertisement".
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Note: After you define the keywords, you can choose to count all
matches and require 2 keywords from the list to be matched.
Simple exception Content Matches Exception for CAN-SPAM compliant emails (IDM):
Document Profile
■ Exact content match (100%)
(IDM)
■ Look in the message body and attachments.
■ Check for existence.
If an exception is not met, the detection rule Monitor Email From Bulk Mailer
looks for a sender's email address that matches one from the "Bulk Mailer Email
Address" list, which is user-defined.
Library of policy templates 1127
Colombian Personal Data Protection Law 1581 policy template
Simple rule Sender/User Matches Monitor Email From Bulk Mailer (Sender):
Pattern (DCM)
■ Match sender pattern(s): [[email protected]] (user defined)
■ Severity: High.
Table 38-5
Rule Type Description
Colombian Address Number DCM Rule This rule detects Colombian street addresses using the Colombian
(Data Identifiers) Addresses data identifier.
Colombian Cell Phone Number DCM Rule This rule detects Colombian cell phone numbers using the Colombian
(Data Identifiers) Cell Phone Number data identifier.
Colombian Personal DCM Rule This rule detects Colombian personal identification numbers using the
Identification Number (Data Colombian Personal Identification Number data identifier.
Identifiers)
Colombian Tax Identification DCM Rule This rule detects Colombian tax identification numbers using the
Number (Data Identifiers) Colombian Tax Identification Number data identifier.
This rule looks for keywords (domains) from the "Competitor Domains"
dictionary, which is user-defined.
Confidential Documents, Simple IDM Rule with one This rule looks for content from specific documents
Indexed condition registered as confidential; returns a match if 80% or more
of the source document is found. If you do not have an
Indexed Document Profile configured this rule is dropped.
Library of policy templates 1129
Credit Card Numbers policy template
Confidential Documents Compound DCM Rule: This rule looks for a combination of keywords from the
Attachment/File Type and "Confidential Keywords" list and the following file types:
Keyword Match. Both
■ Microsoft Excel Macro
conditions must match for
■ Microsoft Excel
the rule to trigger an
incident. ■ Microsoft Works Spreadsheet
■ SYLK Spreadsheet
■ Corel Quattro Pro
■ Multiplan Spreadsheet
■ Comma Separate Values
■ Applix Spreadsheets
■ Lotus 1-2-3
■ Microsoft Word
■ Adobe PDF
■ Microsoft PowerPoint
Proprietary Documents Compound DCM Rule: This compound rule looks for a combination of keywords
Attachment/File Type and from the "Proprietary Keywords" dictionary and the above
Keyword Match referenced file types.
Internal Use Only Compound DCM Rule: This compound rule looks for a combination of keywords
Documents Attachment/File Type and from the "Internal Use Only Keywords" dictionary and the
Keyword Match above referenced file types.
Documents Not For Compound DCM Rule: This compound rule looks for a combination of keywords
Distribution Attachment/File Type and from the "Not For Distribution Words" dictionary and the
Keyword Match above referenced file types.
This rule looks for a match to the credit card number system pattern
and a keyword from the "Credit Card Number Keywords" dictionary.
Table 38-7 EDM conditions for the Customer Data Protection policy template
Username/Password EDM Rule This rule looks for usernames and However, the following
Combinations passwords in combination with three or combinations are not a
more of the following fields: violation:
Date of Birth EDM Rule This rule looks for any three of the However, the following
following data fields in combination: combinations are not a
violation:
■ SSN
■ Phone ■ Phone, email, and first
■ Email name
■ First Name ■ Phone, email, and last
name
■ Last Name
■ Email, first name, and
■ Bank Card number
last name
■ Account Number
■ Phone, first name, and
■ ABA Routing Number
last name
■ Canadian Social Insurance Number
■ UK National Insurance Number
■ Date of Birth
Exact SSN or CCN EDM Rule This rule looks for an exact social
security number or bank card number.
Customer Directory EDM Rule This rule looks for Phone or Email.
Library of policy templates 1131
Data Protection Act 1998 policy template
Table 38-8 DCM conditions for the Customer Data Protection policy template
US Social Security Compound DCM This rule looks for a match to the See “Randomized US Social
Number Patterns Rule Randomized US Social Security Security Number (SSN)”
number data identifier and a keyword on page 1051.
from the "US SSN Keywords"
dictionary.
Credit Card Numbers, All Compound DCM This rule looks for a match to the credit See “Credit Card Number ”
Rule card number system pattern and a on page 894.
keyword from the "Credit Card Number
Keywords" dictionary.
ABA Routing Numbers Compound DCM This rule looks for a match to the ABA See “ABA Routing Number”
Rule Routing number data identifier and a on page 828.
keyword from the "ABA Routing
Number Keywords" dictionary.
See “About the Exact Data Profile and index” on page 440.
See “Configuring policies” on page 390.
See “Exporting policy detection as a template” on page 419.
Table 38-9 Data Protection Act 1998, Personal Data detection rule
Description
This EDM rule looks for three of the following columns of data: However, the following combinations are not an
incident:
■ NIN (National Insurance Number)
■ Account number ■ First name, last name, pin
■ Pin ■ First name, last name, password
■ Bank card number ■ First name, last name, email
■ First name ■ First name, last name, phone
■ Last name ■ First name, last name, mother's maiden name
■ Drivers license
■ Password
■ Tax payer ID
■ UK NHS number
■ Date of birth
■ Mother's maiden name
■ Email address
■ Phone number
Table 38-10 Additional detection rules in the Data Protection Act 1998 policy
template
Description
The UK Electoral Roll Numbers rule implements the UK Electoral Roll Number data identifier.
See “UK Electoral Roll Number” on page 1093.
The UK National Insurance Numbers rule implements the narrow breadth edition of the UK National Insurance
Number data identifier.
The UK Tax ID Numbers rule implements the narrow edition of the UK Tax ID Number data identifier.
The UK Drivers License Numbers rule implements the narrow breadth edition of the UK Driver's License number
data identifier.
See “UK Drivers Licence Number” on page 1090.
The UK Passport Numbers rule implements the narrow breadth edition of the UK Passport Number data identifier.
Table 38-10 Additional detection rules in the Data Protection Act 1998 policy
template (continued)
Description
The UK NHS Numbers rule implements the narrow breadth edition of the UK National Health Service (NHS) Number
data identifier.
Table 38-11
Method Description
■ Last Name
■ Bank Card number
■ Drivers license number
■ Account Number
■ PIN
■ Medical account number
■ Medical ID card number
■ User name
■ Password
■ ABA Routing Number
■ Email
■ Phone
■ Mother's maiden name
However, the following combinations do not create a match:
This rule looks for any two of the following data columns: last name, phone, account number,
username, and email.
This rule is an exception if the recipient is within the EU. This covers recipients with any of the country
codes from the "EU Country Codes" dictionary.
The detection rule Secret Information (Keyword Match) looks for any keywords
in the "Secret Information" dictionary.
The detection rule Other Sensitive Information looks for any keywords in the
"Other Sensitive Information" dictionary.
This rule looks for content from specific design documents registered
as proprietary. It returns a match if the engine detects 80% or more of
the source document.
This rule looks for the specified file name extensions found in the
"Design Document Extensions" dictionary.
■ cad_draw
■ dwg
Note: Both file types and file name extensions are used because the policy does
not detect the true file type for all the required documents.
Username/Password Combinations EDM Rule This rule looks for usernames and passwords in
combination with any three of the following data fields.
■ SSN
■ Phone
■ Email
■ First Name
■ Last Name
■ Bank Card Number
■ Account Number
■ ABA Routing Number
■ Canadian Social Insurance Number
■ UK National Insurance Number
■ Date of Birth
Employee Directory EDM Rule This rule looks for Phone or Email.
US Social Security Number Patterns DCM Rule This rule looks for a match from the Randomized US Social
Security Number (SSN) data identifier and a keyword from
the "US SSN Keywords" dictionary.
Credit Card Numbers, All DCM Rule This rule looks for a match from the credit card number
system pattern and a keyword from the "Credit Card
Number Keywords" dictionary.
ABA Routing Numbers DCM Rule This rule looks for a match from the ABA Routing number
data identifier and a keyword from the "ABA Routing
Number Keywords" dictionary.
See “ABA Routing Number” on page 828.
This rule looks for the following file types: encrypted_zip, encrypted_doc,
encrypted_xls, or encrypted_ppt.
This rule looks for a keyword from the "GPG Encryption Keywords"
dictionary.
This rule looks for a keyword from the "S/MIME Encryption Keywords"
dictionary.
Table 38-18 Detection rule: Indexed EAR Commerce Control List Items and
Recipients
Compound rule Content Matches Exact See “Choosing an Exact Data Profile” on page 385.
Data (EDM)
Content Matches Keyword See “Configuring the Content Matches Keyword condition”
(DCM) on page 717.
The detection rule EAR Commerce Control List and Recipients looks for a country
code in the recipient from the "EAR Country Codes" list and a keyword from the
"EAR CCL Keywords" dictionary. Both conditions must match to trigger an incident.
Table 38-19 Detection rule: EAR Commerce Control List and Recipients
Compound rule Recipient Matches Pattern EAR Commerce Control List and Recipients (Recipient):
(DCM)
■ Match: Email address OR URL domain suffixes.
■ Severity: High.
■ Check for existence.
■ At least 1 recipient(s) must match.
■ Matches on entire message.
Content Matches Keyword EAR Commerce Control List and Recipients (Keyword Match):
(DCM)
■ Match: EAR CCL Keywords
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
to detect, prevent, and mitigate identity theft in connection with the opening of a
covered account or any existing covered account.
The Username/Password Combinations detection rule detects the presence of
both a user name and password from a profiled database index.
Simple rule Content Matches This condition detects exact data containing both of the following data
Exact Data (EDM) items:
■ User name
■ Password
The Exact SSN or CCN detection rule detects the presence of either a social
security number or a credit card number from a profiled database.
Simple rule Content Matches This condition detects exact data containing either of the following data
Exact Data (EDM) columns:
The Customer Directory detection rule detects the presence of either an email
address or a phone number from a profiled database.
Simple rule Content Matches This condition detects exact data containing either of the following data
Exact Data (EDM) columns:
■ Email address
■ Phone number
The Three or More Data Columns detection rule detects exact data containing
three or more of data items from a profiled database index.
Library of policy templates 1142
FACTA 2003 (Red Flag Rules) policy template
Simple rule Content Matches Detects exact data containing three or more of the following data items:
Exact Data (EDM)
■ ABA Routing Number
■ Account Number
■ Bank Card Number
■ Birth Date
■ Email address
■ First Name
■ Last Name
■ National Insurance Number
■ Password
■ Phone Number
■ Social Insurance Number
■ Social security number (Taxpayer ID)
■ User name
The US Social Security Number Patterns detection rule implements the narrow
breadth edition of the Randomized US Social Security Number (SSN) system data
identifier.
See “Randomized US Social Security Number (SSN)” on page 1051.
This data identifier detects nine-digit numbers with the pattern DDD-DD-DDDD
separated with dashes or spaces or without separators. The number must be in
valid assigned number ranges. This condition eliminates common test numbers,
such as 123456789 or all the same digit. It also requires the presence of a Social
Security keyword.
Library of policy templates 1143
FACTA 2003 (Red Flag Rules) policy template
Simple rule Content Matches ■ Data Identifier: Randomized US Social Security Number (SSN) narrow
Data Identifier (DCM) breadth
■ Severity: High.
■ Count all matches.
■ Look in envelope, subject, body, attachments.
The Credit Card Numbers, All detection rule implements the narrow breadth edition
of the Credit Card Number system Data Identifier.
See “Credit Card Number ” on page 894.
This data identifier detects valid credit card numbers that are separated by spaces,
dashes, periods, or without separators. This condition performs Luhn check validation
and includes formats for American Express, Diner's Club, Discover, Japan Credit
Bureau (JCB), MasterCard, and Visa. It eliminates common test numbers, including
those reserved for testing by credit card issuers. It also requires the presence of a
credit card keyword.
Simple rule Content Matches ■ Data Identifier: Credit Card Number narrow breadth
Data Identifier (DCM) See “Credit Card Number narrow breadth” on page 898.
■ Severity: High.
■ Count all matches.
■ Look in envelope, subject, body, attachments.
The ABA Routing Numbers detection rule implements the narrow breadth edition
of the ABA Routing Number system Data Identifier.
See “ABA Routing Number” on page 828.
This data identifier detects nine-digit numbers. It validates the number using the
final check digit. This condition eliminates common test numbers, such as
123456789, number ranges that are reserved for future use, and all the same digit.
This condition also requires the presence of an ABA keyword.
Library of policy templates 1144
Financial Information policy template
Simple rule Content Matches ■ Data Identifier: ABA Routing Number narrow breadth
Data Identifier (DCM) See “ABA Routing Number” on page 828.
■ Severity: High.
■ Count all matches.
■ Look in envelope, subject, body, attachments.
This rule looks for content from specific financial information files
registered as proprietary; returns a match if 80% or more of the source
document is found.
This rule looks for the combination of specified file types, keywords
from the "Financial Keywords" dictionary, and keywords from the
"Confidential/Proprietary Words" dictionary.
The specified file types are as follows:
■ excel_macro
■ xls
■ works_spread
■ sylk
■ quattro_pro
■ mod
■ csv
■ applix_spread
■ 123
Note: To process HTTP GET requests appropriately, you may need to configure
the Network Prevent for Web server. See “To enable a Forbidden Website policy
to process GET requests appropriately” on page 1145.
Forbidden Websites This rule looks for any keywords in the "Forbidden
Websites" dictionary, which is user-defined.
Note: Reducing the minimum size of GETs increases the number of URLs that
have to be processed, which increases server traffic load. One approach is to
calculate the number of characters in the shortest URL specified in the list of
forbidden URLs and set the minimum size to that number. Another approach
is to set the minimum URL size to 10 as that should cover all cases.
4 You may need to adjust the "Ignore Requests Smaller Than" setting in the
ICAP configuration of the Network Prevent server from the default 4096 bytes.
This value stops processing of incoming web pages that contain fewer bytes
than the number specified. If a page of a forbidden web site URL might be
smaller than that number, the setting should be reduced appropriately.
See “Configuring policies” on page 390.
See “Exporting policy detection as a template” on page 419.
Library of policy templates 1146
Gambling policy template
Suspicious Gambling Keywords This rule looks for five instances of keywords from the "Gambling
Keywords, Confirmed" dictionary.
Less Suspicious Gambling Keywords This rule looks for ten instances of keywords from the "Gambling
Keywords, Suspect" dictionary.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules
GDPR Banking and Finance Related Keyword Match Matches a list of related keywords:
Keywords
account number, bank card number,
driver license number, ID card
number
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
UK Driver's Licence Number Data Identifiers The UK Drivers Licence Number is the
identification number for an individual's
driver's license issued by the Driver
and Vehicle Licensing Agency of the
United Kingdom.
Credit Card Magnetic Stripe Data Data Identifiers The magnetic stripe of a credit card
contains information about the card.
Storage of the complete version of this
data is a violation of the Payment Card
Industry (PCI) Data Security Standard.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
Belgian National Number Data Identifiers All citizens of Belgium have a National
Number. Belgians 12 years of age and
older are issued a Belgian identity
card.
Czech Personal Identification Data Identifiers All citizens of the Czech Republic are
Number issued a unique personal identification
number by the Ministry of Interior.
French INSEE code Data Identifiers The INSEE code in France is used as
a social insurance number, a national
identification number, and for taxation
and employment purposes.
French Social Security Number Data Identifiers The French Social Security Number
(FSSN) is a unique number assigned
to each French citizen or resident
foreign national. It serves as a national
identification number.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
Greek Tax Identification Number Data Identifiers The Arithmo Forologiko Mitro (AFM)
is a unique personal tax identification
number assigned to any individual
resident in Greece or person who
owns property in Greece.
Hungarian Social Security Number Data Identifiers The Hungarian Social Security
Number (TAJ) is a unique identifier
issued by the Hungarian government.
Irish Personal Public Service Data Identifiers The format of the number is a unique
Number 8-character alphanumeric string
ending with a letter, such as
8765432A. The number is assigned at
the registration of birth of the child and
is issued on a Public Services Card
and is unique to every person.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
Polish Identification Number Data Identifiers Every Polish citizen 18 years of age
or older residing permanently in
Poland must have an Identity Card,
with a unique personal number. The
number is used as identification for
almost all purposes.
Polish Social Security Number Data Identifiers The Polish Social Security Number
(PESEL) (PESEL) is the national identification
number used in Poland. The PESEL
number is mandatory for all permanent
residents of Poland and for temporary
residents living in Poland. It uniquely
identifies a person and cannot be
transferred to another.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
Polish Tax Identification Number Data Identifiers The Polish Tax Identification Number
(NIP) is a number the government
gives to every Poland citizen who
works or does business in Poland. All
taxpayers have a tax identification
number called NIP.
Romanian Numerical Personal Code Data Identifiers In Romania, each citizen has a unique
numerical personal code (Code
Numeric Personal, or CNP). The
number is used by authorities, health
care, schools, universities, banks, and
insurance companies for customer
identification.
Spanish Social Security Number Data Identifiers The Spanish Social Security Number
is a 12-digit number assigned to
Spanish workers to allow access to
the Spanish healthcare system.
Spanish Customer Account Number Data Identifiers The Spanish customer account
number is the standard customer bank
account number used across Spain.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
Bulgarian Uniform Civil Number Data Identifiers The uniform civil number (EGN) is
unique number assigned to each
Bulgarian citizen or resident foreign
national. It serves as a national
identification number. An EGN is
assigned to Bulgarians at birth, or
when a birth certificate is issued.
Austrian Social Security Number Data Identifiers A social security number is allocated
to Austrian citizens who receive
available social security benefits. It is
allocated by the umbrella association
of the Austrian social security
authorities.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
See “Burgerservicenummer”
on page 873.
Library of policy templates 1155
General Data Protection Regulation (Banking and Finance)
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
Austria Tax Identification Number Data Identifiers Austria issues tax identification
numbers to individuals based on their
area of residence to identify taxpayers
and facilitate national taxes.
Belgium Tax Identification Number Data Identifiers Belgium issues a tax identification
number for persons who has
obligations to declare taxes in
Belgium.
Belgium Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For Belgium,
the Value Added Tax is issued by VAT
office for the region in which the
business is established.
Belgium Driver's License Number Data Identifiers Identification number for an individual's
driver's licence issued by the Driver
and Vehicle Licensing Agency of
Belgium.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
Netherlands Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For the
Netherlands, the Value Added Tax is
issued by VAT office for the region in
which the business is established.
France Driver's License Number Data Identifiers Identification number for an individual's
driver's licence issued by the Driver
and Vehicle Licensing Agency of
France.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
France Tax Identification Number Data Identifiers France issue a tax identification
number for anyone who has
obligations to declare taxes in France.
Germany Driver's License Number Data Identifiers Identification number for an individual's
driver's licence issued by the Driver
and Vehicle Licensing Agency of
Germany.
Italy Passport Number Data Identifiers Italian passports are issued to Italian
citizens for the purpose of international
travel.
Italy Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For Italy, the
Value Added Tax is issued by VAT
office for the region in which the
business is established.
Italy Driver's License Number Data Identifiers Identification number for an individual's
driver's licence issued by the Driver
and Vehicle Licensing Agency of Italy.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
Spain Driver's License Number Data Identifiers Identification number for an individual's
driver's licence issued by the Driver
and Vehicle Licensing Agency of
Spain.
Ukraine Identity Card Data Identifiers The Ukraine Identity Card has a
15-digit record number issued to
citizens of Ukraine. It is used as a form
of identification in place of Ukraine's
domestic passport as of January 2016.
Ukraine Domestic Passport Number Data Identifiers An identity document issued to citizens
of Ukraine for domestic use. It has
been replaced by the Ukraine Identity
Card as of 2016, but any existing
passports are still valid.
Germany Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For Germany,
the Value Added Tax is issued by VAT
office for the region in which the
business is established.
Table 38-29 General Data Protection Regulations (Banking and Finance) detection
rules (continued)
France Value Added Tax (VAT) Data Identifiers The Value Added Tax (VAT), is a tax
Number levied on goods and services provided
in France and is collected from the
final customer. Companies must
register with the Register of
Commerce and Companies in France
to get VAT number allocated.
Table 38-30 General Data Protection Regulations (Digital Identity) detection rule
See “Burgerservicenummer”
on page 873.
Belgium Value Added Tax Data Identifiers VAT is a consumption tax that
(VAT) Number is borne by the end
consumer. VAT is paid for
each transaction in the
manufacturing and
distribution process. For
Belgium, the Value Added
Tax is issued by VAT office
for the region in which the
business is established.
Italy Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that
Number is borne by the end
consumer. VAT is paid for
each transaction in the
manufacturing and
distribution process. For Italy,
the Value Added Tax is
issued by VAT office for the
region in which the business
is established.
Ukraine Identity Card Data Identifiers The Ukraine Identity Card has
a 15-digit record number
issued to citizens of Ukraine.
It is used as a form of
identification in place of
Ukraine's domestic passport
as of January 2016.
Germany Value Added Tax Data Identifiers VAT is a consumption tax that
(VAT) Number is borne by the end
consumer. VAT is paid for
each transaction in the
manufacturing and
distribution process. For
Germany, the Value Added
Tax is issued by VAT office
for the region in which the
business is established.
France Value Added Tax Data Identifiers The Value Added Tax (VAT),
(VAT) Number is a tax levied on goods and
services provided in France
and is collected from the final
customer. Companies must
register with the Register of
Commerce and Companies
in France to get VAT number
allocated.
See “Burgerservicenummer”
on page 873.
Library of policy templates 1184
General Data Protection Regulation (Healthcare and Insurance)
Ukraine Identity Card Data Identifiers The Ukraine Identity Card has
a 15-digit record number
issued to citizens of Ukraine.
It is used as a form of
identification in place of
Ukraine's domestic passport
as of January 2016.
Commission intends to strengthen and unify data protection for individuals within
the EU. It also addresses export of personal data outside the EU. The Commission's
primary objectives of the GDPR are to give citizens back the control of their personal
data and to simplify the regulatory environment for international business by unifying
the regulation within the EU.
Username/Password Simple rule: EDM This rule looks for user names and passwords in combination.
Combinations
See “Choosing an Exact Data Profile” on page 385.
Exact SSN or CCN Simple rule: EDM This rule looks for SSN or Credit Card Number.
Customer Directory Simple rule: EDM This rule looks for Phone or Email.
3 or more critical customer Simple rule: EDM This rule looks for a match among any three of the following fields:
fields
■ Account number
■ Bank card number
■ Email address
■ First name
■ Last name
■ PIN number
■ Phone number
■ Social security number
■ ABA Routing Number
■ Canadian Social Insurance Number
■ UK National Insurance Number
■ Date of Birth
However, the following combinations are not a match:
ABA Routing Numbers Simple rule: DCM This condition detects nine-digit numbers. It validates the number
(DI) using the final check digit. This condition eliminates common test
numbers, such as 123456789, number ranges that are reserved for
future use, and all the same digit. This condition also requires the
presence of an ABA-related keyword.
US Social Security Numbers Simple rule: DCM This rule looks for social security numbers. For this rule to match,
(DI) there must be a number that fits the Randomized US SSN data
identifier. There must also be a keyword or phrase that indicates the
presence of a US SSN with a keyword from "US SSN Keywords"
dictionary. The keyword condition is included to reduce false positives
with any numbers that may match the SSN format.
Credit Card Numbers Simple rule: DCM This condition detects valid credit card numbers that are separated
(DI) by spaces, dashes, periods, or without separators. This condition
performs Luhn check validation and includes the following credit
card formats:
■ American Express
■ Diner's Club
■ Discover
■ Japan Credit Bureau (JCB)
■ MasterCard
■ Visa
also updated to use the Randomized US Social Security Number (SSN) data
identifier, which detects both traditional and randomized SSNs.
See “Keep the keyword lists for your HIPAA and Caldicott policies up to date”
on page 722.
See “Updating policies to use the Randomized US SSN data identifier” on page 689.
Table 38-36 describes the TPO exception that is provided by the template. TPOs
(Treatment, Payment, or health care Operations) are service providers to health
care organizations and have an exception for HIPAA information restrictions. The
template requires that you enter the allowed email addresses. If implemented the
exception is evaluated before detection rules and the policy does not trigger an
incident if the protected information is sent to one of the allowed partners.
TPO Exception Content Matches Keyword Simple exception (single condition match).
(DCM)
Looks for a recipient email address matching one from
the "TPO Email Addresses" user-defined keyword
dictionary.
Table 38-37 is a rule that looks for an exact data match against any single column
from a profiled Patient Data database record.
Patient Data Content Matches Exact Data Match data from any single field:
(EDM)
■ Last name
■ Tax payer ID (SSN)
■ Email address
■ Account number
■ ID card number
■ Phone number
Table 38-38 is a compound detection rule that requires a Patient Data exact match
and a match from the "Drug Code" data identifier.
Library of policy templates 1196
HIPAA and HITECH (including PHI) policy template
Patient Data and Drug Codes Content Matches Exact Data Looks for a match against any single column from a
(EDM) profiled Patient Data database record and a match from
the National Drug Code data identifier.
And
See Table 38-37 on page 1195.
Content Matches Data
Identifier See “National Drug Code (NDC)” on page 1024.
Table 38-39 is a compound detection rule that requires a Patient Data exact match
and a keyword match from the "Prescription Drug Names" dictionary.
Table 38-39 Patient Data and Prescription Drug Names detection rule
Patient Data and Prescription Content Matches Exact Data Looks for a match against any single column from a
Drug Names (EDM) profiled Patient Data database record and a keyword
match from the Prescription Drug Names dictionary
AND
See Table 38-37 on page 1195.
Content Matches Keyword
(DCM) See “Updating policies after upgrading to the latest
version” on page 424.
Table 38-40 is a compound detection rule that requires a Patient Data exact match
and keyword match from the "Medical Treatment Keywords" dictionary.
Patient Data and Treatment Content Matches Exact Data Looks for a match against any single column from a
Keywords (EDM) profiled Patient Data database record and a keyword
match from the Medical Treatment Keywords dictionary.
And
See Table 38-37 on page 1195.
Content Matches Keyword
(DCM) See “Updating policies after upgrading to the latest
version” on page 424.
Table 38-41 is a compound detection rule that requires a Patient Data exact match
and a keyword match from the "Disease Names" dictionary.
Library of policy templates 1197
HIPAA and HITECH (including PHI) policy template
Patient Data and Disease Content Matches Exact Data Looks for a match against any single column from a
Keywords (EDM) profiled Patient Data database record and a keyword
match from the Disease Names dictionary.
And
See Table 38-37 on page 1195.
Content Matches Keyword
(DCM) See “Updating policies after upgrading to the latest
version” on page 424.
Table 38-42 is a compound detection rule that looks for SSNs using the Randomized
US Social Security Number (SSN) data identifier and for a keyword from the
"Prescription Drug Names" dictionary.
SSN and Drug Keywords Content Matches Data Randomized US Social Security Number (SSN) data
Identifier identifier (narrow breadth)
Table 38-43 is a compound detection rule that looks for SSNs using the Randomized
US Social Security Number (SSN) data identifier and for a keyword match from the
"Medical Treatment Keywords" dictionary.
SSN and Treatment Content Matches Data Randomized US Social Security Number (SSN) data
Keywords Identifier identifier (narrow breadth)
Table 38-44 is a compound detection rule that looks for SSNs using the Randomized
US Social Security Number (SSN) data identifier and for a keyword match from the
"Disease Names" dictionary.
SSN and Disease Keywords Content Matches Data Randomized US Social Security Number (SSN) data
Identifier identifier (narrow breadth)
Table 38-45 is a compound detection rule that looks for SSNs using the Randomized
US Social Security Number (SSN) data identifier and for a drug code using the
Drug Code data identifier.
SSN and Drug Code Content Matches Data Randomized US Social Security Number (SSN) data
Identifier identifier (narrow breadth)
This compound rule looks for two data types, last name and electoral
roll number, in combination with a keyword from the "UK Personal Data
Keywords" dictionary.
This rule looks for five instances of keywords from the "Street Drug
Names" dictionary.
This rule looks for five instances of keywords from the "Manufactured
Controlled Substances" dictionary.
ITIN This rule looks for a match to the US ITIN data identifier and a keyword from the
"US ITIN Keywords" dictionary.
Table 38-47 Indexed ITAR Munition Items and Recipients detection rule
Compound rule Recipient Matches Match recipient email or URL domain from ITAR
Pattern (DCM) Country Codes list:
■ Severity: High.
■ Check for existence.
■ At least 1 recipient(s) must match.
The ITAR Munitions List and Recipients detection rule looks for both a country code
in the recipient from the "ITAR Country Codes" dictionary and a keyword from the
"ITAR Munition Names" dictionary.
Library of policy templates 1201
Media Files policy template
Compound rule Recipient Matches Match recipient email or URL domain from ITAR
Pattern (DCM) Country Codes list:
■ Severity: High.
■ Check for existence.
■ At least 1 recipient pattern must match.
Content Matches Match any keyword from the ITAR Munitions List:
Keyword (DCM)
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
■ Severity: High.
■ qt
■ riff
■ macromedia_dir
■ midi
■ mp3
■ mpeg_movie
■ quickdraw
■ realaudio
■ wav
■ video_win
■ vrml
Library of policy templates 1202
Merger and Acquisition Agreements policy template
This rule looks for file name extensions from the "Media Files
Extensions" dictionary.
Condition Configuration
Contract Specific Keywords ■ Match any keyword: merger, agreement, contract, letter of intent, term sheet,
(Keyword Match) plan of reorganization
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Acquisition Corporate Structure ■ Match any keyword: subsidiary, subsidiaries, affiliate, acquiror, merger sub,
Keywords (Keyword Match) covenantor, acquired company, acquiring company, surviving corporation,
surviving company
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Library of policy templates 1203
NASD Rule 2711 and NYSE Rules 351 and 472 policy template
Condition Configuration
Merger Consideration ■ Match any keyword: merger stock, merger consideration, exchange shares,
Keywords (Keyword Match) capital stock, dissenting shares, capital structure, escrow fund, escrow
account, escrow agent, escrow shares, escrow cash, escrow amount, stock
consideration, break-up fee, goodwill
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Legal Contract Keywords ■ Match any keyword: recitals, in witness whereof, governing law, Indemnify,
(Keyword Match) Indemnified, indemnity, signature page, best efforts, gross negligence, willful
misconduct, authorized representative, severability, material breach
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
NASD Rule 2711 and NYSE Rules 351 and 472 policy
template
This policy protects the name(s) of any companies involved in an upcoming stock
offering, internal project names for the offering, and the stock ticker symbols for the
offering companies.
The NASD Rule 2711 Documents, Indexed detection rule looks for content from
specific documents registered as sensitive and known to be subject to NASD Rule
2711 or NYSE Rules 351 and 472. This rule returns a match if 80% or more of the
source document is found.
Library of policy templates 1204
NASD Rule 2711 and NYSE Rules 351 and 472 policy template
Simple rule Content Matches NASD Rule 2711 Documents, Indexed (IDM):
Document
■ Detect documents in selected Indexed Document Profile
Signature (IDM)
■ Require at least 80% content match.
■ Severity: High.
■ Check for existence.
■ Look in body, attachments.
The NASD Rule 2711 and NYSE Rules 351 and 472 detection rule is a compound
rule that contains a sender condition and a keyword condition. The sender condition
is based on a user-defined list of email addresses of research analysts at the user's
company ("Analysts' Email Addresses" dictionary). The keyword condition looks
for any upcoming stock offering, internal project names for the offering, and the
stock ticker symbols for the offering companies ("NASD 2711 Keywords" dictionary).
Like the sender condition, it requires editing by the user.
Table 38-51 NASD Rule 2711 and NYSE Rules 351 and 472 detection rule
Compound rule Sender/User NASD Rule 2711 and NYSE Rules 351 and 472 (Sender):
Matches Pattern
■ Match sender pattern(s) [[email protected]] (user defined)
(DCM)
■ Severity: High.
■ Matches on entire message.
Content Matches NASD Rule 2711 and NYSE Rules 351 and 472 (Keyword Match):
Keyword (DCM)
■ Match "[company stock symbol]", "[name of offering company]", "[offering
name (internal name)]".
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Content Matches Keyword Match keyword: "stock, stocks, security, securities, share, shares"
(DCM)
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
The NASD Rule 3010 and NYSE Rule 342 Keywords detection rule looks for
keywords in the "NASD 3010 General Keywords" dictionary, which look for any
general stock broker activity, and stock keywords.
Library of policy templates 1206
NERC Security Guidelines for Electric Utilities policy template
Table 38-53 NASD Rule 3010 and NYSE Rule 342 Keywords detection rule
Compound rule Content Matches Keyword Match keyword: "authorize", "discretion", "guarantee", "options"
(DCM)
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Content Matches Keyword Match keyword: "stock, stocks, security, securities, share, shares"
(DCM)
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Simple rule Content Matches Exact Data Match any three of the following data items:
(EDM)
■ First name
■ Last name
■ Phone
■ Email
Simple rule Content Matches Indexed This rule requires an exact binary match.
Documents (IDM)
See “Choosing an Indexed Document Profile” on page 387.
The Sensitive Keywords and Vulnerability Keywords detection rule looks for any
keyword matches from the "Sensitive Keywords" dictionary and the "Vulnerability
Keywords" dictionary.
This rule looks for content from specific network diagrams that are
registered as confidential. This rule returns a match if 80% or more of
the source document is detected.
Library of policy templates 1208
Network Security policy template
This rule looks for a Visio file type in combination with an IP address
data identifier.
This rule looks for a Visio file type in combination with phrase variations
of "IP address" with a data identifier.
This rule looks for a GoToMyPC command format with a data identifier.
This rule looks for a keyword from the "Hacker Keywords" dictionary.
This rule looks for a keyword from the "Keylogger Keywords" dictionary.
This rule looks for any single keyword in the "Offensive Language,
Explicit" dictionary.
This rule looks for any three instances of keywords in the "Offensive
Language, General" dictionary.
The OFAC Special Designated Nationals List and Recipients detection rule looks
for a recipient with a country code matching entries in the "OFAC SDN Country
Codes" specification in combination with a match on a keyword from the "Specially
Designated Nationals List" dictionary.
Table 38-57 OFAC Special Designated Nationals List and Recipients detection
rule
Compound rule Recipient Matches OFAC Special Designated Nationals List and Recipients (Recipient):
Pattern (DCM)
■ Match email or URL domain by OFAC SDN Country Code.
■ Severity: High.
■ Check for existence.
■ At least 1 recipient(s) must match.
■ Matches on the entire message.
The Communications to OFAC countries detection rule looks for a recipient with a
country code matching entries from the "OFAC Country Codes" list.
The Moderate Confidentiality Indicators detection rule looks for any keywords in
the "Moderate Confidentiality" dictionary.
The Low Confidentiality Indicators detection rule looks for any keywords in the "Low
Confidentiality" dictionary.
Library of policy templates 1212
Password Files policy template
This rule looks for a regular expression pattern with the /etc/passwd
format.
This rule looks for a regular expression pattern with the /etc/shadow
format.
This rule looks for a regular expression pattern with the SAM format.
Simple rule Content Matches This rule detects credit card numbers.
Exact Data (EDM)
See “Choosing an Exact Data Profile” on page 385.
The Credit Card Numbers, All detection rule detects credit card numbers using the
Credit Card Number system Data Identifier.
Simple rule Content Matches Credit Card Numbers, All (Data Identifiers):
Data Identifier
■ Data Identifier: Credit Card Number (narrow)
(DCM)
See “Credit Card Number ” on page 894.
■ Severity: High.
■ Count all matches.
■ Look in envelope, subject, body, attachments.
The Magnetic Stripe Data for Credit Cards detection rule detects raw data from the
credit card magnetic stripe using the Credit Card Magnetic Stripe system Data
Identifier.
Library of policy templates 1214
PIPEDA policy template
Table 38-64 Magnetic Stripe Data for Credit Cards detection rule
Simple rule Content Magnetic Stripe Data for Credit Cards (Data Identifiers):
Matches Data
■ Data Identifier: Credit Card Magnetic Stripe (medium)
Identifier (DCM)
See “Credit Card Number ” on page 894.
■ Data Severity: High.
■ Count all matches.
■ Look in envelope, subject, body, attachments.
EDM Rule The PIPEDA detection rule matches any two However, the following combinations do not create a
of the following data items: match:
The PIPEDA Contact Info detection rule looks for a match of two data items, with
certain data combinations excepted from matching.
Detection Description
method
EDM Rule This rule looks for any two of the following data columns:
■ Last name
■ Phone
■ Account number
■ User name
■ Email
Detection Description
method
DCM Rule This rule implements the narrow breadth edition of the Canadian Social Insurance Number data
identifier.
Detection Description
method
DCM Rule This rule implements the narrow breadth edition of the ABA Routing Number data identifier.
Detection Description
method
DCM Rule This rule implements the narrow breadth edition of the Credit Card Number data identifier.
This rule looks for the combination of user-specified Stock Keeping Unit
(SKU) numbers and the price for that SKU number.
Note: This template contains one EDM detection rule. If you do not have an EDM
profile configured, or you are using Symantec Data Loss Prevention Standard, this
policy template is empty and contains no rule to configure.
This rule looks for content from specific project data files registered as
proprietary. It returns a match if the engine detects 80% or more of the
source document.
This rule looks for any keywords in the "Sensitive Project Code Names"
dictionary, which is user-defined.
This rule looks for content from specific media files registered as
proprietary.
Library of policy templates 1218
Publishing Documents policy template
■ qt
■ riff
■ macromedia_dir
■ midi
■ mp3
■ mpeg_movie
■ quickdraw
■ realaudio
■ wav
■ video_win
■ vrml
This rule looks for file name extensions from the "Media Files
Extensions" dictionary.
This rule looks for content from specific publishing documents registered
as proprietary. It returns a match if the engine detects 80% or more of
the source document.
■ qxpress
■ frame
■ aldus_pagemaker
■ publ
Library of policy templates 1219
Racist Language policy template
This rule looks for specified file name extensions found in the "Publishing
Document Extensions" dictionary.
Note: Both file types and file name extensions are required for this policy because
the detection engine does not detect the true file type for all the required documents.
As such, the file name extension must be used with the file type.
This rule looks for any single keyword in the "Racist Language"
dictionary.
This rule looks for files of the specified types: access, exe, and exe_unix.
This rule looks for messages to recipients with email addresses in the
"Restricted Recipients" dictionary.
This rule is a compound rule with two conditions; both must match to
trigger an incident. This rule contains an EDM condition for first and
last names of employees provided by the user. This rule also looks for
a specific file type attachment (.doc) that is less than 50 KB and contains
at least one keyword from each of the following dictionaries:
This rule looks for files of a specified type (.doc) that are less than 50
KB and match at least one keyword from each of the following
dictionaries:
This rule looks for URLs of Web sites that are used in job searches.
Simple rule Content Matches See “Choosing an Indexed Document Profile” on page 387.
Indexed Document
Profile
The SEC Fair Disclosure Regulation compound detection rule looks for the following
conditions; all must be satisfied for the rule to trigger an incident:
■ The SEC Fair Disclosure keywords indicate possible disclosure of advance
financial information ("SEC Fair Disclosure Keywords" dictionary).
■ An attachment or file type that is a commonly used document or spreadsheet
format. The detected file types are Microsoft Word, Excel Macro, Excel, Works
Spreadsheet, SYLK Spreadsheet, Corel Quattro Pro, WordPerfect, Lotus 123,
Applix Spreadsheets, CSV, Multiplan Spreadsheet, and Adobe PDF.
■ The company name keyword list requires editing by the user, which can include
any name, alternate name, or abbreviation that might indicate a reference to
the company.
Library of policy templates 1222
Sarbanes-Oxley policy template
Compound rule Content Matches SEC Fair Disclosure Regulation (Keyword Match):
Keyword
■ Match keyword: earnings per share, forward guidance
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
■ Match on same component.
The keyword must be in the attachment or file type detected by that
condition.
The Financial Information detection rule looks for a specific file type containing a
word from the "Financial Keywords" dictionary and a word from the
"Confidential/Proprietary Words" dictionary. The spreadsheet file types detected
are Microsoft Excel Macro, Microsoft Excel, Microsoft Works Spreadsheet, SYLK
Spreadsheet, Corel Quattro Pro, and more.
Library of policy templates 1223
SEC Fair Disclosure Regulation policy template
The SEC Fair Disclosure Regulation Documents, Indexed (IDM) detection rule looks
for content from specific documents subject to SEC Fair Disclosure regulation. This
rule returns a match if 80% or more of the source document content is found.
Table 38-73 SEC Fair Disclosure Regulation Documents, Indexed (IDM) detection
rule
Simple rule Content Matches SEC Fair Disclosure Regulation Documents, Indexed (IDM):
Document
■ Detect documents from the selected Indexed Document Profile.
Signature (IDM)
See “Choosing an Indexed Document Profile” on page 387.
■ Match documents with at least 80% content match.
■ Severity: High.
■ Check for existence.
■ Look in body, attachments.
The SEC Fair Disclosure Regulation detection rule looks for the a keyword match
from the "SEC Fair Disclosure Keywords" dictionary, an attachment or file type that
is a commonly used document or spreadsheet, and a keyword match from the
"Company Name Keywords" dictionary.
All three conditions must be satisfied for the rule to trigger an incident:
■ The SEC Fair Disclosure keywords indicate possible disclosure of advance
financial information.
■ The file types detected are Microsoft Word, Excel Macro, Excel, Works
Spreadsheet, SYLK Spreadsheet, Corel Quattro Pro, WordPerfect, Lotus 123,
Applix Spreadsheets, CSV, Multiplan Spreadsheet, and Adobe PDF.
■ The company name keyword list requires editing by the user, which can include
any name, alternate name, or abbreviation that might indicate a reference to
the company.
Library of policy templates 1225
Sexually Explicit Language policy template
Compound rule Content Matches SEC Fair Disclosure Regulation (Keyword Match):
Keyword (DCM)
■ Match "earnings per share", "forward guidance".
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
This rule looks for any single keyword in the "Sex. Explicit Keywords,
Confirmed" dictionary.
Library of policy templates 1226
Source Code policy template
This rule looks for any three instances of keywords in the "Sex. Explicit
Words, Suspect" dictionary.
This rule looks for any three instances of keywords in the "Sex. Explicit
Words, Possible" dictionary.
Source Code Documents IDM This rule looks for specific user-provided source code from a
Document Profile.
Source Code Extensions File Name Match This rule looks for a match among file name extensions from
the "Source Code Extensions" dictionary.
Java Source Code Regular Expressions This compound rule looks for matches on two different regular
expression patterns: Java Import Statements and Java Class
Files.
C Source Code Regular Expression This rule looks for matches on the C Source Code regular
expression pattern.
VB Source Code Regular Expression This rule looks for matches on the VB Source Code regular
expression pattern.
Perl Source Code Regular Expressions This compound rule looks for matches on three different
Perl-related regular expressions patterns.
Library of policy templates 1227
State Data Privacy policy template
Email to Described Email to Affiliates is a policy exception that allows ■ Simple exception (single
Affiliates identity (DCM) email messages to be sent to affiliates who are condition)
(Recipient) legitimately allowed to receive information ■ Match email recipient:
Recipient
covered under the State Data Privacy regulations. [affiliate1], [affiliate2].
Matches Pattern
Policy exceptions are evaluated before detection ■ Edit the "Affiliate Domains"
match conditions. If there is an exception, in this list and enter the email
case an affiliate email address that you have address for each recipient
entered, the entire message is discarded and not who may make acceptable
available for evaluation by detection. use of the confidential data.
■ At least 1 recipient(s) must
match for the exception to
trigger.
■ Matches on the entire
message.
The State Data Privacy policy template implements Exact Data Matching
(Table 38-77). If you do not select an Exact Data profile when you first create a
policy based on this template, the EDM condition is not available for use.
See “Choosing an Exact Data Profile” on page 385.
Library of policy templates 1228
State Data Privacy policy template
State Data Content matches This rule looks for an exact data match on three When you are creating the EDM
Privacy, Exact Data of the following: profile, you should validate it
Consumer (EDM) against the State Data Privacy
■ ABA Routing Number
Data template to ensure that the
■ Account Number
resulting index includes
■ Bank Card Number (credit card number) expected fields.
■ Birth Date
■ Simple rule (single match
■ Driver License Number
condition)
■ First Name
■ Severity: High
■ Last Name
■ Report incident if 1 match
■ Password
■ Look in envelope, body,
■ PIN Number
attachments
■ Social Security Number
■ State ID Card Number
Exception conditions: the following combinations
do not match:
Table 38-78 lists and describes the DCM detection rules implemented by the State
Data Privacy policy. If any one of these rules is violated the policy produces an
incident, unless you have configured the exception condition and the message
recipient is an acceptable use affiliate.
US Social Content Matches The US Social Security Number Patterns rule is ■ Simple rule (single match
Security Data Identifier designed to detect US social security numbers condition)
Number (DCM) (SSNs). The Randomized US SSN data identifier ■ Severity: High.
Patterns detects SSN patterns, both traditional and those ■ Count all matches.
issued under the new randomization scheme. ■ Look in envelope, subject,
See “Randomized US Social Security Number body, attachments.
(SSN)” on page 1051.
Library of policy templates 1229
State Data Privacy policy template
ABA Routing Content Matches The ABA Routing Numbers rule is designed to ■ Simple rule (single match
Numbers Data Identifier detect ABA Routing Numbers. condition)
(DCM) Severity: High.
The ABA Routing Numbers data identifier detects ■
ABA routing numbers. ■ Count all matches.
■ Look in envelope, subject,
See “ABA Routing Number” on page 828.
body, attachments.
Credit Card Content Matches The Credit Card Numbers rule is designed to ■ Simple rule (single condition)
Numbers, All Data Identifier match on credit card numbers. ■ Severity: High.
(DCM) ■ Count all matches.
To detect credit card numbers, this rule
implements the Credit Card Number narrow ■ Look in envelope, subject,
breadth system data identifier. body, attachments
CA Drivers Content Matches The CA Drivers License Numbers rule looks for ■ Simple rule (single condition)
License Data Identifier a match for the CA drivers license number ■ Severity: High.
Numbers (DCM) pattern, a match for a data identifier for terms ■ Count all matches.
relating to "drivers license," and a keyword from
■ Look in envelope, subject,
the "California Keywords" dictionary.
body, attachments
See “Drivers License Number – CA State ”
on page 910.
NY Drivers Content Matches The NY Drivers License Numbers rule looks for ■ Simple rule (single condition)
License Data Identifier a match for the NY drivers license number ■ Severity: High.
Numbers (DCM) pattern, a match for a regular expression for terms ■ Count all matches.
relating to "drivers license," and a keyword from
■ Look in envelope, subject,
the "New York Keywords" dictionary.
body, attachments
See “Drivers License Number - NY State”
on page 916.
FL, MI, and Content Matches The FL, MI, and MN Drivers License Numbers ■ Simple rule (single condition)
MN Drivers Data Identifier rule looks for a match for the stated drivers ■ Severity: High.
License (DCM) license number pattern, a match for a regular ■ Count all matches.
Numbers expression for terms relating to "drivers license,"
■ Look in envelope, subject,
and a keyword from the "Letter/12 Num. DLN
body, attachments
State Words" dictionary (namely, Florida,
Minnesota, and Michigan).
IL Drivers Content Matches The IL Drivers License Numbers detection rule ■ Simple rule (single condition)
License Data Identifier looks for a match for the IL drivers license number ■ Severity: High.
Numbers (DCM) pattern, a match for a regular expression for terms ■ Count all matches.
relating to "drivers license," and a keyword from
■ Look in envelope, subject,
the "Illinois Keywords" dictionary.
body, attachments
See “Drivers License Number - IL State”
on page 913.
NJ Drivers Content Matches The NJ Drivers License Numbers detection rule ■ Simple rule (single condition)
License Data Identifier looks for a match for the NJ drivers license ■ Severity: High.
Numbers (DCM) number pattern, a match for a regular expression ■ Count all matches.
for terms relating to "drivers license," and a
■ Look in envelope, subject,
keyword from the "New Jersey Keywords"
body, attachments
dictionary.
This rule looks for a match to the SWIFT code regular expression and
a keyword from the "SWIFT Code Keywords" dictionary.
This rule is a compound rule with two conditions; both must be matched
to trigger an incident. This rule looks for a keyword match from the
"Symantec DLP Awareness" dictionary and a keyword from the
"Symantec DLP Avoidance" dictionary.
This rule looks for a single compound condition with two parts: either
new or old style National Health Service numbers and a single keyword
from the "UK NHS Keywords" dictionary.
This rule looks for a match to the UK National Insurance number data
identifier and a keyword from the dictionary "UK NIN Keywords."
This rule looks for a keyword from the "UK Passport Keywords"
dictionary and a pattern matching the regular expression for UK Passport
Numbers (Old Type).
This rule looks for a keyword from the "UK Passport Keywords"
dictionary and a pattern matching the regular expression for UK Passport
Numbers (New Type).
This rule looks for a match to the UK Tax ID number data identifier and
a keyword from the dictionary "UK Tax ID Number Keywords."
US Social Security DCM Rule This rule looks for a match to the social See “Randomized US Social
Number Patterns security number regular expression and Security Number (SSN)”
a keyword from the dictionary "US SSN on page 1051.
Keywords."
Violence and DCM Rule This rule is a compound rule with two conditions; both must match to trigger an
Weapons incident. This rule looks for a keyword from the "Violence Keywords" dictionary
and a keyword from the "Weapons Keywords" dictionary.
Library of policy templates 1236
Webmail policy template
Yahoo Compound Recipient Matches This condition checks for the URL domain
detection rule Pattern (DCM) mail.yahoo.com.
Hotmail Compound Recipient Matches This condition checks for the URL domain
detection rule Pattern (DCM) hotmail.msn.com.
Go Compound Recipient Matches This condition checks for the URL gomailus.go.com.
detection rule Pattern (DCM)
AOL Compound Recipient Matches This condition checks for the URL domain aol.com.
detection rule Pattern (DCM)
Gmail Compound Recipient Matches This condition checks for the URL domain
detection rule Pattern (DCM) gmail.google.com.
AND
The Finance Message Board URL detection rule detects messages posted to the
Yahoo Finance message board.
Table 38-86 describes its configuration.
Library of policy templates 1238
Yahoo and MSN Messengers on Port 80 policy template
Simple rule Content Matches Keyword Finance Message Board URL (Keyword Match):
(DCM)
■ Case insensitive.
■ Match Keyword: messages.finance.yahoo.com.
■ Match on whole words only.
■ Check for existence (do not count multiple matches).
■ Look in envelope, subject, body, attachments.
The Board URLs detection rule detects messages posted to the Yahoo or Yahoo
Finance message boards by the URL of either.
Table 38-87 describes its configuration details.
■ Case insensitive.
■ Match keyword: shttp.msg.yahoo.com.
Content Matches Keyword ■ Match on whole words only.
(DCM) ■ Count all matches and report an incident for each match.
■ Look for matches in the envelope, subject, body, and attachments.
■ Match must occur in the same component for both conditions in the
rule.
The MSN IM detection rule looks for matches on three keywords in the same
message component.
Library of policy templates 1240
Yahoo and MSN Messengers on Port 80 policy template
AND
■ Case insensitive.
■ Match keyword: x-msn.
Compound Content Matches Keyword
■ Match on whole words only.
rule (DCM)
■ Count all matches and report an incident for each match.
■ Look for matches in the envelope, subject, body, and attachments.
■ Match must occur in the same component for all conditions in the rule.
AND
■ Case insensitive.
■ Match keyword: charset=utf-8.
Content Matches Keyword
■ Match on whole words only.
(DCM)
■ Count all matches and report an incident for each match.
■ Look for matches in the envelope, subject, body, and attachments.
■ Match must occur in the same component for all conditions in the rule.
■ Response rule actions for Cloud Applications and API appliance detectors
For example, any time a policy is violated, send an email to the user who violated
the policy and the manager. Or, if a policy violation severity level is medium, present
the user with an on-screen warning. Or, if the severity is high, block a file from being
copied to an external device.
All detection servers See “Response rule actions for all detection servers” on page 1244.
Endpoint detection servers See “Response rule actions for endpoint detection” on page 1245.
Network Prevent detection servers See “Response rule actions for Network Prevent detection” on page 1246.
Network Protect detection servers See “Response rule actions for Network Protect detection” on page 1247.
Cloud storage detections servers and See “Response rule actions for Cloud Storage detection” on page 1248.
detectors
Cloud Service Connector REST See “Response rule actions for Cloud Applications and API appliance
detectors detectors” on page 1249.
Table 39-2 Available response rule actions for all detection servers
Add Note Add a field to the incident record that the remediator can annotate at the
Incident Snapshot screen.
Limit Incident Data Retention Discard or retain matched data with the incident record.
See “Configuring the Limit Incident Data Retention action” on page 1284.
Send Email Notification Send an email you compose to recipients you specify.
Table 39-2 Available response rule actions for all detection servers (continued)
See “Configuring the Endpoint Discover: Quarantine File action” on page 1315.
Endpoint Prevent: Block Block the transfer of data that violates the policy.
For example, block the copy of confidential data from an endpoint to a USB
flash drive.
Endpoint Prevent: Notify Display an on-screen notification to the endpoint user when confidential
data is transferred.
Endpoint Prevent: User Cancel Allow the user to cancel the transfer of a confidential file. The override is
time sensitive.
See “Configuring the Endpoint Prevent: User Cancel action” on page 1328.
See “Configuring the Network Prevent for Web: Block FTP Request action”
on page 1331.
Note: Only available with Network Prevent for Web.
See “Configuring the Network Prevent for Web: Block HTTP/S action”
on page 1331.
Note: Only available with Network Prevent for Web.
Network Prevent: Block SMTP Message Block email that causes an incident.
(Network Prevent only)
See “Configuring the Network Prevent: Block SMTP Message action”
on page 1333.
Note: Only available with Network Prevent for Email.
Responding to policy violations 1247
Response rule actions for Network Protect detection
Network Prevent: Remove HTTP/S Remove confidential content from Web posts.
Content
See “Configuring the Network Prevent for Web: Remove HTTP/S Content
action” on page 1335.
Note: Only available with Network Prevent for Web.
Network Protect: Copy File Copy sensitive files to a location you specify.
See “Configuring the Network Protect: Copy File action” on page 1336.
Note: Only available with Network Protect.
See “Configuring the Network Protect: Quarantine File action” on page 1337.
Note: Only available with Network Protect.
Responding to policy violations 1248
Response rule actions for Cloud Storage detection
Network Protect: Encrypt File Encrypt sensitive files using Symantec ICE.
See “Configuring the Network Protect: Encrypt File action” on page 1338.
Note: This action is available only if you have installed the Network Protect
ICE license and configured the Enforce Server to connect to the Symantec
ICE Cloud. For information about how Symantec Data Loss Prevention
interacts with Symantec ICE, refer to the Symantec Information Centric
Encryption Deployment Guide at http://www.symantec.com/docs/DOC9707.
Cloud Storage: Add Visual Tag Add a text tag to Box cloud storage content
that violates a policy.
See “Configuring the Cloud Storage: Add
Visual Tag action” on page 1297.
Prevent download, copy, print The Prevent download, copy, print action
returns a recommendation to prevent
download, copy, and print options for the
sensitive data with the detection result.
Set Collaborator Access to 'Edit' The Set Collaborator Access to 'Edit' action
returns a recommendation to grant edit
access to collaborators for the sensitive data
with the detection result.
Set File Access to 'All Read' The Set File Access to 'All Read' action
returns a recommendation to allow public
read access to the sensitive data with the
detection result.
Set File Access to 'Internal Edit' The Set File Access to 'Internal Edit' action
returns a recommendation to allow all
members of your organization editing
permissions on the sensitive data with the
detection result.
Set File Access to 'Internal Read' The Set File Access to 'Internal Read'
action returns a recommendation to allow all
members of your orginization read access to
the sensitive data with the detection result.
Automated Response rules When a policy violation occurs, the detection server automatically executes
response rule actions.
Smart Response rules When a policy violation occurs, an authorized user manually triggers the
response rule.
Add Note Add a field to the incident record that the remediator can annotate at the
Incident Snapshot screen.
Log to a Syslog Server Log the incident to a syslog server for workflow remediation.
Send Email Notification Send an email you compose to recipients you specify.
Conditions are not required. If a response rule does not declare a condition, the
response rule action always executes each time an incident occurs. If a condition
is declared, it must be met for the action to trigger. If more than one condition is
declared, all must be met for the system to take action.
See “Configuring response rules” on page 1266.
Endpoint Location Triggers a response action when the endpoint is on or off the corporate network.
Endpoint Device Triggers a response action when an event occurs on a configured endpoint
device.
Incident Type Triggers a response action when the specified type of detection server reports
a match.
Incident Match Count Triggers a response action when the volume of policy violations exceeds a
threshold or range.
See “Configuring the Incident Match Count response condition” on page 1277.
Protocol or Endpoint Monitoring Triggers a response action when an incident is detected on a specified network
communications protocol (such as HTTP) or endpoint destination (such as
CD/DVD).
Severity Triggers a response action when the policy violation is a certain severity level.
■ One endpoint response rule lets a user cancel an attempted file copy and another
rule blocks the attempt.
The detection server blocks the file copy.
■ One network response rule action copies a file and another action quarantines
it.
The detection server quarantines the file.
■ One network response rule action modifies the content of an email message
and another action blocks the transmission.
The detection server blocks the email transmission.
You cannot change the priority execution order for different response rule action
types. But, you can modify the order of execution for the same type of response
rule action with conflicting instructions.
See “Modifying response rule ordering” on page 1272.
Endpoint Prevent: Block See “Configuring the Endpoint Prevent: Block action”
on page 1317.
Endpoint Prevent: Encrypt See “Configuring the Endpoint Prevent: Encrypt action”
on page 1321.
Endpoint Prevent: User Cancel See “Configuring the Endpoint Prevent: User Cancel
action” on page 1328.
Endpoint Prevent: Notify See “Configuring the Endpoint Prevent: Notify action”
on page 1325.
Endpoint Discover: Quarantine File See “Configuring the Endpoint Discover: Quarantine
File action” on page 1315.
All: Limit Incident Data Retention See “Configuring the Limit Incident Data Retention
action” on page 1284.
Network Prevent: Block SMTP See “Configuring the Network Prevent: Block SMTP
Message Message action” on page 1333.
Network Prevent: Modify SMTP See “Configuring the Network Prevent: Modify SMTP
Message Message action” on page 1334.
Responding to policy violations 1258
About response rule action execution priority
Network Prevent for Web: Remove See “Configuring the Network Prevent for Web: Remove
HTTP/HTTPS Content HTTP/S Content action” on page 1335.
Network Prevent for Web: Block See “Configuring the Network Prevent for Web: Block
HTTP/HTTPS HTTP/S action” on page 1331.
Network Prevent for Web: Block See “Configuring the Network Prevent for Web: Block
FTP Request FTP Request action” on page 1331.
Network Protect: Quarantine File See “Configuring the Network Protect: Quarantine File
action” on page 1337.
Network Protect: Encrypt File See “Configuring the Network Protect: Encrypt File
action” on page 1338.
Network Protect: Copy File See “Configuring the Network Protect: Copy File action”
on page 1336.
All: Set Status See “Configuring the Set Status action” on page 1292.
All: Set Attribute See “Configuring the Set Attribute action” on page 1291.
All: Add Note See “Configuring the Add Note action” on page 1284.
All: Log to a Syslog Server See “Configuring the Log to a Syslog Server action”
on page 1287.
All: Send Email Notification See “Configuring the Send Email Notification action”
on page 1288.
Cloud Storage: Add Visual Tag See “Configuring the Cloud Storage: Add Visual Tag
action” on page 1297.
Cloud Storage: Quarantine See “Configuring the Cloud Storage: Quarantine action”
on page 1297.
Break Links in Data-at-Rest See “Configuring the Break Links in Data-at-Rest action”
on page 1300.
Set File Access to 'All Read' See “Configuring the Set File Access to 'All Read'
action” on page 1308.
Prevent download, copy, print See “Configuring the Prevent download, copy, print
action” on page 1305.
Set File Access to 'Internal Read' See “Configuring the Set File Access to 'Internal Read'
action” on page 1309.
Responding to policy violations 1260
About response rule authoring privileges
Set File Access to 'Internal Edit' See “Configuring the Set File Access to 'Internal Edit'”
on page 1308.
Set Collaborator Access to 'Read' See “Configuring the Set Collaborator Access to 'Read'
action” on page 1307.
Set Collaborator Access to 'Edit' See “Configuring the Set Collaborator Access to 'Edit'
action” on page 1306.
1 Review the available response rules. The Manage > Policies > Response Rules screen displays
all configured response rules.
2 Decide the type of response rule to Decide the type of response rules based on your business
implement: Smart, Automated, both. requirements.
3 Determine the type of actions you want to See “About response rule conditions” on page 1255.
implement and any triggering conditions.
See “About response rule actions” on page 1243.
4 Understand the order of precedence among See “About response rule action execution priority”
response rule actions of different and the on page 1256.
same types.
See “Modifying response rule ordering” on page 1272.
5 Integrate the Enforce Server with an external Some response rules may require integration with external
system (if required for the response rule). systems.
These may include:
6 Add a new response rule. See “Adding a new response rule” on page 1265.
8 Configure one or more response rule See “Configuring response rule conditions” on page 1267.
conditions (optional).
9 Configure one or more response rule actions You must define at least one action for a valid response rule.
(required).
See “Configuring response rule actions” on page 1268.
10 Add response rules to policies. You must have policy authoring privileges to add response
rules to policies.
Action Description
Add Response Rule Click Add Response Rule to define a new response rule.
See “Adding a new response rule” on page 1265.
Modify Response Rule Click Modify Response Rule Order to modify the response rule order of precedence.
Order
See “Modifying response rule ordering” on page 1272.
Delete an existing response Click the red X icon next to the far right of the response rule to delete it.
rule
You must confirm the operation before deletion occurs.
Refresh the list Click the refresh arrow icon at the upper right of the Response Rules screen to fetch
the latest status of the rule.
Order The Order of precedence when more than one response rule is configured.
Actions The type of Action the response rule can take to respond to an incident (required).
Conditions The Condition that triggers the response rule (if any).
4 Select and configure one or more Actions. You must define at least one action.
See “Configuring response rule actions” on page 1268.
5 Click Save to save the response rule definition.
See “Manage response rules” on page 1264.
See “Implementing response rules” on page 1260.
All Add Note See “Configuring the Add Note action” on page 1284.
All Limit Incident Data See “Configuring the Limit Incident Data Retention action” on page 1284.
Retention
All Log to a Syslog Server See “Configuring the Log to a Syslog Server action” on page 1287.
All Send Email Notification See “Configuring the Send Email Notification action” on page 1288.
All Server FlexResponse See “Configuring the Server FlexResponse action” on page 1290.
All Set Attribute See “Configuring the Set Attribute action” on page 1291.
All Set Status See “Configuring the Set Status action” on page 1292.
Cloud Storage Add Visual Tag See “Configuring the Cloud Storage: Add Visual Tag action”
on page 1297.
Cloud Storage Quarantine See “Configuring the Cloud Storage: Quarantine action” on page 1297.
Applications: Break Links in Data-at-Rest See “Configuring the Break Links in Data-at-Rest action” on page 1300.
Data-at-Rest
(DAR)
Applications: Custom Action on See “Configuring the Custom Action on Data-at-Rest action”
Data-at-Rest Data-at-Rest on page 1301.
(DAR)
Applications: Delete Data-at-Rest See “Configuring the Delete Data-at-Rest action” on page 1301.
Data-at-Rest
(DAR)
Applications: Encrypt Data-at-Rest See “Configuring the Encrypt Data-at-Rest action” on page 1302.
Data-at-Rest
(DAR)
Applications: Perform DRM on See “Configuring the Perform DRM on Data-at-Rest action”
Data-at-Rest Data-at-Rest on page 1303.
(DAR)
Applications: Quarantine Data-at-Rest See “Configuring the Quarantine Data-at-Rest action” on page 1303.
Data-at-Rest
(DAR)
Applications: Tag Data-at-Rest See “Configuring the Tag Data-at-Rest action” on page 1304.
Data-at-Rest
(DAR)
Configuring and managing response rules 1270
Configuring response rule actions
Applications: Add two-factor See “Configuring the Add two-factor authentication action” on page 1309.
Data-in-Motion authentication
Applications: Block Data-in-Motion See “Configuring the Block Data-in-Motion action” on page 1310.
Data-in-Motion
(DIM)
Applications: Custom Action on See “Configuring the Custom Action on Data-in-Motion action”
Data-in-Motion Data-in-Motion on page 1311.
(DIM)
Applications: Encrypt Data-in-Motion See “Configuring the Encrypt Data-in-Motion action” on page 1311.
Data-in-Motion
(DIM)
Applications: Perform DRM on See “Configuring the Perform DRM on Data-in-Motion action”
Data-in-Motion Data-in-Motion on page 1312.
(DIM)
Applications: Quarantine Data-in-Motion See “Configuring the Quarantine Data-in-Motion action” on page 1313.
Data-in-Motion
(DIM)
Applications: Redact Data-in-Motion See “Configuring the Redact Data-in-Motion action” on page 1314.
Data-in-Motion
(DIM)
Applications: Prevent download, copy, See “Configuring the Prevent download, copy, print action”
Data-at-Rest print on page 1305.
(DAR)
Applications: Remove Collaborator See “Configuring the Remove Collaborator Access action” on page 1305.
Data-at-Rest Access
(DAR)
Applications: Set Collaborator Access to See “Configuring the Set Collaborator Access to 'Edit' action”
Data-at-Rest 'Edit' on page 1306.
(DAR)
Applications: Set Collaborator Access to See “Configuring the Set Collaborator Access to 'Preview' action”
Data-at-Rest 'Preview' on page 1307.
(DAR)
Applications: Set Collaborator Access to See “Configuring the Set Collaborator Access to 'Read' action”
Data-at-Rest 'Read' on page 1307.
(DAR)
Configuring and managing response rules 1271
Configuring response rule actions
Applications: Set File Access to 'All Read' See “Configuring the Set File Access to 'All Read' action” on page 1308.
Data-at-Rest
(DAR)
Applications: Set File Access to 'Internal See “Configuring the Set File Access to 'Internal Edit'” on page 1308.
Data-at-Rest Edit'
(DAR)
Applications: Set File Access to 'Internal See “Configuring the Set File Access to 'Internal Read' action”
Data-at-Rest Read' on page 1309.
(DAR)
Endpoint FlexResponse See “Configuring the Endpoint: FlexResponse action” on page 1314.
Endpoint Quarantine File See “Configuring the Endpoint Discover: Quarantine File action”
Discover on page 1315.
Endpoint Prevent Block See “Configuring the Endpoint Prevent: Block action” on page 1317.
Endpoint Prevent Encrypt See “Configuring the Endpoint Prevent: Encrypt action” on page 1321.
Endpoint Prevent Notify See “Configuring the Endpoint Prevent: Notify action” on page 1325.
Endpoint Prevent User Cancel See “Configuring the Endpoint Prevent: User Cancel action”
on page 1328.
Network Prevent Block FTP Request See “Configuring the Network Prevent for Web: Block FTP Request
for Web action” on page 1331.
Network Prevent Block HTTP/S See “Configuring the Network Prevent for Web: Block HTTP/S action”
for Web on page 1331.
Network Prevent Block SMTP Message See “Configuring the Network Prevent: Block SMTP Message action”
for Email on page 1333.
Network Prevent Modify SMTP Message See “Configuring the Network Prevent: Modify SMTP Message action”
for Email on page 1334.
Network Prevent Remove HTTP/S Content See “Configuring the Network Prevent for Web: Remove HTTP/S
for Web Content action” on page 1335.
Network Protect Copy File See “Configuring the Network Protect: Copy File action” on page 1336.
Network Protect Quarantine File See “Configuring the Network Protect: Quarantine File action”
on page 1337.
Network Protect Encrypt File See “Configuring the Network Protect: Encrypt File action” on page 1338.
Configuring and managing response rules 1272
Modifying response rule ordering
Note: This condition is specific to endpoint incidents. You should not implement
this condition for Network or Discover incidents. If you do the response rule action
does not to execute.
Response rule conditions 1275
Configuring the Endpoint Device response condition
Is Any Of Off the corporate This combination triggers a response rule action if an incident occurs when the
network endpoint is off the corporate network.
Is None Of Off the corporate This combination does not trigger a response rule action if an incident occurs
network when the endpoint is off the corporate network.
Is Any Of On the corporate This combination triggers a response rule action if an incident occurs when the
network endpoint is on the corporate network.
Is None Of On the corporate This combination does not trigger a response rule action if an incident occurs
network when the endpoint is on the corporate network.
Note: This condition is specific to endpoint incidents. You should not implement
this condition for Network or Discover incidents. If you do the response rule action
does not to execute.
Response rule conditions 1276
Configuring the Incident Type response condition
Is Any Of Configured Triggers a response rule action when an incident is detected on a configured
device endpoint device.
Is None Of Configured Does not trigger (excludes from executing) a response rule action when an incident
device is detected on a configured endpoint device.
Is Any Of Discover Triggers a response rule action for any incident that Network Discover detects.
Is None Of Does not trigger a response rule action for any incident that Network Discover
detects.
Is Any Of Endpoint Triggers a response rule action for any incident that Endpoint Prevent detects.
Is None Of Does not trigger a response rule action for any incident that Endpoint Prevent
detects.
Is Any Of Network Triggers a response rule action for any incident that Network Prevent detects.
Is None Of Does not trigger a response rule action for any incident that Network Prevent
detects.
Is Greater Than User-specified Triggers a response rule action if the threshold number of incidents is
number eclipsed.
Is Greater Than or User-specified Triggers a response rule action if the threshold number of incidents is met
Equals number or eclipsed.
Is Between User-specified pair of Triggers a response rule action when the number of incidents is between
numbers the range of numbers specified.
Is Less Than User-specified Triggers a response rule action if the number of incidents is less than the
number specified number.
Is Less Than or User-specified Triggers a response rule action when the number of incidents is equal to
Equals number or less than the specified number.
Is Any Of Triggers an action if the endpoint clipboard has been copied or pasted
to.
Endpoint Clipboard
Is None Of Does not trigger action if the endpoint clipboard has been copied or
pasted to.
Is Any Of Triggers an action if sensitive files are discovered on the local drive.
Endpoint Local Drive
Is None Of Does not trigger action if sensitive files are discovered on the local
drive.
Is Any Of Triggers an action if an endpoint printer or fax has been sent to.
Endpoint Printer/Fax
Is None Of Does not trigger action if an endpoint printer or fax has been sent to.
■ Configuring the Network Prevent for Web: Block FTP Request action
■ Configuring the Network Prevent for Web: Remove HTTP/S Content action
Response rule actions 1284
Configuring the Add Note action
Note: Limit Incident Data Retention does not apply to Endpoint Print or Clipboard
incidents.
See “Configuring the Limit Incident Data Retention action” on page 1284.
Parameter Description
All Endpoint Incidents Check this option to retain the original file attachments for Endpoint Prevent
incidents and incidents Endpoint Discover captures using an endpoint target.
(including Endpoint Discover
incidents)
Response rule actions 1286
Configuring the Limit Incident Data Retention action
Note: The default data retention behavior for network incidents applies to Network
Prevent for Web and Network Prevent for Email incidents. The default behavior
does not apply to Network Discover incidents. For Network Discover incidents, the
system provides a link in the Incident Snapshot that points to the offending file at
its original location. Incident data retention for Network Discover is not configurable.
Parameter Description
Parameter Description
Note: You use this response rule in conjunction with a syslog server. See “Enabling
a syslog server” on page 164.
6 Select the Level to apply to the log message from the drop-down list.
Response rule actions 1288
Configuring the Send Email Notification action
Parameter Description
To: Sender Select this option to send the email notification to the email sender. This recipient only applies
to email message violations.
To: Data Owner Select this option to send email notification to the data owner that the system identifies by email
address in the incident.
To: Other Email This option can include any custom attributes designated as email addresses (such as
Address "manager@email"). For example, if you define a custom attribute that is an email address, or
retrieve one via a lookup plug-in, that address will appear in the "To" field for selection, to the
right of "To: Sender" and "To: Data Owner."
CC Enter one or more specific email addresses separated by commas for people you want to copy
on the notification.
If this field is blank, the message appears to come from the system email address.
Include Original Select this option to include the message that generated the incident with the notification email.
Message
Max Per Day Enter a number to restrict the maximum number of notifications that the system sends in a day.
Parameter Description
Language Select the language for the message from the drop-down menu.
Add Language Click the icon to add multiple language(s) for the message.
See “About Endpoint Prevent response rules in different locales” on page 1814.
Response rule actions 1290
Configuring the Server FlexResponse action
Parameter Description
Subject Enter a subject for the message that indicates what the message is about.
Insert Variables You can add one or more variables to the subject or body of the email message by selecting
the desired value(s) from the Insert Variables list.
Variables can be used to include the file name, policy name, recipients, and sender in both the
subject and the body of the email message. For example, to include the policy and rules violated,
you would insert the following variables.
7 In the Actions (executed in the order shown) menu, select the action All:
Server FlexResponse.
8 Click Add Action.
9 In the FlexResponse Plugin menu, select a deployed Server FlexResponse
plug-in to execute with this Response Rule action.
The name that appears in this drop-down menu is the value specified in the
display-name property from either the configuration properties file or the plug-in
metadata class.
See “Deploying a Server FlexResponse plug-in” on page 1634.
Note: If you have installed the Network Protect ICE license and configured the
Enforce Server to connect to the Symantec ICE Cloud, you can use the
SharePoint Encrypt response rule action which is made available through a
Server FlexResponse plug-in for encryption that is installed automatically with
Symantec Data Loss Prevention. No additional configuration or customization
is required for the encryption plug-in.
10 Click Save.
11 Repeat this procedure, adding a Response Rule for any additional Server
FlexResponse plug-ins that you have deployed.
3 Select the Attribute from the drop-down list (if more than one custom attribute
is defined).
4 Enter an incident status Value for the selected custom attribute.
5 Click Save to save the configuration.
See “Manage response rules” on page 1264.
See “Implementing response rules” on page 1260.
Parameter Description
Archive and Select this option to indicate that Symantec Enterprise Vault should archive
classify the message that matched the detection rule. If you select this option, also
message use the Assign retention category menu to specify the retention category
that Enterprise Vault assigns.
Response rule actions 1294
Configuring the Classify Enterprise Vault Content response action
Parameter Description
Assign The Assign retention category menu lists all of the retention categories
retention that you have configured for use with the Data Classification for Enterprise
category Vault solution. If you configure the response rule to archive a message, also
select the appropriate retention category from this menu.
You should configure the retention category names in this menu to match
those categories that are available on Enterprise Vault servers.
See “Configuring the retention categories that are available for classification”
on page 1295.
When you configure a response rule, if you do not select the classification
type of response rule, then Enterprise Vault cannot receive any response
from the Symantec Enterprise Vault Data Classification Services. Enterprise
Vault applies the retention category that is already available on the message.
If the associated policy was running in test mode, the incident is created,
but Enterprise Vault does not receive any response from the Classification
Server. Not even test mode logs on Enterprise Vault are updated.
Compliance If you configure the response rule to archive the message, you can also
review select Prioritize messages for compliance review to prioritize the message
for review. The Discovery Accelerator and Compliance Accelerator products
can use this classification tag to filter messages during searches or audits.
When you select this option, two additional choices are presented:
Parameter Description
Do not Choose this option to indicate that Symantec Enterprise Vault should not
archive archive the message that matched the detection rule.
message When you select this option, the following choices are presented to specify
the way in which Enterprise Vault should discard the message:
Note: When you monitor a Journal mailbox, you may see messages marked
as "Do not archive" in the journal Inbox and in the Deleted items folder.
Messages that are marked as "Do not archive" are not automatically
re-located. You can manually move the messages into the deleted items
folder.
When you first install the Data Classification Services solution, you must create a
RetentionCategories.config file to include the retention categories that are
available in Enterprise Vault servers. If you change the retention categories that
are available in an Enterprise Vault deployment, you should also manually change
the available categories that are defined in RetentionCategories.config.
Parameter Description
Marker File Select Leave marker file in place of remediated file to create a marker text file to replace the original
file. This action notifies the user what happened to the file instead of quarantining or deleting the file
without any explanation.
Note: The marker file is the same type and has the same name as the original file, as long as it is a
text file. An example of such a file type is Microsoft Word. If the original file is a PDF or image file, the
system creates a plain text marker file. The system then gives the file the same name as the original
file with .txt appended to the end. For example, if the original file name is accounts.pdf, the marker file
name is accounts.pdf.txt.
Marker Specify the text to appear in the marker file. If you selected the option to leave the marker file in place
Text of the remediated file, you can use variables in the marker text.
To specify marker text, select the variable from the Insert Variable list.
Add visual Select this option to add a visual tag to the marker file. The visual tag helps your Box cloud storage
tag to users search for marker files for quarantined sensitive data
marker file
Parameter Description
File Path Enter the file path for the quarantine location. This file path is relative to the user's root folder.
Use Marker Select Use Marker File to create a marker text file to replace the original file. This action notifies the
File user what happened to the file instead of quarantining or deleting the file without any explanation.
Parameter Description
Custom Enter details about the Break Links in Data-at-Rest action in the custom payload field. These details
payload are returned in the customResponsePayload parameter of the detection result.
Response rule actions 1301
Configuring the Custom Action on Data-at-Rest action
Parameter Description
Custom Enter details about the Custom Action on Data-at-Rest action in the custom payload field. These
payload details are returned in the customResponsePayload parameter of the detection result.
Parameter Description
Custom Enter details about the Encrypt Data-at-Rest action in the Custom payload field. These details are
payload returned in the customResponsePayload parameter of the detection result.
Response rule actions 1303
Configuring the Perform DRM on Data-at-Rest action
Parameter Description
Custom Enter details about the Perform DRM on Data-at-Rest action in the Custom payload field. These details
payload are returned in the customResponsePayload parameter of the detection result.
Parameter Description
File Path Enter the file path for the quarantine location. This file path is relative to the user's root folder.
Use Marker Select Use Marker File to create a marker text file to replace the original file. This action notifies the
File user what happened to the file instead of quarantining or deleting the file without any explanation.
Parameter Description
Custom Enter details about the Tag Data-at-Rest action in the Custom payload field. These details are returned
payload in the customResponsePayload parameter of the detection result.
■ OneDrive
■ SharePoint
■ Google Drive
To configure the Remove Collaborator Access action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1266.
2 Add the Remove Collaborator Access action type from the Actions list.
See “Configuring response rule actions” on page 1268.
3 Click Save to save the configuration.
See “Manage response rules” on page 1264.
See “Implementing response rules” on page 1260.
Parameter Description
Message Enter a user-facing message for the Block Data-in-Motion action in the message field. These details
are returned in the message parameter of the detection result.
Parameter Description
Custom Enter details about the Custom Action on Data-in-Motion action in the custom payload field. These
payload details are returned in the customResponsePayload parameter of the detection result.
Parameter Description
Custom Enter details about the Encrypt Data-in-Motion action in the custom payload field. These details are
payload returned in the customResponsePayload parameter of the detection result.
Parameter Description
Custom Enter details about the Perform DRM on Data-in-Motion action in the custom payload field. These
payload details are returned in the customResponsePayload parameter of the detection result.
Parameter Description
Custom Enter details about the Quarantine Data-in-Motion action in the custom payload field. These details
payload are returned in the customResponsePayload parameter of the detection result.
Response rule actions 1314
Configuring the Redact Data-in-Motion action
Parameter Description
Message Enter a user-facing message for the Redact Data-in-Motion action in the message field. These details
are returned in the message parameter of the detection result.
Note: This feature is not available for agents running on Mac endpoints.
Response rule actions 1315
Configuring the Endpoint Discover: Quarantine File action
Parameter Description
FlexResponse Enter the script module name with packages separated by a period (.).
Python Plugin
Plugin parameters Click Add Parameter to add one or more parameters to the script.
You can add and store credentials at the System > Settings > Credentials screen.
If you use multiple endpoint response rules in a single policy, make sure that you
understand the order of precedence for such rules.
See “About response rule action execution priority” on page 1256.
Note: This feature is not available for agents running on Mac endpoints.
Table 42-21 Endpoint Discover: Quarantine File response rule action parameters
Parameter Description
Quarantine Enter the path to the secured location where you want files to be placed. The secure location can
Path either be on the local drive of the endpoint, or can be on a remote file share. EFS folders can also
be used as the quarantine location.
Response rule actions 1317
Configuring the Endpoint Prevent: Block action
Table 42-21 Endpoint Discover: Quarantine File response rule action parameters
(continued)
Parameter Description
Access Mode If your secure location is on a remote file share, you must select how the Symantec DLP Agent
accesses that file share.
Select one of the following credential access types:
■ Anonymous Access
■ Use Saved Credentials
In anonymous mode, the Symantec DLP Agent runs as LocalSystem user to move the confidential
file. You can use anonymous mode to move files to a secure location on a local drive or to remote
share if it allows anonymous access.
Note: EFS folders cannot accept anonymous users.
A specified credential lets the Symantec DLP Agent impersonate the specified user to access the
secure location. The credentials must be in the following format:
domain\user
You must enter the specified credentials you want to use through the System Credentials page.
Marker File Select the Leave marker in place of the remediated file check box to create a placeholder file
that replaces the confidential file.
Marker Text Specify the text to appear in the marker file. If you selected the option to leave the marker file in
place of the remediated file, you can use variables in the marker text.
To specify the marker text, select the variable from the Insert Variable list.
Note: The block action is not triggered for a copy of sensitive data to a local drive.
Parameter Configuration
Language Select the language you want the response rule to execute on. Click Add Language to add more
than one language.
See “About Endpoint Prevent response rules in different locales” on page 1814.
See “Setting Endpoint Prevent response rules for different locales” on page 1815.
Response rule actions 1319
Configuring the Endpoint Prevent: Block action
Table 42-22 Endpoint Prevent: Block response rule action parameters (continued)
Parameter Configuration
Display Alert This field is optional for Endpoint Block actions. Select an Endpoint Block action to display an
Box with this on-screen notification to the endpoint user when the system blocks an attempt to copy confidential
message data.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Optionally, you can configure the on-screen notification to include user justifications as well as an
option for users to enter their own justification.
You can also add hyperlinks to refer users to URLs that contain company security information. To
add hyperlinks you use standard HTML syntax, tags, and URLs. Tags are case-sensitive. You can
include insert hyperlinked text between regular text. For example, you would enter:
Insert Variable Select the variables to include in the on-screen notification to the endpoint when the system blocks
an attempt to copy confidential data.
You can select variables based on the following types:
■ Application
■ Content Name
■ Content Type
■ Device Type
■ Policy Names
■ Protocol
Response rule actions 1320
Configuring the Endpoint Prevent: Block action
Table 42-22 Endpoint Prevent: Block response rule action parameters (continued)
Parameter Configuration
Allow user to Select this option to display up to four user justifications in the on-screen notification. When the
choose notification appears on the endpoint, the user is required to choose one of the justifications. (If you
explanation select Allow user to enter text explanation, the user can enter a justification.) Symantec Data Loss
Prevention provides four default justifications, which you can modify or remove as needed.
Justification:
■ User Education
■ Broken Business Process
■ Manager Approved
■ False positive
Each justification entry consists of the following options:
■ Check box
This option indicates whether to include the associated justification in the notification. To remove
a justification, clear the check box next to it. To include a justification, select the check box next
to it.
■ Justification
The system label for the justification. This value appears in reports (for ordering and filtering
purposes), but the user does not see it. You can select the desired option from the drop-down
list.
■ Option Presented to End User
The justification text the system displays in the notification. This value appears in reports with the
justification label. You can modify the default text as desired.
To add a new justification, select New Justification from the drop-down list. In the Enter new
justification text box that appears, enter the justification name. When you save the rule, Symantec
Data Loss Prevention includes it as an option (in alphabetical order) in all Justification drop-down
lists.
Note: You should be selective when adding new justifications. Deleting new justifications is not
currently supported.
Allow user to Select this option to include a text box into which users can enter their own justification.
enter text
explanation
Parameter Description
Language Select the language you want the response rule to execute on.
Click Add Language to add more than one language.
Pre-timeout warning This field is required to notify users that they have a limited amount
of time to respond to the incident.
Enter the notification message in the text box. You can add
variables to the message by selecting the appropriate value(s)
from the Insert Variable box.
Post-timeout message This field notifies users that the amount of time to override the
policy has expired. The data transfer was blocked.
Enter the notification message in the text box. You can add
variables to the message by selecting the appropriate value(s)
from the Insert Variable box.
Response rule actions 1323
Configuring the Endpoint Prevent: Encrypt action
Parameter Description
Display Alert Box with This field is required for Endpoint Encrypt actions. Select this
this message option to display an on-screen notification to the endpoint user.
Enter the notification message in the text box. You can add
variables to the message by selecting the appropriate value(s)
from the Insert Variable box.
You can also add hyperlinks to refer users to URLs that contain
company security information. To add hyperlinks you use standard
HTML syntax, tags, and URLs. Tags are case-sensitive. You can
include insert hyperlinked text between regular text. For example,
you would enter:
Insert Variable Select the variables that you want to include in the on-screen
notification to the endpoint user.
■ Application
■ Content Name
■ Content Type
■ Device Type
■ Policy Name
■ Protocol
■ Timeout Counter
Note: You must use the Timeout Counter variable to display how
much time remains before blocking the data transfer.
Response rule actions 1324
Configuring the Endpoint Prevent: Encrypt action
Parameter Description
Allow user to choose Select this option to display up to four user justifications in the
explanation. on-screen notification. When the notification appears on the
endpoint, the user is required to choose one of the justifications.
(If you select Allow user to enter text explanation, the user can
enter a justification.) Symantec Data Loss Prevention provides
four default justifications, which you can modify or remove as
needed.
Available Justifications:
■ Check box
This option indicates whether to include the associated
justification in the notification. To remove a justification, clear
the check box next to it. To include a justification, select the
check box next to it.
■ Justification
The system label for the justification. This value appears in
reports (for ordering and filtering purposes), but the user does
not see it. You can select the desired option from the drop-down
list.
■ Option Presented to End User
The justification text Symantec Data Loss Prevention displays
in the notification. This value appears in reports with the
justification label. You can modify the default text as desired.
Allow user to enter text Select this option to include a text box into which users can enter
explanation. their own justification.
Response rule actions 1325
Configuring the Endpoint Prevent: Notify action
Note: The notify action is not triggered for a copy of sensitive data to a local drive.
Parameter Description
Language Select the language you want the response rule to execute on.
See “About Endpoint Prevent response rules in different locales” on page 1814.
See “Setting Endpoint Prevent response rules for different locales” on page 1815.
Response rule actions 1326
Configuring the Endpoint Prevent: Notify action
Parameter Description
Display Alert Box This field is required for Endpoint Notify actions. Select this option to display an on-screen
with this message notification to the endpoint user.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Optionally, you can configure the on-screen notification to include user justifications as well as
the option for users to enter their own justifications.
You can also add hyperlinks to refer users to URLs that contain company security information.
To add hyperlinks you use standard HTML syntax, tags, and URLs. Tags are case-sensitive.
You can include insert hyperlinked text between regular text. For example, you would enter:
Insert Variable Select the variables that you want to include in the on-screen notification to the endpoint user.
You can select variables based on the following types:
■ Application
■ Content Name
■ Content Type
■ Device Type
■ Policy Names
■ Protocol
Response rule actions 1327
Configuring the Endpoint Prevent: Notify action
Parameter Description
Allow user to choose Select this option to display up to four user justifications in the on-screen notification. When
explanation the notification appears on the endpoint, the user is required to choose one of the justifications.
(If you select Allow user to enter text explanation, the user can enter a justification.) Symantec
Data Loss Prevention provides four default justifications, which you can modify or remove as
needed.
Available Justifications:
■ Check box
This option indicates whether to include the associated justification in the notification. To
remove a justification, clear the check box next to it. To include a justification, select the
check box next to it.
■ Justification
The system label for the justification. This value appears in reports (for ordering and filtering
purposes), but the user does not see it. You can select the desired option from the drop-down
list.
■ Option Presented to End User
The justification text Symantec Data Loss Prevention displays in the notification. This value
appears in reports with the justification label. You can modify the default text as desired.
To add a new justification, select New Justification from the appropriate drop-down list. In the
Enter new justification text box that appears, type the justification name. When you save the
rule, the system includes the new justification as an option (in alphabetical order) in all
Justification drop-down lists.
Note: You should be selective in adding new justifications. Deleting new justifications is not
currently supported.
Allow user to enter Select this option to include a text box into which users can enter their own justification.
text explanation
Parameter Description
Language Select the language you want the response rule to execute on.
See “About Endpoint Prevent response rules in different locales” on page 1814.
See “Setting Endpoint Prevent response rules for different locales” on page 1815.
Response rule actions 1329
Configuring the Endpoint Prevent: User Cancel action
Parameter Description
Pre-timeout warning This field is required to notify users that they have a limited amount of time to respond to the
incident.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Post-timeout This field notifies users that the amount of time to override the policy has expired. The data
message transfer was blocked.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Display Alert Box This field is required for Endpoint User Cancel actions. Select this option to display an on-screen
with this message notification to the endpoint user.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Optionally, you can configure the on-screen notification to include user justifications as well as
the option for users to enter their own justifications.
You can also add hyperlinks to refer users to URLs that contain company security information.
To add hyperlinks you use standard HTML syntax, tags, and URLs. Tags are case-sensitive.
You can include insert hyperlinked text between regular text. For example, you would enter:
Insert Variable Select the variables that you want to include in the on-screen notification to the endpoint user.
You can select variables based on the following types:
■ Application
■ Content Name
■ Content Type
■ Device Type
■ Policy Name
■ Protocol
■ Timeout Counter
Note: You must use the Timeout Counter variable to display how much time remains before
blocking the data transfer.
Response rule actions 1330
Configuring the Endpoint Prevent: User Cancel action
Parameter Description
Allow user to choose Select this option to display up to four user justifications in the on-screen notification. When
explanation. the notification appears on the endpoint, the user is required to choose one of the justifications.
(If you select Allow user to enter text explanation, the user can enter a justification.) Symantec
Data Loss Prevention provides four default justifications, which you can modify or remove as
needed.
Available Justifications:
■ Check box
This option indicates whether to include the associated justification in the notification. To
remove a justification, clear the check box next to it. To include a justification, select the
check box next to it.
■ Justification
The system label for the justification. This value appears in reports (for ordering and filtering
purposes), but the user does not see it. You can select the desired option from the drop-down
list.
■ Option Presented to End User
The justification text Symantec Data Loss Prevention displays in the notification. This value
appears in reports with the justification label. You can modify the default text as desired.
To add a new justification, select New Justification from the appropriate drop-down list. In the
Enter new justification text box that appears, type the justification name. When you save the
rule, the system includes the new justification as an option (in alphabetical order) in all
Justification drop-down lists.
Note: You should be selective in adding new justifications. Deleting new justifications is not
currently supported.
Allow user to enter Select this option to include a text box into which users can enter their own justification.
text explanation.
Note: If the requesting client does not expect an HTML response, the Rejection
Message may not be displayed in the client browser. For example, a client
expecting an XML response to a Web post may only indicate a Javascript error.
Parameter Description
Bounce Message to Sender Enter the text that you want to appear in the SMTP error that Network Prevent
(Email) returns to the MTA. Some MTAs display this text in the message that
is bounced to the sender.
If you leave this field blank, the message does not bounce to the sender but
the MTA sends its own message.
Redirect Message to this Address If you want to redirect blocked messages to a particular address (such as the
Symantec Data Loss Prevention administrator), enter that address in this field.
If you leave this field blank, the bounced message goes to the sender only.
Parameter Description
Subject Select the type of modification to make to the subject of the message from the following options:
For example, if you want to prepend "VIOLATION" to the subject of the message, select Prepend
and enter VIOLATION in the text field.
Headers Enter a unique name and a value for each header you want to add to the message (up to three).
Response rule actions 1335
Configuring the Network Prevent for Web: Remove HTTP/S Content action
Parameter Description
Enable Email Select this option to enable integration with Symantec Messaging Gateway. When this option is
Quarantine enabled, Symantec Data Loss Prevention adds preconfigured x-headers to the message that
Connect inform Symantec Messaging Gateway that the message should be quarantined.
(Requires
For more information, see the Symantec Data Loss Prevention Email Quarantine Connect
Symantec
FlexResponse Implementation Guide.
Messaging
Gateway)
Note: Symantec Data Loss Prevention removes content for file uploads and, for
Network Prevent, Web mail attachments even for those sites that it does not
recognize for HTTP content removal.
Response rule actions 1336
Configuring the Network Protect: Copy File action
To configure the Network Prevent for Web: Remove HTTP/S Content action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1266.
2 Add the Network Prevent for Web: Remove HTTP/S Content action type
from the Actions list.
See “Configuring response rule actions” on page 1268.
3 Configure the action parameters.
See Table 42-28 on page 1336.
4 Click Save to save the configuration.
See “Manage response rules” on page 1264.
Table 42-28 Network Prevent for Web: Remove HTTP/S Content parameters
Field Description
Removal The message that appears in content (Web postings, Web mail, or files) from which the system has
Message removed confidential information. Only the recipient sees this message.
Fallback option The action to take if Network Prevent for Web cannot remove confidential information that was
detected in an HTTP or HTTPS post.
Rejection The message that Network Prevent for Web returns to a client when it blocks an HTTP or HTTPS
Message post. The client Web application may or may not display the rejection message, depending on how
the application handles error messages.
See “Response rule actions for Network Prevent detection” on page 1246.
To configure the Network Protect: Copy File response rule action
1 Configure a network file share and specify a location to copy files to.
See “Configuring Network Protect for file shares” on page 1671.
2 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1266.
3 Select the Network Protect: Copy File action type from the Actions list.
This action does not require you to configure any parameters.
See “Configuring response rule actions” on page 1268.
4 Click Save to save the configuration.
See “Manage response rules” on page 1264.
See “Implementing response rules” on page 1260.
Parameter Description
Marker File Select this option to create a marker text file to replace the original file. This action notifies the user
what happened to the file instead of quarantining or deleting the file without any explanation.
Note: The marker file is the same type and has the same name as the original file, as long as it is a
text file. An example of such a file type is Microsoft Word. If the original file is a PDF or image file, the
system creates a plain text marker file. The system then gives the file the same name as the original
file with .txt appended to the end. For example, if the original file name is accounts.pdf, the marker file
name is accounts.pdf.txt.
Marker Text Specify the text to appear in the marker file. If you selected the option to leave the marker file in place
of the remediated file, you can use variables in the marker text.
To specify marker text, select the variable from the Insert Variable list.
Note: When a file is encrypted, the file extension changes to .html You must
manually update any links that point to the original unencrypted file.
This response rule action is only available for Network Discover that is configured
for Network Protect.
See “Response rule actions for Network Prevent detection” on page 1246.
To configure the Network Protect: Encrypt File response rule action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1266.
2 Add the Network Protect: Encrypt File action type from the Actions list.
See “Configuring response rule actions” on page 1268.
3 Click Save to save the configuration.
See “Manage response rules” on page 1264.
See “Implementing response rules” on page 1260.
Section 6
Remediating and managing
incidents
■ Remediating incidents
Remediation Description
options
Role-based access Access to incident information in the Symantec Data Loss Prevention
control system can be tightly controlled with role-based access control.
Roles control which incidents a particular remediator can take action
on, as well as what information within that incident is available to
the remediator. For example, access control can be used to ensure
that a given remediator can act only on incidents originating within
a particular business unit. In addition, it might prevent that business
unit's staff from ever seeing high-severity incidents, instead routing
those incidents to the security department.
Severity level Incident severity is a measure of the risk that is associated with a
assignment particular incident. For example, an email message containing 50
customer records can be considered more severe than a message
containing 50 violations of an acceptable use policy. Symantec Data
Loss Prevention lets you specify what constitutes a severe incident
by configuring it at the policy rule level. Symantec Data Loss
Prevention then uses the severity of the incident to drive subsequent
responses to the incident. This process lets you prioritize incidents
and devote your manual remediation resources to the areas where
they are needed most.
Remediation Description
options
Automated incident A powerful feature of the Enforce Server is the ability to automatically
responses respond to incidents as they arise. For example, you can configure
the system to respond to a serious incident by blocking the offending
communication. You can send an email message to the sender's
manager. You can send an alert to a security event management
system. You can escalate the incident to the security department.
On the other hand, an acceptable use incident might be dispensed
with by sending an email message to the sender. Then you can
mark the incident as closed, requiring no further work. Between
these extremes, you can establish a policy that automatically
encrypts transmissions of confidential data to a business partner.
All of these scenarios can be handled automatically without user
intervention.
■ Add Note
■ Log to a Syslog Server
■ Send Email Notification
■ Set Status
The Enforce Server handles all of these steps, except for Smart Response. You
can handle incidents in an entirely automated way. You can reserve manual
intervention (Smart Response) for only the most serious incidents.
Remediating incidents 1344
Remediating incidents
Remediating incidents
When you remediate an incident, you can perform the following actions:
■ Set the incident’s status or severity.
■ Apply a Smart Response rule to the incident.
■ Set the incident’s custom attributes.
■ Add comments to the incident record.
■ Remediate incidents by going to an incident list or incident snapshot and selecting
actions to perform on one or more incidents.
■ Perform some combination of these actions.
You can import a solution pack during installation. Solution packs prepopulate
incident lists and incident snapshots with several remediation options and custom
attributes. For complete descriptions of all solution packs (including information
about all remediation options and custom attributes they contain), refer to the
documentation for each of the solution packs in the solutions packs directory in the
documentation.
To remediate incidents
1 Access an incident list or incident snapshot.
In incident lists, Symantec Data Loss Prevention displays available remediation
options in the Incident Actions drop-down menu. The menu becomes active
when you select one or more incidents in the list (with the check box). In incident
snapshots, Symantec Data Loss Prevention also displays the available
remediation options. You can set a Status or Severity from the drop-down
menus.
See “Viewing incidents” on page 1414.
You can also edit the Attributes and provide related information.
2 Take either of the following actions:
■ When you view an incident list, select the incident(s) to be remediated
(check the box). You can select incidents individually or select all incidents
on the current screen. Then select the wanted action from the Incidents
Actions drop-down menu. For example, select Incident Actions > Set
Status > Escalated.
Remediating incidents 1345
Executing Smart response rules
Note: Sending an email notification to the sender applies to SMTP incidents only.
Also, the notification addressees that are based on custom attributes (such as
"manager email") work correctly only if populated by the attribute lookup plug-in.
Delete Incidents Delete the selected incident(s) from the Symantec Data
Loss Prevention system.
Set Attributes Display the Set Attributes page so you can enter or
edit the attribute values for the selected incident(s).
■ Name
■ Email Address
Set Severity Change the severity that is set for the selected
incident(s) to one of the options under Set Severity.
Remediating incidents 1347
Response action variables
Run Smart Response Perform one of the listed responses on the selected
incident(s). When you click a response rule, the Execute
Response Rule page appears.
$APPLICATION_NAME$ Specifies the name of the application that is associated with the
incident.
$INCIDENT_SNAPSHOT$ The fully qualified URL to the incident snapshot page for the incident.
Remediating incidents 1348
Response action variables
$OCCURED_ON$ Specifies the date on which the incident occurred. This date may be
different than the date the incident was reported.
$POLICY_RULES$ A comma-separated list of one or more policy rules that were violated.
$PROTOCOL$ The protocol, device type, and target type of the incident, where
applicable.
$MONITOR_NAME$ Specifies the detection server or cloud detector that created the
incident.
$DATAOWNER_NAME$ The person responsible for remediating the incident. This field must
be set manually, or with one of the lookup plug-ins.
$DATAOWNER_EMAIL$ The email address of the person responsible for remediating the
incident. This field must be set manually, or with one of the lookup
plug-ins.
$DATAOWNER_NAME$ The person responsible for remediating the incident. This field must
be set manually, or with one of the lookup plug-ins.
$DATAOWNER_EMAIL$ The email address of the person responsible for remediating the
incident. This field must be set manually, or with one of the lookup
plug-ins.
$ENDPOINT_MACHINE$ The name of the endpoint computer that generated the violation.
$PATH$ The full path to the file in which the incident was found.
$FILE_NAME$ The name of the file in which the incident was found.
$PARENT_PATH$ The path to the parent directory of the file in which the incident was
found.
$QUARANTINE_PARENT_PATH$ The path to the parent directory in which the file was quarantined.
$TARGET$ The name of the target in which the incident was found.
$DATAOWNER_NAME$ The person responsible for remediating the incident. This field must
be set manually, or with one of the lookup plug-ins.
$DATAOWNER_EMAIL$ The email address of the person responsible for remediating the
incident. This field must be set manually, or with one of the lookup
plug-ins.
$ENDPOINT_MACHINE$ The name of the endpoint computer that generated the violation.
$DATAOWNER_NAME$ The person responsible for remediating the incident. This field must
be set manually.
$DATAOWNER_EMAIL$ The email address of the person responsible for remediating the
incident. This field must be set manually.
Chapter 44
Remediating Network
incidents
This chapter includes the following topics:
■ In the Recipient (URL) fields, addresses are represented as they have been
provided, which is usually a hostname and varies by protocol.
■ In the Sender fields, representation of addresses varies by protocol.
■ Normalized fields are used for IP-based filtering.
When IPv6 addresses appear in incident list filters, they follow these rules:
■ Addresses are normalized in the Source IP and Destination IP fields.
■ In the Recipient (URL) field, addresses are represented as they have been
provided in the Recipient (URL), Domain, and Sender fields.
■ Normalized fields are used for IP-based filtering.
When IPv6 addresses appear in incident details, they follow these rules:
■ Addresses are normalized in the Source IP and Destination IP fields.
■ In the Recipient (URL) field, addresses are represented as they have been
provided.
■ In the Sender field, addresses are represented as they have been provided.
■ Links to filtered lists behave like user input.
You can view normalized IPv6 addresses in an incident summary:
■ Addresses are summarized by the Source IP, Destination IP, Sender, and
Domain fields.
■ Normalization occurs for fields as it does in the incident details.
You can view non-normalized IPv6 addresses in an incident summary:
■ Addresses are summarized by the Source IP, Destination IP, Sender, and
Domain fields.
■ Normalization occurs for fields as it does in the incident details.
Note: Use caution when you click Select All. This action selects all incidents in the
report (not only those on the current page). Any incident command you subsequently
apply affects all incidents. To select only the incidents on the current page, select
the checkbox at top left of the incident list.
Incident information is divided into several columns. Click any column header to
sort alpha-numerically by that column's data. To sort in reverse order, click the
column header a second time. By default, Symantec Data Loss Prevention sorts
incidents by date.
Remediating Network incidents 1353
Network incident list
The Type column shows the icons that indicate the type of network incident.
Table 44-1 describes the icons.
Icon Description
SMTP
HTTP
HTTPS
FTP
NNTP
IM:MSN
IM:AIM
IM:Yahoo
TCP:custom_protocol
This column also indicates whether the communication was blocked or altered.
Table 44-2 shows the possible values.
Icon Description
Icon Description
Use the following links to learn more about the Network incident list page:
Viewing a summary of all network incidents See “Network summary report” on page 1362.
Common features of all Symantec Data Loss See “About incident reports” on page 1405.
Prevention reports
See “Common incident report features”
on page 1434.
Action Description
Run Smart Response Select to run a Smart Response rule that you
or your administrator configured. (To
configure a Smart Response rule, navigate
to Policy > Response Rules, click Add
Response Rule, and select Smart
Response.
Set Data Owner Set the data owner name or email address.
The data owner is the person responsible for
remediating the incident.
Icon Description
High
Medium
Remediating Network incidents 1357
Network incident snapshot
Icon Description
Low
■ Status
Current incident status.
The possible values are as follows:
■ New
■ In Process
■ Escalated
■ False Positive
■ Configuration Errors
■ Resolved
You or your administrator can add new status designations on the Attribute
Setup page.
See “Network incident list” on page 1351.
If you configured any Smart Response rules, Symantec Data Loss Prevention
displays the response options for executing the rules at the top of the page.
Depending on the number of Smart Response rules, a drop-down menu may also
appear.
See “Network incident snapshot” on page 1357.
■ Notes
■ Correlations
Information in this section is divided into the following categories (not all of which
appear for every incident type):
Remediating Network incidents 1360
Network incident snapshot—General information
Key Info The Key Info tab shows the policy that was violated in the
incident. It also shows the total number of matches for the
policy, as well as matches per policy rule. Click the policy
name to view a list of all incidents that violated the policy.
Click view policy to view a read-only version of the policy.
This section also lists other policies that the same file violated.
To view the snapshot of an incident that is associated with
a particular policy, click go to incident next to the policy
name. To view a list of all incidents that the file created, click
show all.
History View the actions that were performed on the incident. For
each action, Symantec Data Loss Prevention displays the
action date and time, the actor (a user or server), and the
action or the comment.
Notes View any notes that you or others have added to the incident.
Click Add Note to add a note.
Correlations You can view a list of those incidents that share attributes of
the current incident. For example, you can view a list of all
incidents that a single account generated. The Correlations
tab shows a list of correlations that match single attributes.
Click on attribute values to view lists of those incidents that
are related to those values.
You can view a list of custom attributes and their values, if any have been specified.
Click on attribute values to view an incident list that is filtered on that value. To add
new values or edit existing ones, click Edit. In the Edit Attributes dialog box that
appears, type the new values and click Save.
See “Setting the values of custom attributes manually” on page 1474.
See “Network incident snapshot” on page 1357.
If any of the severity columns contain totals, you can click on them to view a list of
incidents of the chosen severity.
See “Common incident report features” on page 1434.
See “About dashboard reports and executive summaries” on page 1407.
See “About incident reports” on page 1405.
See “Saving custom incident reports” on page 1418.
Chapter 45
Remediating Endpoint
incidents
This chapter includes the following topics:
Note: Endpoint reports show only the incidents that were captured by Endpoint
Prevent. Incidents that were captured by Endpoint Discover appear in Network
Discover reports.
Incident information is divided into several columns. Click any column header to
sort alpha-numerically by the data in that column. To sort in reverse order, click the
column header a second time. By default, Symantec Data Loss Prevention lists
incidents by date.
The report includes the following columns:
Remediating Endpoint incidents 1366
About endpoint incident lists
Email/SMTP
HTTP
HTTPS
FTP
IM: MSN
IM: Yahoo
Print/Fax
Clipboard
A response column that indicates whether Symantec Data Loss Prevention blocked
an attempted violation or notified the end user about the violation of confidential
data.
The possible values are as follows:
■ Blank if Symantec Data Loss Prevention did not block the violation or notify the
end user
■ A red icon indicates the violation was blocked by Symantec Data Loss
Prevention, by the user, or if the user cancel option time limit expired.
■ A notification icon indicates Symantec Data Loss Prevention notified the end
user about the violated confidential data policies. The notification icon also
appears if the user allowed the violating data transfer. The icon also appears if
the user cancel time limit option has expired and the default action is set to allow
data transfers.
The other columns of this section appear as follows:
Column Definition
Column Definition
■ High
■ Medium
■ Low
■ For information only
■ New
■ In Process
■ Escalated
■ False positive
■ Configuration Errors
■ Resolved
You or your administrator can add new status designations on the Attribute Setup
page.
See “Endpoint incident snapshot” on page 1368.
See “About incident remediation” on page 1341.
See “About incident reports” on page 1405.
See “Saving custom incident reports” on page 1418.
Current status and severity appear under the snapshot heading. To change one of
the current values, click on it and choose another value from the drop-down list. If
any action icon is associated, it also appears here.
If you have configured any Smart Response rules, Symantec Data Loss Prevention
displays a Remediation bar (under the Status bar). The Remediation bar includes
options for executing the rules. Depending on the number of Smart Response rules,
a drop-down menu may also appear.
The top left section of the snapshot displays general incident information. You can
click most information values to view an incident list that is filtered on that value.
Information in this section is divided into the following categories (not all of which
appear for every incident type):
Local drive
Network Share
Email/SMTP
HTTP
HTTPS/SSL
FTP
IM: MSN
IM: Yahoo
Print/Fax
Remediating Endpoint incidents 1370
Endpoint incident snapshot
Clipboard
Section Description
Section Description
File name Name of the file that violated the policy. The
file name field appears only for fixed-drive
incidents.
■ File Quarantined
■ Quarantine Failed
■ Quarantine Result Timeout
Section Description
FTP User Name The originating user name for violating FTP
transfers.
Data Owner Email Address The email address for the owner of the
confidential data.
Other sections of the incident snapshot are common across all Symantec Data
Loss Prevention products. These common sections include:
■ Incident snapshot matches
See “Incident snapshot matches section” on page 1439.
■ Incident snapshot policy section
See “Incident snapshot policy section” on page 1439.
■ Incident snapshot correlations section
See “Incident snapshot correlations tab” on page 1438.
■ Incident snapshot attributes section. (This section appears only if a system
administrator has configured custom attributes.)
See “Incident snapshot policy section” on page 1439.
■ Incident snapshot history section
See “Incident snapshot history tab” on page 1438.
The Endpoint incident snapshot also contains two sections that are not common
across other product lines. Those sections are:
■ Destination or protocol-specific information
See “Endpoint incident destination or protocol-specific information” on page 1375.
■ Reporting on Endpoint Prevent response rules
See “Reporting on Endpoint Prevent response rules” on page 1373.
Note: For Endpoint Discover, Quarantine incidents always take precedence over
Endpoint FlexResponse incidents.
FTP user name at the FTP Destination For FTP incidents, the user name at the FTP
destination is displayed.
Print Job Name For print/fax incidents, the print job name is
the file name of the printing job that generated
the incident.
Remediating Endpoint incidents 1376
Endpoint incident summary reports
Note: Endpoint reports show only the incidents that are captured by Endpoint
Prevent. Incidents from Endpoint Discover appear in Network Discover reports.
To view the primary and the secondary summary criteria available for the report,
go to the Summarize By link. Click Edit. In the Primary and Secondary drop-down
menus, Symantec Data Loss Prevention displays all of the criteria in alphabetical
order, followed by custom criteria your system administrator defined. You can select
criteria from the Primary and Secondary drop-down menus and then click Run
Now to create a new summary report. Summary reports take their name from the
Remediating Endpoint incidents 1377
Endpoint incident summary reports
primary summary criterion. If you rerun a report with new criteria, the report name
changes accordingly.
See “About filters and summary options for reports” on page 1441.
Summary entries are divided into several columns. Click any column header to sort
alpha-numerically by that column's data. To sort in reverse order, click the column
header a second time.
Field Description
Storage Discover scan details, go to Manage > Discover Scanning > Scan History,
then select one of the Discover scans from the list.
See “Managing Network Discover/Cloud Storage Discover target scans” on page 1608.
Table 46-1 lists the Network Discover/Cloud Storage Discover reports.
Report Navigation
Scan History (single This report is from the Enforce Server administration console,
target) Manage menu, Discover Scanning > Discover Targets. Click
the link in the Scan Status column to see the history of a particular
scan target.
Scan History (all This report is from the Enforce Server administration console,
targets) Manage menu, Discover Scanning > Scan History.
Scan Details This report is from the Enforce Server administration console,
Manage menu, Discover Scanning > Scan History. Click the link
in the Scan Status column to see the scan details.
You can create custom reports with combinations of filters and summaries to identify
the incidents to remediate.
See “About custom reports and dashboards” on page 1415.
Network Discover has the following types of reports:
■ Incident list
See “Discover incident lists” on page 1381.
■ Incident snapshot
See “Discover incident snapshot” on page 1385.
■ Incident summary
See “Discover summary reports” on page 1388.
You can select one or more incidents to which to apply commands from the
Incident Actions drop-down menu.
Click the checkbox at the top of the column or click Select All to select all
incidents on the current page.
Note: Use caution when you use Select All. This option selects all incidents in
the report, not only those on the current page. Any incident command you
subsequently apply affects all incidents. You may want to configure the
maximum-incident-batch-size property to limit the number of incidents that
a Server FlexResponse plug-in processes at one time.
See “Adding a Server FlexResponse plug-in to the plug-ins properties file”
on page 1635.
■ Type
Type of target in which the match was detected.
An icon represents each target type.
This column also displays a remediation icon, if any response rule applied.
The possible values are as follows:
Copied
Quarantined
Remediation Error
These same icons may appear for other incident types as well, and you can
execute Server FlexResponse actions on those incidents.
See “Configuring the Server FlexResponse action” on page 1290.
■ Location/Target/Scan
Repository or file location, target name, and date and time of most recent scan.
Remediating Discover incidents 1384
Discover incident entries
■ File Owner
Username of file owner (for example, MYDOMAIN\Administrator).
■ ID/Policy
The Symantec Data Loss Prevention incident number and the policy the incident
violated.
■ Matches
The number of matches in the incident.
■ Severity
Incident severity as determined by the severity setting of the rule the incident
matched.
The possible values are:
High
Medium
Low
■ Status
The current incident status.
The possible values are:
■ New
■ In Process
■ Escalated
■ False Positive
■ Configuration Errors
■ Resolved
The following icon may be displayed near the status if this incident was seen
before:
You or your administrator can add new status designations on the attribute setup
page.
See “Configuring custom attributes” on page 1473.
Remediating Discover incidents 1385
Discover incident snapshot
Remediation The latest remediation status of the file that generated the
Detection Status incident.
Scan The date and time of the scan that registered the incident.
Detection Date The date and time that the incident was detected.
Protect Status For Box incidents, displays the remediation status of the
content that generated the incident.
Seen Before No, if this incident was not previously detected. Yes, if this
incident was previously detected.
Remediating Discover incidents 1386
Discover incident snapshot
Is Hidden Displays the hidden state of the incident, whether or not the
incident is hideable, and lets you toggle the Do Not Hide flag
for the incident. See “About incident hiding” on page 1460.
URL For SharePoint, this URL is the item on the SharePoint server.
Click this URL to go to the item on the SharePoint server.
Extraction Date Date custom target adapter was run ( In the Firefox browser,
these links do not work without additional setup.
Notes Database Name of the IBM (Lotus) Notes database (Applies to IBM
(Lotus) Notes only.)
File Created The date and time that the file or item was created.
Last Modified Date and time of last change to the file or item.
Last Accessed Date and time of last user access to the file or item.
For SharePoint, this date is not valid.
Data Owner Name The person responsible for remediating the incident. This field
must be set manually, or with a lookup plug-in.
Data Owner Email The email address of the person responsible for remediating
Address the incident. This field must be set manually, or with a lookup
plug-in.
■ Access Information
See “Incident snapshot access information section” on page 1440.
For SharePoint incident snapshots, the permission levels show the
permissions from SharePoint, for example Contribute or Design. The list
in the incident snapshot shows only the first 50 entries. All the ACL entries
can be exported to a CSV file. The permissions are comma-separated. Users
or groups having Limited Access permission levels are not recorded or
shown.
■ Attributes
See “Incident snapshot attributes section” on page 1438.
■ History tab
Remediating Discover incidents 1388
Discover summary reports
Note: Use caution when you use Select All. This option selects all incidents in
the report, not only those on the current page. Any incident command you
subsequently apply affects all incidents.
■ Data Type
Specifies whether the incident is from a DAR Connector or a DIM Connector.
■ Location/Application/Detection Date
The location of the sensitive data, the application with which the incident is
associated, and the date on which the policy violation was detected.
■ User
Displays the information of the user associated with the incident, if applicable.
■ ID/Policy
The Symantec Data Loss Prevention incident number and the policy the incident
violated.
■ Matches
The number of matches in the incident.
■ Severity
Incident severity as determined by the severity setting of the rule the incident
matched.
The possible values are:
High
Medium
Low
■ Status
The current incident status. The possible values are:
■ New
■ In Process
■ Escalated
■ False Positive
■ Configuration Errors
Working with Cloud Connector incidents 1393
Application incident actions
■ Resolved
Is Hidden Displays the hidden state of the incident, whether or not the incident
is hideable, and lets you toggle the Do Not Hide flag for the incident.
See “About incident hiding” on page 1460.
Recipient For data uploads, the recipient is the site to which the data is
uploaded.
For data downloads, the recipient is the user who downloads the data.
Subject The subject field of the sensitive data. Click the subject link to view
all incidents with the same subject.
Data Owner The person responsible for remediating the incident. This field must
Name be set manually.
Click Data Owner Name to view a filtered list of incidents for that data
owner.
Data Owner The email address of the person responsible for remediating the
Email incident. This field must be set manually.
Address
Click Data Owner Email Address to view a filtered list of incidents
for that data owner email address.
Request ID The unique detection request identifier from the Cloud Service
Connector. You can use this identifier to track this incident in external
cloud consoles, such as Symantec CloudSOC.
User Name The name of the user who is associated with the incident.
User Specifies the type of user activity on the file. The possible activities
Activity are:
Type ■ Create
■ Edit
■ Rename
■ Delete
■ Upload/Download
■ Site/Application Details
Specifies the following details about the website or cloud application that is
associated with the DAR or DIM incident:
Application The name of the cloud application associated with the incident.
Name
Site Risk The site risk score provided by Blue Coat WSS, based on information
Score from the Global Intelligence Network.
■ User Details
This section provides the following details about the user who is associated
with the DAR or DIM incident:
User Threat Specifies the user threat score as provided by Symantec CloudSOC
score or Blue Coat WSS.
Documents Specifies the number of exposed documents for that user. Click More
Exposed Info to view document exposure information in your external cloud
Count console.
User Provides a link to user activity details in your external cloud console.
Activity
Document Specifies the number of times the document has been accessed.
Activity Count
File Folder Specifies the folder that contains the file. Click More Info to go to
exposures panel for that file.
Last Specifies the date and time the file was last modified.
Modified
File Activity Click More Info to view the file activity in your external cloud console.
Alert in Click More Info to view incident information in your external cloud
CASB console.
Connector Specifies the network protocol of the data transfer, such as https.
Source
Protocol
HTTP Method Specifies the HTTP method that was called when the incident was
created.
Working with Cloud Connector incidents 1398
Application summary reports
HTTP Lists any cookies that are associated with the incident.
Cookies
■ Message Body
Provides a link to the original JSON-formatted message.
■ History
See “Incident snapshot history tab” on page 1438.
■ Notes
The notes tab displays any notes for this incident.
■ Correlations
See “Incident snapshot correlations tab” on page 1438.
■ Matches
See “Incident snapshot matches section” on page 1439.
See “About Application incident reports” on page 1389.
■ Viewing dashboards
■ Viewing incidents
■ Filtering reports
Managing and reporting incidents 1401
■ Deleting incidents
■ Dashboards combine information from several reports. They include graphs and
incident totals representing the contents of various incident lists and summaries.
Graphs can sometimes contain lists of high-severity incidents or lists of summary
groups. You can click on report portlets (the individual tiles that contain report
data) to drill down to the detailed versions of the reports.
Symantec Data Loss Prevention ships with executive summaries for Network,
Endpoint, and Discover incidents.
Executive summaries are very similar to dashboards. The difference between
them is that you can customize a dashboard, but you cannot customize an
executive summary.
You can create and save customized versions of all reports (except executive
summaries) for continued use.
See “About custom reports and dashboards” on page 1415.
Symantec Data Loss Prevention displays reports in separate sections on the
Incident Reports screen as follows:
■ The Saved Reports section contains any shared reports that are associated
with your current role. This section appears only if you or other users in your
current role have created saved reports.
See “About custom reports and dashboards” on page 1415.
■ The Network section contains Symantec-provided incident lists, summaries,
and dashboards for network incidents.
■ The Endpoint section contains Symantec-provided incident lists, summaries,
and dashboards for endpoint incidents. Endpoint reports include the incidents
that Endpoint captures, such as Endpoint Block and Endpoint Notify incidents.
Incidents that Endpoint Discover captures appear in Discover reports.
■ The Discover section contains Symantec-provided incident lists, summaries,
and dashboards for Network Discover/Cloud Storage Discover and Endpoint
Discover incidents.
■ The Users section contains the user list and user risk summary, which displays
users and their associated Email and Endpoint incidents.
The executive monitors dashboards and summary reports (to get a general
picture of data loss trends in the organization). The executive also develops
programs and initiatives to reduce risk, and communicates this information to
policy authors and incident responders. The executive often monitors reports
through email or some other exported report format.
Symantec Data Loss Prevention dashboards and summary reports let you
monitor risk trends in your organization. These reports provide a high-level
overview of incidents. Executives and managers can quickly evaluate risk trends
and advise policy authors and incident responders how to address these trends.
You can view existing summary reports and dashboards and create customized
versions of these reports.
See “About dashboard reports and executive summaries” on page 1407.
See “About summary reports” on page 1412.
■ An incident responder, such as an InfoSec Analyst or InfoSec Manager, who
monitors and responds to particular incidents.
The responder monitors incident reports and snapshots to respond to the
incidents that are associated with a particular policy group, organizational
department, or geographic location. The responder may also author policies to
reduce risk. These policies can originate either at the direction of a risk reduction
manager or based on their own experience tracking incidents.
See “About incident remediation” on page 1341.
3 To display a report in the list, check the Show Report box for that report. To
remove a report from the list, clear Show Report for that report.
The selected list of reports displays in a left navigation panel for each of the
types of reports.
For example, to see the list of Network reports, on the Incidents menu, click
Network.
4 After changing your preferences, click Save.
See “About custom reports and dashboards” on page 1415.
Note: You can configure which reports appear in navigation panel. To do so, go to
All Reports and then click on Edit Preferences
Symantec Data Loss Prevention provides the following types of incident reports:
Incident lists These show individual incident records containing information such as
severity, associated policy, number of matches, and status. You can click
on any incident to view a snapshot containing more details. You can
select specific incidents or groups of incidents to modify or remediate.
Summaries These show incident totals organized by a specific incident attribute such
as status or associated policy. For example, a Policy Summary includes
rows for all policies that have associated incidents. Each row includes a
policy name, the total number of associated incidents, and incident totals
by severity. You can click on any severity total to view the list of relevant
incidents.
Double These show incident totals organized by two incident attributes. For
summaries example, a policy trend summary shows the total incidents by policy and
by week. Similar to the policy summary, each entry includes a policy
name, the total number of associated incidents, and incident totals by
severity. In addition, each entry includes a separate line for each week,
showing the week's incident totals and incidents by severity.
Managing and reporting incidents 1406
About incident reports
Dashboards and These are quick-reference dashboards that combine information from
executive several reports. They include graphs and incident totals representing the
summaries contents of various incident lists, summaries, and double summaries.
Graphs are sometimes beside lists of high-severity incidents or lists of
summary groups. You can click on constituent report names to drill down
to the reports that are represented on the dashboard.
Custom Lists the shared reports that are associated with your current role. (Such
reports appear only if you or other users in your current role have created
them.)
Endpoint Lists the Endpoint incident reports. Endpoint reports include incidents
such as Endpoint Block and Endpoint Notify incidents.
The folder risk report displays file share folders ranked by prioritized risk.
The risk score is based on the relevant information from the Symantec
Data Loss Prevention incidents plus the information from the VML
Management Server.
Users The User List lists the data users in your organization. The User Risk
Summary lists all users with their associated Email and Endpoint incidents.
Viewing dashboards
This procedure shows you how to view a dashboard.
To view a dashboard
1 In the Enforce Server administration console, on the Incidents menu, click
Incident Reports. Under Reports, click the name of a dashboard.
Dashboards consist of up to six portlets that each provide a summary of a
particular report.
For example, the Executive Summary-Network dashboard consists of portlets
for the Network Policy Summary, High Risk Senders, Protocol Summary,
Top Recipient Domains, Status by Week, and Incidents - All.
2 To see the entire report for a portlet, click the portlet.
Symantec Data Loss Prevention displays the appropriate incident list or
summary report.
3 Browse through the incident list or summary report.
See “Viewing incidents” on page 1414.
See “About summary reports” on page 1412.
Click Next.
4 In the General section, for Name, type a name for the dashboard.
5 For Description, type an optional description for the dashboard.
6 In the Delivery Schedule section, you can regenerate and send the dashboard
report to specified email accounts.
If SMTP is not set up on your Enforce Server, you do not see the Delivery
Schedule section.
If you have configured your system to send alerts and reports, you can set a
time to regenerate and send the dashboard report to specified email accounts.
See “Configuring the Enforce Server to send email alerts” on page 166.
If you have not configured Symantec Data Loss Prevention to send reports,
skip to the next step.
To set a schedule, locate the Delivery Schedule section and select an option
from the Schedule drop-down list. (You can alternatively select No Schedule.)
For example, select Send Weekly On.
Enter the data that is required for your Schedule choice. Required information
includes one or more email addresses (separated by commas). It may also
include calendar date, time of day, day of the week, day of the month, or last
date to send.
See “Delivery schedule options for dashboard reports” on page 1423.
7 For the Left Column, you can choose what to display in a pie chart or graph.
For the Right Column, you can also display a table of the information.
See “Choosing reports to include in a dashboard” on page 1411.
Select a report from as many as three of the Left Column (Chart Only)
drop-down lists. Then select a report from as many as three of the Right Column
(Chart and Table) drop-down lists.
Managing and reporting incidents 1410
Configuring dashboard reports
8 Click Save.
9 You can edit the dashboard later from the Edit Report Preferences screen.
To display a custom dashboard at logon, specify it as the default logon report
on the Edit Report Preferences screen.
See “Editing custom dashboards and reports” on page 1425.
3 In the Delivery Schedule section, you can regenerate and send the dashboard
report to specified email accounts.
If SMTP is not set up on your Enforce Server, you do not see the Delivery
Schedule section.
If you have configured your system to send alerts and reports, you can set a
time to regenerate and send the dashboard report to specified email accounts.
See “Configuring the Enforce Server to send email alerts” on page 166.
If you have not configured Symantec Data Loss Prevention to send reports,
skip to the next step.
To set a schedule, locate the Delivery Schedule section and select an option
from the Schedule drop-down list. (You can alternatively select No Schedule.)
For example, select Send Weekly On.
Enter the data that is required for your Schedule choice. Required information
includes one or more email addresses (separated by commas). It may also
include calendar date, time of day, day of the week, day of the month, or last
date to send.
See “Delivery schedule options for dashboard reports” on page 1423.
4 For the Left Column, you can choose what to display in a pie chart or graph.
For the Right Column, you can also display a table of the information.
See “Choosing reports to include in a dashboard” on page 1411.
Select a report from as many as three of the Left Column (Chart Only)
drop-down lists. Then select a report from as many as three of the Right Column
(Chart and Table) drop-down lists.
5 Click Save.
6 You can edit the dashboard later from the Edit Report Preferences screen.
To display a custom dashboard at logon, specify it as the default logon report
on the Edit Report Preferences screen.
See “Editing custom dashboards and reports” on page 1425.
are ranked with severity and match count. You can display a list of summary criteria
and associated incidents that highlight any high-severity incident totals.
You can choose up to three reports to include in the left column, and up to three
reports to include in the right column.
To choose reports to include
1 Choose a report from as many as three of the Left Column (Chart Only)
drop-down lists.
2 Choose a report from as many as three of the Right Column (Chart and
Table) drop-down lists.
3 After you configure the dashboard, click Save.
See “Configuring dashboard reports” on page 1410.
3 Select a criterion from the primary listbox, and an optional criterion from the
secondary listbox. For example, select Policy Group and then Policy. (Note
that options in the secondary listbox appear only after you choose an option
from the primary listbox.)
4 To create the summary report, click Apply.
Summary reports take their name from the primary summary criterion. If you
rerun a report with new criteria, the report name changes accordingly.
5 Save the report.
See “Saving custom incident reports” on page 1418.
Viewing incidents
Symantec Data Loss Prevention incident lists display the individual incident records
with information about the incidents. You can click on any incident to see a snapshot
containing more details. You can select specific incidents or groups of incidents to
modify or remediate.
Symantec Data Loss Prevention provides incident lists for Network, Endpoint, and
Discover incidents.
To view incidents
1 In the Enforce Server administration console, on the Incidents menu, select
one of the types of reports.
For example, select Discover. In the left navigation panel, click Incidents-All
Scans.
The incident list displays the individual incident records that contain information
such as severity, associated policy, number of matches, and status.
2 Optionally, use report filters to narrow down the incident list.
See “Filtering reports” on page 1417.
3 To view more details of a particular incident, click the incident.
The incident snapshot appears, displaying general incident information, matches
detected in the intercepted text, and details about policy, attributes, and incident
history.
You can also search for similar incidents from the Correlations tab.
4 Optionally, click through the incident snapshot to view more information about
the incident.
The following list describes the ways you can access more information through
the snapshot:
Managing and reporting incidents 1415
About custom reports and dashboards
■ You can find information about the policy that detected the incident. On the
Key Info tab, the Policy Matches section displays the policy name. Click
on the policy name to see a list of incidents that are associated with that
policy. Click view policy to see a read-only version of the policy.
This section also lists other violated policies with the same file or message.
When multiple policies are listed, you can see the snapshot of an incident
that is associated with a particular policy. Click go to incident next to the
policy name. To see a list of all incidents that the file or message created,
click show all.
■ You can view lists of the incidents that share various attributes with the
current incident. The Correlations tab shows a list of correlations that
match single attributes. Click on attribute values to see the lists of incidents
that are related to those values.
For example, the current network incident is triggered from a message from
a particular email account. You can bring up a list of all incidents that this
account created.
■ For most network incidents, you can access any attachments that are
associated with the network message. To do so, locate the Attachments
field in the Incident Details section of the snapshot and click the attachment
file name.
For a detailed description of incident snapshots and the actions you can perform
through them, see the online Help.
5 When you finish viewing incidents, you can exit the incident snapshot or incident
list, or you can choose one or more incidents to remediate.
See “Remediating incidents” on page 1344.
whether the report is shared or private and displays the report generation and
delivery schedule.
You can modify existing reports and save them as custom reports, and you can
also create custom dashboards. Custom reports and dashboards are listed in the
Saved Reports section of the navigation panel.
You can click any report on the list to re-run it with current data.
You can view and run custom reports for reports created by users who have any
of the roles that are assigned to you. You can only edit or delete the custom reports
that are associated with the current role. The only custom reports visible to the
Administrator are the reports that the Administrator user created.
A set of tables lists all the options available for filtering and summarizing reports.
See “About summary reports” on page 1412.
See “Summary options for incident reports” on page 1446.
See “General filters for reports” on page 1443.
See “Advanced filter options for reports” on page 1451.
Create Dashboard Lets you create a custom dashboard that displays summary data from
several reports you specify. For users other than the Administrator, this
option leads to the Configure Dashboard screen, where you specify
whether the dashboard is private or shared. All Administrator
dashboards are private.
Saved (custom) reports associated with your role appear near the top of the screen.
The following options are available for your current role's custom reports:
Click this icon next to a report to display the save report or configure
dashboard screen. You can change the name, description, or schedule,
or (for dashboards only) change the reports to include.
Click this icon next to a report to display the screen to change the
scheduling of this report. If this icon does not display, then this report
is not currently scheduled.
Click this icon next to a report to delete that report. A dialog prompts
you to confirm the deletion. When you delete a report, you cannot
retrieve it. Make sure that no other role members need the report before
you delete it.
Filtering reports
You can filter an incident list or summary report.
To filter an incident list
1 In the Enforce Server administration console, on the Incidents menu, select
one of the types of reports.
For example, select Network, and then click Policy Summary.
2 In the Filter area, current filters are displayed, as well as options for adding
and running other filters.
3 Modify the default filters as wanted. For example, from the Status filter
drop-down lists, select Equals and New.
For Network, and Endpoint reports, the default filters are Date and Status.
For Discover reports, default filters are Status, Scan, and Target ID.
4 To add a new filter, select filter options from the drop-down lists. Click
Advanced Filters & Summarization for additional options. Click Add Filter
on the right, for additional filter options.
Select the filter type and parameters from left to right as if writing a sentence.
For example, from the advanced filters, Add Filter options, select Policy and
Is Any Of, and then select one or more policies to view in the report. Hold
down Ctrl or Shift to select more than one item in the listbox.
Managing and reporting incidents 1418
Saving custom incident reports
3 In the Sharing section, users other than the administrator can share a custom
report.
The Sharing section lets you specify whether to keep the report private or
share it with other role members. Role members are other users who are
assigned to the same role. To share the report, select Share Report. All role
members now have access to this report, and all can edit or delete the report.
If your account is deleted from the system, shared reports remain in the system.
Shared reports are associated with the role, not with any specific user account.
If you do not share a report, you are the only user who can access it. If your
account is deleted from the system, your private reports are deleted as well.
If you log on with a different role, the report is visible on the All Reports screen,
but not accessible to you.
4 Click Save.
Auto - Send to incident data owners To send the report to the data owners, the
Send report data with emails setting must
be enabled for this option to appear.
Note: If your Enforce Server is not configured to send email, or you are not allowed
to send reports, the Schedule Delivery section does not appear.
When you make a selection from the list, additional fields appear.
To remove scheduling of a report that was previously scheduled, click the Remove
option.
The following table describes the additional fields available for each option on the
list.
Managing and reporting incidents 1422
Delivery schedule options for incident and system reports
■ Send To
Specify Manual to specify the email addresses.
Specify Auto for automatic sending to data owners.
■ To
Enter one or more email addresses. Separate them with commas.
■ CC
Enter one or more email addresses. Separate them with commas.
■ Subject
Provide a subject for the email.
■ Body
Enter the body of the email. Use variables for items such as the
policy name.
See “Response action variables” on page 1347.
One time Select One time to schedule the report to be run once at a future time,
and then specify the following details for that report:
■ Time
Select the time you want to generate the report.
■ Send Date
Enter the date you want to generate the report, or click the date
widget and select a date.
Daily Select Daily to schedule the report to be run every day, and then specify
the following details for that report:
■ Time
Select the time you want to generate the report.
■ Until
Enter the date you want to stop generating daily reports, click the date
widget and select a date, or select Indefinitely.
Weekly Select Weekly on to schedule the report to be run every week, and
then specify the following details for that report:
■ Time
Select the time you want to generate the report.
■ Days of Week
Click to check one or more check boxes to indicate the day(s) of
the week you want to generate the report.
■ Until
Enter the date you want to stop generating weekly reports, click the
date widget and select a date, or select Indefinitely.
Managing and reporting incidents 1423
Delivery schedule options for dashboard reports
Monthly Select Monthly on to schedule the report to be run every month, and
then specify the following details for that report:
■ Time
Select the time you want to generate the report.
■ Day of Month
Enter the date on which you want to generate the report each month.
■ Until
Enter the date you want to stop generating monthly reports, click
the date widget and select a date, or select Indefinitely.
Note: If your Enforce Server is not configured to send email, or you are not allowed
to send reports, the Delivery Schedule section does not appear.
When you make a selection from the Schedule drop-down list, additional fields
appear.
The following table describes the additional fields available for each option on the
list.
Once Select Once to schedule the report to be run once at a future time, and
then specify the following details for that report:
■ On
Enter the date you want to generate the report, or click the date widget
and select a date.
■ At
■ Send To
Send Every Day Select Send Every Day to schedule the report to be run every day,
and then specify the following details for that report:
■ At
Enter the date you want to stop generating daily reports, click the date
widget and select a date, or select Indefinitely.
■ Send To
Send Weekly On Select Send Weekly on to schedule the report to be run every week,
and then specify the following details for that report:
■ Day
Click to check one or more check boxes to indicate the day(s) of the
week you want to generate the report.
■ At
■ Until
Enter the date you want to stop generating weekly reports, click the
date widget and select a date, or select Indefinitely.
■ Send To
Send Monthly On Select Send Monthly on to schedule the report to be run every month,
and then specify the following details for that report:
Enter the date on which you want to generate the report each month.
■ At
■ Until
Enter the date you want to stop generating monthly reports, click the
date widget and select a date, or select Indefinitely.
■ Send To
To export a report
1 Click Incidents, and select a type of report.
2 Navigate to the report that you want to export. Filter or summarize the incidents
in the report, as desired.
See “Common incident report features” on page 1434.
3 Check the boxes on the left side of the incidents to select the incidents to
export.
4 In the Export drop-down, select Export All: CSV or Export All: XML
Note: See the current version of the Incident Reporting and Update API
Developers Guide for the location of the XML schema files for exported reports
and for a description of individual XML elements.
5 Click Open or Save. If you selected Save, a Save As dialog box opens, and
you can specify the location and the file name.
See “Exported fields for Network Monitor” on page 1426.
See “Exported fields for Endpoint Discover” on page 1428.
See “Exported fields for Network Discover/Cloud Storage Discover” on page 1427.
See “Printing incident reports” on page 1437.
See “Sending incident reports by email” on page 1436.
Matches The number of times that this item matches the detection parameters of a
policy rule.
Managing and reporting incidents 1427
Exported fields for Network Discover/Cloud Storage Discover
Data Owner The person responsible for remediating the incident. This field must be set
Name manually, or with one of the lookup plug-ins.
Data Owner The email address of the person responsible for remediating the incident.
Email This field must be set manually, or with one of the lookup plug-ins.
Type Target type (for example file system, Lotus Notes, or SQL Database).
Seen Before Was this incident previously seen? The value is Yes or No.
Matches The number of times that this item matches the detection parameters of a
policy rule.
Managing and reporting incidents 1428
Exported fields for Endpoint Discover
Last Date and time when the item was last modified.
Modified
Date
File Create Date and time when the item was created.
Date
Last Access Date and time when the item was last accessed (not shown for NFS targets).
Date
Data Owner The person responsible for remediating the incident. This field must be set
Name manually, or with one of the lookup plug-ins.
Data Owner The email address of the person responsible for remediating the incident.
Email This field must be set manually, or with one of the lookup plug-ins.
Matches The number of times that this item matches the detection parameters of a
policy rule.
Data Owner The person responsible for remediating the incident. This field must be set
Name manually, or with one of the lookup plug-ins.
Data Owner The email address of the person responsible for remediating the incident.
Email This field must be set manually, or with one of the lookup plug-ins.
Deleting incidents
Incident reporting performance often deteriorates when the number of incidents in
your system exceeds one million (1,000,000). Symantec recommends keeping your
incident count below this threshold by deleting incidents to maintain good system
performance.
Incident deletion is permanent: you can delete incidents, but you cannot recover
the incidents that you have deleted. Symantec Data Loss Prevention offers options
for deleting only certain parts of the data that triggered the incident.
After you have marked incidents for deletion, you can view, configure, run, and
troubleshoot the incident deletion process from the Enforce Server administration
console.
For information about deleting hidden incidents, See “Deleting hidden incidents”
on page 1463.
Managing and reporting incidents 1430
Deleting incidents
To delete an incident
1 On the Incident Report screen, select the incident or incidents you want to
delete, then click Incident Actions > Delete Incidents.
2 On the Delete Incidents screen, select from the following deletion options:
Delete incident Permanently deletes the incident(s) and all associated data (for
completely example, any emails and attachments). Note that you cannot
recover the incidents that have been deleted.
Retain incident, Retains the actual incident(s) but discards the Symantec Data
but delete Loss Prevention copy of the data that triggered the incident(s).
message data You have the option of deleting only certain parts of the associated
data. The rest of the data is preserved.
Delete Original Deletes the message content (for example, the email message
Message or HTML post). This option applies only to Network incidents.
Delete This option refers to files (for Endpoint and Discover incidents) or
Attachments/Files email or posting attachments (for Network incidents). The options
are:
Incident Data > Incident Deletion.This screen shows you the number of incidents
in the incident deletion queue, the deletion schedule, and a history of deletion jobs.
The incident deletion queue includes all incidents marked for deletion by all your
Symantec Data Loss Prevention users. In addition to viewing the number of incidents
marked for deletion, you can start and stop a deletion job manually from the incident
deletion queue.
You can view detailed information about your deletion jobs in the deletion jobs
history section, including the number of incidents and attachments or files deleted,
the job start and end time, the job duration, whether or not the job was stopped
manually, and the job status (Completed, Failed, or In Progress). In the case of
failed deletion jobs, you can click the Failed link to see the error message and
problem statement. This information may be useful to your Oracle database
administrator in troubleshooting the job failure. If this information is insufficient to
resolve your deletion job issues, you can export information from any job to a CSV
file and send it to Symantec Data Loss Prevention Support for additional help.
By default, the incident deletion job runs nightly at 11:59 P.M. in the Enforce Server's
local time zone. When the job runs, it also creates an event on the System >
Servers and Detectors > Events screen. This event is created whether or not any
incidents are actually deleted.
■ Monthly: Specify a day of the month and time for incident deletion jobs.
To accommodate differences between months, the day value must be
between 1 and 28.
3 Click Submit.
Note: The incident deletion job schedule is reset to the default value during the
upgrade process. If you are using a custom incident deletion job schedule,
reconfigure the schedule after the upgrade process is complete.
■ On Linux systems:
/opt/SymantecDLP/Protect/config/manager.properties
com.vontu.incident.deletion.progress.refreshRate=120000
3 Save and close the manager.properties file, then restart the Vontu Manager
service.
Managing and reporting incidents 1433
Deleting custom dashboards and reports
■ Discover
See “Discover summary reports” on page 1388.
Use the Show All link on an Incident List with caution when the system
contains more than 500 incidents. Browser performance degrades
drastically if more than 500 incidents are displayed on the Incident List
page.
Select All Selects all incidents on all pages, so you can update them all at once.
(Available only on Incident Lists.) Click Unselect All to cancel.
Note: Use caution when you choose Select All. This option selects all
the incidents in the report (not only those on the current page). Any
incident command that you subsequently apply affects all the incidents.
To select only the incidents on the current page, select the checkbox
at top left of the incident list.
Status Select Equals, Is Any Of, or Is None Of. Then select status
values. Hold down Ctrl and click to select more than one
separate status value. Hold down Shift and click to select a
range.
Scan For Discover reports, select the scan to report. You can select
the most recent scan, the initial scan, or a scan in progress.
Discover reports
All Scans is the default.
Target ID For Discover reports, select the name of the target to report.
All Targets is the default.
Click the Advanced Filters & Summarization bar to expand the section with filter
and summary options.
Click Add Filter to add an advanced filter.
Select a primary and optional secondary option for summarization. A single-summary
report is organized with a single summary criterion, such as the policy that is
associated with each incident. A double-summary report is organized with two
criteria, such as policy and incident status.
Note: If you select a condition in which you enter the content to be matched in the
text field, your entire entry must match exactly. For example, if you enter "apples
and oranges", that exact text must appear in the specified component for it to be
considered a match. The sentence "Bring me the apples and the oranges" is not
considered a match.
For a complete list of the report filter and summary options, see the Symantec Data
Loss Prevention Administration Guide.
See “Common incident report features” on page 1434.
See “Configuring the Enforce Server to send email alerts” on page 166.
To send a report
1 Click Incidents, and select a type of report.
2 Navigate to the report that you want to export. Filter or summarize the incidents
in the report, as desired.
See “Common incident report features” on page 1434.
3 Click Send in the upper right corner.
Alternatively, you can use the Send menu (above the filters).
See “Saving custom incident reports” on page 1418.
4 In the Send Report dialog box, specify the following options:
Note: This section appears only if a system administrator has configured custom
attributes.
Name Permission
The ACL contains a new line for each permission granted. The ACL only contains
one line for User 2 because User 2 only has one permission, to read the file. User
2 cannot make any changes to the file. User 1 has two entries because User 1 has
two permissions: reading the file and editing it.
You can view ACL information only on Discover and Endpoint local drive incident
snapshots. You cannot view ACL information on any other type of incidents.
The Access Information section appears on the Key Info tab of the incident
snapshot.
See “Discover incident snapshot” on page 1385.
See “Endpoint incident snapshot” on page 1368.
See “Network incident snapshot” on page 1357.
Managing and reporting incidents 1441
Customizing incident snapshot pages
General filters
Advanced filters
Summary options
General filters The general filter options are See “General filters for
the most commonly used. reports” on page 1443.
They are always visible in the
incident list report.
Advanced filters The advanced filters provide See “Advanced filter options
many additional filter options. for reports” on page 1451.
You must click the Advanced
Filters & Summarization
bar, and then click Add Filter
to view these filter options.
Summary options The summary options provide See “Summary options for
ways to summarize the incident reports” on page 1446.
incidents in the list. You must
click the Advanced Filters &
Summarization bar to view
these summary options.
Managing and reporting incidents 1443
General filters for reports
Symantec Data Loss Prevention contains many standard reports. You can also
create custom reports or save report summary and filter options for reuse.
See “About Symantec Data Loss Prevention reports” on page 1402.
Name Description
Equals The status is equal to the field that is selected in the next
drop-down.
Is Any Of The status can be any of the fields that are selected in the next
drop-down. Shift-click to select multiple fields.
Is None Of The status is none of the fields that are selected in the next
drop-down. Shift-click to select multiple fields.
Name Description
Current Month to Date All of the incidents that were reported for the current month up to
today's date.
Current Quarter to Date All of the incidents that were reported for the current quarter up
to today's date.
Managing and reporting incidents 1444
General filters for reports
Name Description
Current Week to Date All of the incidents that were reported for the current week.
Current Year to Date All of the incidents that have been reported for the current year
up to today's date.
Custom A custom time frame. Select the dates that you want to view from
the calendar menu.
Last 7 Days All of the incidents that were reported in the previous seven days.
Last 30 Days All of the incidents that were reported in the previous 30 days.
Last Month All of the incidents that were reported during the previous calendar
month.
Last Week All of the incidents that were reported during the previous calendar
week.
Last Quarter All of the incidents that were reported during the previous quarter.
Last Year All of the incidents that were reported during the last calendar
year.
Table 48-4 lists the general filter options by severity. Check the box to select the
severities to include in the filter.
These severity filters are available for Network, Endpoint, and Discover incidents.
Name Description
Info Lists only the incidents that are informational only. Informational
incidents are not assigned any other severity. Displays how many
informational incidents are in the incident list.
Name Description
Table 48-5 lists the general filter options for Network Discover scans. This filter is
only available for Discover incidents.
Name Description
All Scans All of the incidents that have been reported in all of the scans that
have been run.
Initial Scan All of the incidents that were reported in the initial scan.
In Process All of the incidents that have been reported in the scans that are
currently in progress.
Last Completed Scan All of the incidents that were reported in the last complete scan.
You can filter Discover incidents by Target ID. This filter is only available for Discover
incidents.
Select the target, or select All Targets. Shift-click to select multiple fields.
Table 48-6 lists the general filter options by detection date for Discover incidents.
Name Description
Current Month to Date All of the incidents that were reported for the current month up to
today's date.
Current Quarter to Date All of the incidents that were reported for the current quarter up
to today's date.
Current Week to Date All of the incidents that were reported for the current week.
Current Year to Date All of the incidents that have been reported for the current year
up to today's date.
Custom A custom time frame. Select the dates that you want to view from
the calendar menu.
Managing and reporting incidents 1446
Summary options for incident reports
Name Description
Custom Since The Symantec DLP Agents that have connected to the Endpoint
Server from a specific date to the present date. Select the date
where you want the filter to begin.
Custom Before The Symantec DLP Agents that have connected to an Endpoint
Server before a specific date. Select the final date for the filter.
Last 7 Days All of the incidents that were reported in the previous seven days.
Last 30 Days All of the incidents that were reported in the previous 30 days.
Last Month All of the incidents that were reported during the previous calendar
month.
Last Week All of the incidents that were reported during the previous calendar
week.
Last Quarter All of the incidents that were reported during the previous quarter.
Last Year All of the incidents that were reported during the last calendar
year.
Note: Hidden incidents are not included in report summaries unless the Advanced
filter option for the Is Hidden filter is set to Show All.
See “About incident hiding” on page 1460.
Discover
Discover
Discover
Agent Configuration Status Summarize the agent by the status of the Endpoint
configuration entity.
■ Current Configuration
The configuration on the agent is the same
as the configuration on the Endpoint Server.
■ Outdated Configuration
The configuration on the agent is different
than the configuration on the Endpoint
Server.
■ Unknown/deleted Configuration
The agents either cannot report which
configuration is installed, or the configuration
on the agent has been deleted from the
Endpoint Server.
Agent Response Filter incidents by how the agent has responded Endpoint
to the incident.
Application Window Title Filter the incidents by a string in the title of the Endpoint
window where the incident was generated.
Attachment File Name Filter incidents by the file name of the Network
attachment that is associated with the incident.
Attachment File Size Filter incidents by the size of the attachment that Network
is associated with the incident.
Box: Collaborator Role Filter incidents by the role of the Box Discover
collaborator. Roles include:
■ Co-owner
■ Editor
■ Previewer
■ Previewer Uploader
■ Uploader
■ Viewer
■ Viewer Uploader
Managing and reporting incidents 1453
Advanced filter options for reports
Box: Shared Link Download Allowed Filter incidents by the presence or absence of Discover
a shared link that allows downloads.
Box: Shared Link Expiration Date Filter incidents by the expiration date setting of Discover
a shared link.
Box: Shared Link Password Protected Filter incidents by the presence or absence of Discover
a password-protected shared link.
Content Root Filter the incidents by the content root path. Discover
Data Owner Email Address The email address of the person responsible for Network
remediating the incident. This field must be set
Endpoint
manually, or with a lookup plug-in.
Discover
Data Owner Name The person responsible for remediating the Network
incident. This field must be set manually, or with
Endpoint
a lookup plug-in.
Discover
Reports can automatically be sent to the data
owner for remediation.
Detection Date Filter the incidents by the date that the incident Discover
was detected.
Document Name Filter the incidents by the name of the violating Discover
document.
File Last Modified Date Filter the incidents by the last date when the file Endpoint
was modified.
Discover
File Location Filter the incidents by the location of the violating Endpoint
file.
File Name Filter the incidents by the name of the violating Endpoint
file. No wildcards, but you can specify a partial
Discover
match, for example .pdf.
File Owner Filter the incidents by the owner of the violating Discover
files.
File Size Filter the incidents by the size of the violating Endpoint
file.
Discover
Incident History Issuer Filter the incidents by the user responsible for Network
issuing the history of the incident.
Endpoint
Discover
Endpoint
Discover
Incident Match Count Filter the incidents by the number of incident Network
matches.
Endpoint
Discover
Discover
Incident Reported On Filter the incidents by the date that the incident Endpoint
was reported.
Managing and reporting incidents 1455
Advanced filter options for reports
Investigating State Filter the agents by the investigation state. You Discover
can select one of the following:
Endpoint
■ Investigating
■ Not Investigating
Is Hiding Allowed Filters the incidents based on the state of the Is Network
Hiding Allowed flag. Select the Is Any Of
Endpoint
operator from the second field, then select either
the Allow Hiding or Do Not Hide option from Discover
the third field.
Last Connection Time Filter agents according to the last time each Endpoint
agent connected to the Endpoint Server.
Network Prevent Action Filter the incidents by the action from Network Network
Prevent.
Policy Filter the incidents by the policy from which they Network
were created.
Endpoint
Discover
Managing and reporting incidents 1456
Advanced filter options for reports
Policy Group Filter the incidents by the policy group to which Network
they belong.
Endpoint
Discover
Policy Rule Filter the incidents by the policy rule that Network
generated the incidents.
Endpoint
Discover
Protect Status Filter the incidents by the Network Protect status Discover
of the incidents.
Protocol or Endpoint Destination Filter the incidents by the protocol or the Endpoint
endpoint destination that generated the incident.
Read ACL: File Filter the incidents by the File access control Endpoint
list.
Discover
Read ACL: Share Filter the incidents by the Share access control Discover
list.
Discover
Remediation Detection Status Filter the incidents by their remediation detection Discover
status.
Scanned Machine Filter the incidents by the computers that have Discover
been scanned.
Seen Before Filter the incidents on whether an earlier Discover, but not
connected incident exists. for SQL Database
incidents (where
Seen Before is
always false)
Managing and reporting incidents 1457
Advanced filter options for reports
Endpoint
Discover
Server or Detector Filter the incidents by the server on which they Network
were created.
Endpoint
Discover
SharePoint ACL: Permission Level Filter the incidents on the permission level of Discover
the SharePoint access control list.
SharePoint ACL: User/Group Filter the incidents on the user or group in the Discover
SharePoint access control list.
Target Type Filter the incidents by the type of target that is Discover
associated with the incidents.
Time Since First Detected Filter the incidents by how much time has Discover, but not
passed since the incident was first detected. for SQL Database
incidents
User Justification Filter the incidents by the justification that was Endpoint
input by the user.
User Name Filter the incidents by the user who generated Endpoint
the incident.
The second field in the advanced filters lets you select the match type in the filter.
Managing and reporting incidents 1458
Advanced filter options for reports
Name Description
Contains Any Of Lets you modify the filter to include any words in the text string,
or lets you choose from a list in the third field.
Contains Ignore Case Lets you modify the filter to ignore a specific text string.
Does Not Contain Lets you modify the filter to filter out the ignored text string.
Ignore Case
Does Not Match Exactly Lets you modify the filter to match on any combination of the text
string.
Ends with Ignore Case Lets you modify the filter so that only the incidents that end with
the ignored text string appear.
Is Any Of Lets you modify the filter so that the results include any of the
text string, or lets you choose from a list in the third field.
Is Between Lets you modify the filter so that the numerical results are
between a range of specified numbers.
Is Greater Than Lets you modify the filter so that the numerical results are greater
than a specified number.
Is Less Than Lets you modify the filter so that the numerical results are less
than a specified number.
Is None Of Lets you modify the filter so that the results do not include any
of the text string, or lets you choose from a list in the third field.
Is Unassigned Lets you modify the filter to match incidents for which the value
specified in the first field are unassigned.
Matches Exactly Lets you modify the filter to match exactly the text string.
Matches Exactly Ignore Lets you modify the filter so that the filter must match the ignored
Case text string exactly.
Starts with Ignore Case Lets you modify the filter so that only the incidents that start with
the ignored text string appear.
The third field in the advanced filters lets you select from a list of items, or provides
an empty box to enter a string.
This third field varies depending on the selections in the first and second fields.
For a list of items, use Shift-click to select multiple items.
For strings, wildcards are not allowed, but you can enter a partial string.
Managing and reporting incidents 1459
Advanced filter options for reports
For example, you can enter .pdf to select any PDF file.
If you do not know what text to enter, use the summary options to view the list of
possible text values. You can also see a summary of how many incidents are in
each category.
See “Summary options for incident reports” on page 1446.
Table 48-10 lists some of the options in the third field.
Name Description
Blocked The user was blocked from performing the action that cause the
incident.
None No action was taken regarding the violation that caused the
incident.
Protect File Copied The file in violation was copied to another location.
User Notified The user was notified that a violation had occurred.
Chapter 49
Hiding incidents
This chapter includes the following topics:
■ Hiding incidents
includes an entry for each time the Do Not Hide or Allow Hiding flags are set for
the incident.
See “Filtering reports” on page 1417.
Access to hiding functionality is controlled by roles. You can set the following user
privileges on a role to control access:
■ Hide Incidents—Grants permission for a user to hide incidents.
■ Unhide Incidents—Grants permission for a user to show hidden incidents.
■ Remediate Incidents—Grants permission for a user to set the Do Not Hide or
Allow Hiding flags.
See “About role-based access control” on page 94.
See “Hiding incidents ” on page 1461.
See “Unhiding hidden incidents ” on page 1461.
See “Preventing incidents from being hidden” on page 1462.
Hiding incidents
To hide incidents
1 Open the Enforce Server administration console and navigate to an incident
report.
2 Select the incidents you want to hide, either by selecting the incidents manually
or by setting filters or advanced filters to return the set of incidents that you
want to hide.
3 Click the Incident Actions button and select Hide/Unhide > Hide Incidents.
The selected incidents are hidden.
Note: You can allow incidents to be hidden that you have prevented from being
hidden by selecting the incidents and then selecting Hide/Unhide > Allow
Hiding from the Incident Actions button.
Note: You can allow an incident to be hidden that you have prevented from
being hidden by opening the incident snapshot and then clicking Allow Hiding
in the Incident Details section.
Hiding incidents 1463
Deleting hidden incidents
Delete incident Permanently deletes the incident(s) and all associated data (for
completely example, any emails and attachments). Note that you cannot
recover the incidents that have been deleted.
Retain incident, Retains the actual incident(s) but discards the Symantec Data
but delete Loss Prevention copy of the data that triggered the incident(s).
message data You have the option of deleting only certain parts of the associated
data. The rest of the data is preserved.
Delete Original Deletes the message content (for example, the email message
Message or HTML post). This option applies only to Network incidents.
Delete This option refers to files (for Endpoint and Discover incidents) or
Attachments/Files email or posting attachments (for Network incidents). The options
are All, which deletes all attachments, and attachments with no
violations. For example, choose this option to delete files (for
Endpoint and Discover incidents) or email attachments (for
Network incidents).
■ Status Values
The Status Values section lists the current incident status attributes that can
be assigned to a given incident. Use this section to create new status attributes,
modify them, and change the order that each attribute appears in drop-down
menus.
See “Configuring status attributes and values” on page 1466.
■ Status Groups
The Status Groups section lists the current incident status groups and their
composition. Use this section to create new status groups, modify them, and
change the group order they appear in drop-down menus.
See “Configuring status groups” on page 1467.
■ Custom Attributes on the Custom Attributes tab
The Custom Attributes tab provides a list of all of the currently defined custom
incident attributes. Custom attributes provide information about the incident or
associated with the incident. For example, the email address of the person who
caused the incident, that person's manager, why the incident was dismissed,
and so on. Use this tab to add, configure, delete, and order custom incident
attributes.
See “About custom attributes” on page 1470.
The process for handling incidents goes through several stages from discovery to
resolution. Each stage is identified by a different status attribute such as "New,"
"Investigation," "Escalated," and "Resolved." This lets you track the progress of the
incident through the workflow, and filter lists and reports by incident status.
The solution pack you installed when you installed Symantec Data Loss Prevention
provides an initial default set of status attributes and status attribute groups. You
can create new status attributes, or modify existing ones. The status attribute values
and status groups you use should be based on the workflow your organization uses
to process incidents. For example, you might assign all new incidents a status of
"New." Later, you might change the status to "Assigned," "Investigation," or
"Escalated." Eventually, most incidents will be marked as "Resolved" or as
"Dismissed."
For list and report filtering, you can also create status groups.
Based on the preferences of your organization and the commonly used terminology
in your industry, you can:
■ Customize the names of the status attributes and add new status attributes.
■ Customize the names of the status groups and add new status groups.
■ Set the order in which status attributes appear on the Status drop-down list of
an incident.
Working with incident data 1466
Configuring status attributes and values
■ Specify the default status attribute that is automatically assigned to new incidents.
See “Configuring status attributes and values” on page 1466.
See “About incident reports” on page 1405.
See “About incident remediation” on page 1341.
See “About custom attributes” on page 1470.
Action Procedure
Delete an incident status attribute. Click the attribute's red X and then confirm your
decision.
Change an incident status attribute. Click on the attribute you want to change, enter a
new name, and click Save.
Make an incident status attribute the Click [set as default] for an attribute to make it
default. the default status for all new incidents.
Change an incident status attribute's ■ Click [up] to move an attribute up in the order.
order in drop-down menus. ■ Click [down] to move an attribute down in the
order.
Working with incident data 1467
Configuring status groups
Action Procedure
Create a new incident status group. Click the Add Status Group button.
Delete an incident status group. Click the group's red X and then confirm your
decision.
Change the name or incident status Click on the group you want to change.Click the
attributes of a group. pencil icon. Change the name, check or uncheck
attributes, and click Save.
Change a status group's order in ■ Click [up] to move a group up in the order.
drop-down menus. ■ Click [down] to move a group down in the
order.
Working with incident data 1468
Export web archive
Field Description
Report to Export From the drop-down list, select the report that
you want to archive. Any reports you created
are available along with default report options.
The Network options are as follows:
After you complete the fields, click Create to compile the archive.
See “Export web archive” on page 1468.
■ Custom Attributes. The Custom Attributes tab provides a list of all of the
currently defined custom incident attributes. Use this tab to add, configure,
delete, and order custom incident attributes.
The solution pack you loaded when you installed Symantec Data Loss Prevention
provides an initial default set of custom attributes. The Custom Attributes tab
provides a list of all of the currently defined custom attributes that may be applied
to any incident. This tab is for creating, modifying, and deleting custom attributes
for your installation as a whole. Applying any of these custom attributes, or attribute
values, to an individual incident is done from the incident snapshot, or by using a
lookup plug-in.
On the Custom Attributes tab, you can perform the following functions:
Action Procedure
Delete a custom attribute. Click the attribute's red "X" and then confirm your
decision.
Change the name, email status, or Click on the attribute you want to change, change
attribute group of an attribute. its parameters, and Click Save.
Change the attributes order in 1 Click [up] to move an attribute up in the order.
drop-down menus.
2 Click [down] to move an attribute down in
the order.
Note: If the new lookup returns null or empty values for any custom attribute fields,
those empty values overwrite the existing values.
Note: To auto-populate custom attribute values, use one or more lookup plugins.
See “About lookup plug-ins” on page 1490.
3 To set a value for a custom attribute, enter the value in the appropriate attributes
field.
4 When you are finished setting values, click Save.
Chapter 51
Working with user risk
This chapter includes the following topics:
1 Create custom user attributes You can create custom attributes for filtering and working with user
risk summary reports. For example, you can create an attribute named
Employment Status to track the employment status of each of your
users. You can then import that information in a file that is exported
from your enterprise resource planning system, such as SAP.
2 Import user data You can import user data from an Active Directory connection or from
a CSV file. Incidents are associated with specific users by email
address and logon credentials. You can also upload files with your
custom attributes, such as information from your enterprise resource
planning system. Symantec Data Loss Prevention provides a CSV
template file that you can use to format any data you want to upload.
3 Configure IP address to user name Symantec Data Loss Prevention can resolve user names from IPv4
resolution addresses in HTTP/S and FTP incidents. The domain controller agent
queries Windows Events in the Microsoft Active Directory Security
Event Log of the domain controller. Symantec Data Loss Prevention
associates these Windows Events with user data in your database.
3 View the User List The User List is a list of all users in your system, including their email
address, domain, and logon name.
You can view details for specific users in the user snapshot.
4 View the User Risk Summary The User Risk Summary displays your users and their associated
Endpoint and Network incidents. Use the User Risk Summary to
drill into your user-centric incident data to help you find the
highest-risk users. You can sort and filter this list by policies, custom
attributes, incident status, incident severity, user name identified by
IP address, number of incidents, date, incident type, and user name.
5 Export user risk summary or user You can export data from the user risk summary and user snapshots
snapshot data. to a CSV file.
Using the information that is provided in the user risk summary, you can see who
the high-risk users are and determine the appropriate course of action to take. Such
actions might include:
■ Determining whether or not a user poses an active threat to your data security.
■ Applying additional policies to monitor a user's behavior more closely.
Working with user risk 1478
About user data sources
■ To filter the User Custom Attributes list, click Filters, then use the text
fields for ID or Attribute Name to enter a filter value.
■ To edit a custom attribute, click the attribute name or click the edit icon in
the Actions column, then edit the attribute in the User Attribute dialog
box.
■ To delete a custom attribute, click the delete icon in the Actions column.
4 The template file includes column headers for any custom attributes you have
defined.
To add custom attributes manually, create a new column for each attribute,
then populate the rows as appropriate.
You must enter the column headers in this format: ID[Attribute Name]. For
example, 1[Employment Status].
See “Defining custom attributes for user data” on page 1479.
5 Save the file (in .csv format) to a location on your Enforce Server.
To add a file-based user data source
1 In the Enforce Server administration console, go to System > Users > Data
Sources.
2 On the Data Source Management page, click Add > CSV User Source. The
Add CSV User Source dialog box appears.
3 In the Add CSV User Source dialog box, enter the following information:
■ Name: Specify a name for the data source.
■ File Path: Specify the path to the user data file. This file must be on the
Enforce Server.
■ Delimited by: Specify the delimiter for the file. Valid delimiters are comma,
pipe, semicolon, and tab.
■ Encoded by: Specify the character encoding format.
■ Error Threshold Percentage: Specify the percentage of user records that
can be invalid before the file is rejected and the import process fails. Records
with duplicate email addresses or logons count against the error threshold.
4 Click Submit.
(&
(objectClass=user)
(objectCategory=person)
(sAMAccountType=805306368)
(!
(|
(&
(sAMAccountType=805306368)
(sAMAccountName=-*)
)
(&
(sAMAccountType=805306368)
(sAMAccountName=_*)
)
)
)
)
Your Active Directory credentials must have permission to access the following
user attributes:
FIRST_NAME givenName
LAST_NAME sn
EMAIL mail
LOGIN_NAME sAMAccountName
TELEPHONE telephoneNumber
TITLE title
COUNTRY co
DEPARTMENT department
EMPLOYEE_ID employeeId
STREET_ADDRESS streetAddress
LOCALITY_NAME l
POSTAL_CODE postalCode
STATE_OR_PROVINCE st
OBJECT_DISINGUISHED_NAME distinguishedName
Your Active Directory credentials must also have permission to access the RootDSE
record. Symantec Data Loss Prevention reads these attributes from RootDSE:
namingContexts
defaultNamingContext
rootDomainNamingContext
configurationNamingContext
Working with user risk 1483
About user data sources
schemaNamingContext
isGlobalCatalogReady
highestCommittedUSN
(&(region=North America)(!systemAccount=true))
4 Click Submit.
Note: A best practice is that you should refer to directory connection objects with
baseDNs in the user section of your directory tree. For example:
ou=Users,dc=corp,dc=company,dc=com.
4 Click Submit.
To import a data source manually
1 In the Enforce Server administration console, go to System > Users > Data
Sources.
2 On the Data Source Management page, select the data source you want to
import.
3 Click Import.
To view data source import details
1 In the Enforce Server administration console, go to System > Users > Data
Sources.
2 On the Data Source Management page, click the Status link for your desired
data source.
The Import Details dialog box appears.
3 The Import Details dialog box displays the following information for all imports:
■ Name: The name of the imported data source.
■ Status: Done, Completed with Errors, Failed.
■ Queued at: The time that the data source import was entered in the import
queue.
■ Started at: The start time of the data source import.
■ Completed at: The completion time of the data source import.
For successful imports and imports completed with errors, the Import Details
dialog box displays the following additional information:
■ Added records: The number of added user records.
Working with user risk 1485
About identifying users in web incidents
Note: Symantec Data Loss Prevention supports the use of multiple domain
controllers.
Prevention associates these Windows Events with user data in your database. The
IPv4 address data from the domain controller may not correspond precisely to a
given user. If you have any doubt that the resolved username is correct, verify that
the user was logged in at the time of the incident before taking any incident response
actions.
The user identification lookup job on the Enforce Server checks the database for
new events from the domain controller every day at 4:00 A.M. by default.
Symantec Data Loss Prevention stores the user records received from the domain
controller agent in the Symantec Data Loss Prevention database. User records are
purged every 3 days by default.
To set the Mapping Schedule and enable User Identification
1 Click Configure from the System > Incident Data > User Identification page.
2 Click Once, Daily, Weekly, or Monthly to schedule a mapping job. The default
is No Regular Schedule. Scheduling must be configured to enable mapping.
3 Click Save when you are done.
To set up data retention parameters
1 Go to the System > Incident Data > User Identification > Configure page.
2 The default time for the system to keep user login events is 3 days. If you want
to change this value, enter another value in the User data retention field.
3 Click Save when you are done.
To specify the domain controller warning schedule
1 Go to the System > Incident Data > User Identification > Configure page.
2 Specify the domain controller warning in days. This is the number of days since
the last connection of a domain controller. The default is 8 days.
3 Click Save when you are done.
If you want to discontinue use of User Identification, you need to stop the mapping
job. If you don't stop the mapping job, it continues to run, even if the domain
controllers are in a suspended state.
To stop scheduled mapping
1 Go to the System > Incident Data > User Identification > Configure page.
2 Check the box next to Stop mapping. Suspending mapping does not stop any
jobs that are in progress.
3 Click Save when you are done.
Working with user risk 1487
Viewing the user list
3 To filter the list, select your filter values using the options above the user risk
summary list:
Attributes None (0) Enter up to two custom attributes to filter the list.
Select the attribute from the drop-down list, then
specify an include or exclude condition and enter
your desired values. To add a second attribute filter,
click Add Attribute Filter.
Include All You can filter the list by incident severity. You must
select at least one severity level.
"Manager Email" from an LDAP server. The plug-in populates the custom attributes
and displays them in the Incident Snapshot.
See “About custom attributes” on page 1470.
See “About using custom attributes” on page 1472.
See “How custom attributes are populated” on page 1472.
Type Description
CSV The CSV Lookup Plug-in lets you retrieve incident data from a comma-separated values (CSV)
file uploaded to the Enforce Server. You can configure one CSV Lookup Plug-in per Enforce Server
instance.
LDAP The LDAP Lookup Plug-in lets you retrieve incident data from a directory server, such as Microsoft
Active Directory, Oracle Directory Server, or IBM Tivoli. You can configure multiple instances of
the LDAP Lookup Plug-in.
Script The Script Lookup Plug-in lets you write a script to retrieve incident data from any external resource.
For example, you can use a Script Lookup Plug-in to retrieve incident data from external resources
such as proxy log files or DNS systems. You can configure multiple instances of the Script Lookup
Plug-in.
Data Insight The Data Insight Lookup Plug-in lets you retrieve incident data from Symantec Data Insight so
that you can locate and manage data at risk. You can configure one Data Insight Lookup Plug-in
per Enforce Server instance.
Custom (Legacy) The Custom (Legacy) Lookup Plug-in lets you use Java code to retrieve incident data from any
external resource.
can use the output from such scripts to populate custom attributes in incident
records.
Unlike the CSV or LDAP Lookup Plug-ins, the Script Lookup Plug-In does not use
in-line attribute maps to specify how to look up parameter keys. Instead, you write
this functionality into each script as needed.
To implement a Script Lookup Plug-In , you can use any scripting language that
reads standard input (stdin) and writes standard output (stdout). The examples
in the user interface and in this documentation use Python version 2.6.
See “Configuring advanced plug-in properties” on page 1509.
Note: Custom (Legacy) Lookup Plug-Ins should only be used for migrating legacy
lookup plug-ins implemented using the Java Lookup API. Support for new Custom
Java Lookup Plug-Ins are not supported.
Implementing lookup plug-ins 1494
About lookup plug-ins
unnecessary database queries, you should only enable attribute groups that your
lookup plug-ins require.
Because the plug-in stops searching after it finds the first matching lookup parameter
key-value pair, the order in which you list the keys in your attribute map is significant.
Refer to the attribute mapping examples for the specific type of plug-in you are
implementing.
See “Selecting lookup parameters” on page 1500.
3. An LDAP Lookup Plug-in uses the result of the CSV lookup to obtain data from
a corporate LDAP directory.
See “Chaining lookup plug-ins” on page 1506.
See “Chaining multiple Script Lookup Plug-Ins” on page 1532.
In this case, check the plug-in at the System > Lookup Plugins screen and
manually configure it following the instructions provided with this documentation.
Refer to the Symantec Data Loss Prevention Release Notes for known issues
related to the upgrade of lookup plug-ins.
Step Description
1 Decide what external data you want to extract and load into incidents as custom attributes.
2 Identify the sources from which custom attribute data is to be obtained and the appropriate
lookup plug-in for retrieving this information.
Step Description
3 Create a custom attribute for each individual piece of external data that you want to include in
incident snapshots and reports.
4 Determine which lookup parameter groups include the specific lookup parameters you need
to extract the relevant data from the external sources.
5 Configure the plug-in to extract data from the external data source and populate the custom
attributes.
8 Verify privileges. The end user must have Lookup Attribute privileges to use a lookup plug-in
to look up attribute values.
9 Generate an incident. The incident must be of the type that exposes one or more incident
attributes that you have designated as parameter keys.
10 View the incident details. For the incident you generated, go to the Incident Snapshot screen.
In the Attributes section, you should see the custom attributes you created. Note that they are
unpopulated (have no value). If you do not see the custom attributes, verify the privileges and
that the custom attributes were created.
Implementing lookup plug-ins 1498
Implementing and testing lookup plug-ins
Step Description
11 If the lookup plug-in is properly implemented, you see the Lookup button available in the
Attributes section of the Incident Snapshot. Once you click Lookup you see that the value
for each custom attribute is populated. After the initial lookup, the connection is maintained and
subsequent incidents will have their custom attributes automatically populated by that lookup
plug-in; the remediator does not need to click Lookup for subsequent incidents. If necessary
you can reload the plug-ins.
Action Description
Modify Plugin Chain Select this option to enable (deploy) plug-ins and to set the order of lookup for multiple
plug-ins.
Lookup Parameters Select this option to choose which lookup parameter groups to use as keys to
populate attribute fields from external data sources.
Reload Plugins Select this option to refresh the system after making changes to enabled plug-ins
or if the external data is updated. This action automatically performs the enabled
lookups in order and populates the incidents as they are created.
For each configured lookup plug-in, the system displays the following information
at the Lookup Plugins List Page. You use this information to manage lookup
plug-ins.
Execution Sequence This field displays the order in which the system executes lookup plug-ins.
Name This field displays the user-defined name of each lookup plug-in.
Type The field displays the type of lookup plug-in. You can configure one CSV and one
Data Insight Lookup Plug-in per Enforce Server instance. You can configure multiple
instances of the LDAP, Script, and Custom (Legacy) lookup plug-ins.
Description This field displays the user-defined description of each lookup plug-in.
Status The field displays the state of each lookup plug-in, either On (green) or Off (red).
To edit the state of a plug-in, click Modify Plugin Chain.
For each configured lookup plug-in, you can perform the following management
functions at the Lookup Plugins List Page.
Action Description
Edit Click the pencil icon in the Actions column to edit the plug-in.
Delete Click the X icon in the Actions column to delete the plug-in. You must confirm or
cancel the action to execute it.
Group Group the plug-ins according to the selected display column. For example, where
you have multiple plug-ins, it may be useful to group them by Type or by Status.
Implementing lookup plug-ins 1500
Implementing and testing lookup plug-ins
CSV
LDAP
Script
Data Insight
Custom (Legacy)
Lookup parameter keys are organized into attribute groups. Selections made at
this screen apply to all lookup plug-ins deployed on the Enforce Server.
To perform a lookup, you must map at least one lookup parameter key to a field in
your external data source. Each lookup parameter group that you enable is a
separate database query for the Enforce Server to perform. All database queries
are executed for each incident before lookup. To avoid the performance impact of
unnecessary database queries, you should only enable attribute groups that your
lookup plug-ins require.
Because the plug-in stops searching after it finds the first matching lookup parameter
key-value pair, the order in which you list the keys in your attribute map is significant.
Refer to the attribute mapping examples for the specific type of plug-in you are
implementing for details.
See “About lookup parameters” on page 1494.
To enable one or more lookup parameter keys
1 Navigate to System > Lookup Plugins in the Enforce Server administration
console.
2 Click Lookup Parameters at the Lookup Plugins List Page.
3 Select (check) one or more attribute groups at the Edit Lookup Plugin
Parameters page.
Click View Properties to view all of the keys for that attribute group.
■ Attachment Table 52-6
■ Incident Table 52-7
■ Message Table 52-8
■ Policy Table 52-9
■ Recipient Table 52-10
■ Sender Table 52-11
■ Server Table 52-12
■ Monitor Table 52-13
■ Status Table 52-14
■ ACL Table 52-15
attachment-nameX Name of the attached file, where X is the unique index to distinguish between
multiple attachments, for example: attachment-name1, attachment-size1;
attachment-name2, attachment-size2; etc.
attachment-sizeX Original size of the attached file, where X is the unique index to distinguish
between multiple attachments. See above example.
date-detected Date and time when the incident was detected, for example:
date-detected=Tue May 15 15:08:23 PDT 2012.
incident-id The incident ID assigned by Enforce Server. The same ID can be seen in the
incident report. For example: incident-id=35.
protocol The name of the network protocol that was used to transfer the violating message,
such as SMTP and HTTP. For example: protocol=Email/SMTP.
data-owner-name The person responsible for remediating the incident. This attribute is not populated
by the system. Instead, it is set manually in the Incident Details section of the
Incident Snapshot screen, or automatically using a lookup plug-in.
Reports based on this attribute can automatically be sent to the data owner for
remediation.
data-owner-email The email address of the person responsible for remediating the incident. This
attribute is not populated by the system. Instead, it is set manually in the Incident
Details section of the Incident Snapshot screen, or automatically using a lookup
plug-in.
date-sent Date and time when the message was sent if it is an email. For example:
date-sent=Mon Aug 15 11:46:55 PDT 2011.
file-create-date Date that the file was created in its current location, whether it was originally
created there, or copied from another location. Retrieved from the operating
system.
Implementing lookup plug-ins 1503
Implementing and testing lookup plug-ins
file-modified-by Fully-qualified user credential for the computer where the violating copy action
took place.
file-owner The name of the user or the computer where the violating file is located.
discover-extraction-date Date a subfile was extracted from an encapsulated file during Discover scanning.
endpoint-volume-name The name of the local drive where an endpoint incident occurred.
endpoint-dos-volume-name The Windows name of the local drive where an endpoint incident occurred.
endpoint-application-name Name of application most recently used to open (or create) the violating file.
endpoint-application-path Path of the application that was used to create or open the violating file.
policy-name The name of the policy that was violated, for example: policy-name=Keyword
Policy.
Implementing lookup plug-ins 1504
Implementing and testing lookup plug-ins
recipient-emailX The email address of the recipient, where X is the unique index to distinguish
between multiple recipients; for example: recipient-email1,
recipient-ip1, recipient-url1; recipient-email2, recipient-ip2,
recipient-url2; etc.
recipient-ipX The IP address of the recipient, where X is the unique index to distinguish
between multiple recipients. See above example.
recipient-urlX The URL of the recipient, where X is the unique index to distinguish between
multiple recipients. See above example.
sender-email The email address of the sender for Network Prevent for Email (SMTP) incidents.
sender-ip The IP address of the sender for Endpoint and Network incidents on protocols
other than SMTP.
sender-port The port of the sender for Network incidents on protocols other than SMTP.
endpoint-user-name The user who was logged on to the endpoint when the violation occurred.
server-name The name of the detection server that reported the incident. This name is
user-defined and entered when the detection server is deployed. For example:
server-name=My Network Monitor.
monitor-name The name of the detection server that reported the incident. This name is
user-defined and entered when the detection server is deployed. For example:
server-name=My Network Monitor.
monitor-host The IP address of the detection server that reported the incident. For example:
monitor-host=127.0.0.1
Implementing lookup plug-ins 1505
Implementing and testing lookup plug-ins
monitor-id The system-defined numeric identifier of the detection server. For example:
monitor-id=1.
acl-principalX A string that indicates the user or group to whom the ACL applies.
acl-typeX A string that indicates whether the ACL applies to the file or to the share.
acl-grant-or-denyX A string that indicates whether the ACL grants or denies the permission.
acl-permissionX A string that indicates whether the ACL denotes read or write access.
Note: Administrators can also reload lookup plug-ins from the Custom
Attributes tab of the System > Incident Data > Attributes screen.
Problem Solution
Lookup plug-in fails to load If the plug-in failed to load, search for a message in the log file similar to the following:
SEVERE
[com.vontu.enforce.workflow.attributes.AttributeLookupLoader]
Error loading plugin [<Plugin_Name>]
Note the "Cause" section that follows this type of error message. Any such entries
will explain why the plug-in failed to load.
Attributes are not populated by If the plug-in loads but attributes are not populated, look in the log for the attribute
the lookup map. Verify that values are being populated, including for the lookup parameters that
you enabled. To do this, search for a lookup parameter key that you have enabled,
such as sender-email.
11 Search for the name of the lookup plug-in. You should see several messages.
12 If necessary, verify the lookup plug-in logging properties in file
\Protect\config\ManagerLogging.properties.
com.vontu.logging.ServletLogHandler.level=FINEST
com.vontu.enforce.workflow.attributes.CustomAttributeLookup.level=FINEST
com.vontu.lookup.level=FINEST
However, this property lets you modify the output of the Data
Owner Name and Data Owner Email attributes based on
retrieved values. These parameters are specified in lookup plug-in
configurations and scripts using the same syntax as custom
attributes. Both attributes are enabled by selecting the Incident
attribute group.
AttributeLookup.auto true The automatic lookup property specifies whether the lookup
should be triggered automatically when a new incident is detected.
This property automatically populates incident attributes using
the deployed lookup plug-ins after the initial lookup is executed.
AttributeLookup.reload false The automatic plug-in reload property specifies whether all
plug-ins should be automatically reloaded each day at 3:00 A.M.
Change to true to enable.
1 Create custom attributes. Define the custom attributes for the information you want to look up.
See “Setting the values of custom attributes manually” on page 1474.
2 Create the CSV data source file. The CSV file that contains the data to be used to populate custom
attributes for incident remediation.
3 Create a new CSV plug-in. See “Creating new lookup plug-ins” on page 1500.
4 Name and describe the plug-in. The name string limited to 100 characters. It is recommended that you
enter a description for the lookup plug-in.
5 Specify the file path. Provide the path to the CSV file. The CSV file must be local to the Enforce
Server.
6 Choose the File Delimiter. Specify the delimiter that is used in the CSV file. The pipe delimiter [|] is
recommended.
8 Map the attributes. Map the system and the custom attributes to the CSV file column heads
and define the keys to use to extract custom attribute data. Keys map to
column heads, not custom attributes.
attr.attribute_name=column_head
keys=column_head_first:column_head_next:column_head_3rd
See “Mapping attributes and parameter keys to CSV fields” on page 1514.
9 Save the plug-in. Verify that the correct save message for the plug-in is displayed.
9 Select the Lookup Parameter Define the keys which are used to extract custom attribute data.
Keys.
See “Selecting lookup parameters” on page 1500.
10 Enable the lookup plug-in. The CSV Lookup Plug-In must be enabled on the Enforce Server.
11 Troubleshoot the plug-in. See “Testing and troubleshooting the CSV Lookup Plug-In ” on page 1516.
Implementing lookup plug-ins 1512
Configuring the CSV Lookup Plug-In
email|first_name|last_name|domain_user_name|user_name|department|manager|manager_email
[email protected]|John|Smith|CORP\jsmith1|jsmith1|Accounting|Mei Wong|[email protected]
■ If more than 10% of the rows in the CSV file violate any of these requirements,
the Plugin does not load.
■ For accuracy in the lookup, the CSV file needs to be kept up to date.
See “About the CSV Lookup Plug-In ” on page 1492.
■ C:/SymantecDLP_csv_lookup_file/senders2.csv
On Windows you can use either forward or backward slashes. For example:
C:/SymantecDLP/Protect/plugins/employees.csv or
C:\SymantecDLP\Protect\plugins\employees.csv. On Linux you can only use
forward slashes.
The system validates the file path when you save the configuration. If the system
cannot locate the file it reports and error and does not let you save the configuration.
Make sure that the CSV file is not open and is stored locally to the Enforce Server.
attr.Store-ID=store-id
attr.Store\ Address=store_address
attr.incident-id=incident-id-key
attr.sender-email=sender-email-key
keys=sender-email-key:incident-id-key
With this example in mind, adhere to the following syntactical rules when mapping
the attributes to CSV file data.
attr.attribute\ name=column\ head Blank spaces in attribute and column names must
be preceded by a backslash.
attr.attribute_name=column_head
attr.attribute_name=column_head
attr.sender-email = Email
attr.endpoint-user-name = Username
attr.file-owner = File-owner
attr.sender-ip = IP
keys = Email:Username:File-owner:IP
4 If the plug-in fails to load, or the plug-in fails to return looked up values, check
the file \SymantecDLP\Protect\logs\tomcat\localhost.<latest-date>.log.
■ Check that the database and table are created and that the CSV file is
loaded into the table. To verify, look for lines similar to the following:
INFO [com.vontu.lookup.csv.CsvLookup]
creating database
create table using SQL
importing data from file into table LOOKUP having columns
Note: To process large files, the CSV Lookup Plug-In uses an in-memory
database (Apache Derby). Only one instance of Derby can be running per
Enforce Server. If a previous instance is running, the CSV Lookup Plug-In
does not load. If the database and table are not created, restart the Vontu
Manager service and reload the plug-in.
Look for a warning message indicating that "SQL query did not return any
results." In this case, make sure that the attribute mapping matches the CSV
column heads and reload the plug-in if changes were made.
See “Troubleshooting lookup plug-ins” on page 1507.
SENDER|MGR|DEPT|EMAIL
[email protected]|Merle Manager|Engineering|[email protected]
3 Save the CSV file to the same volume drive where the Enforce Server is
installed.
For example:
C:\SymantecDLP\Protect\plugins\lookup\csv_lookup_file.csv.
attr.sender-email=SENDER
attr.Manager=MGR
attr.Department=DEPT
attr.Email\ Address=EMAIL
keys=SENDER
attr.sender-email = SENDER This is a lookup parameter key from the Sender group. It is mapped to
the corresponding column header in the CSV file.
attr.Email\ Address = EMAIL This is a space delimited custom attribute defines in Step 1. It is mapped
to the corresponding column head in the CSV file.
keys = SENDER This line declares one key to perform the lookup. The lookup ceases
once the first key is located, and the attribute values are populated.
10 Select System > Lookup Plugins > Modify Plugin Chain and enable the
plug-in.
11 Open the Incident Snapshot for the incident generated in the Step 4.
12 Verify that the unpopulated custom attributes you created in Step 1 appear in
the Attributes pane to the right of the screen.
If they do not, complete Step 1.
13 Verify that the "Lookup" button appears in the Attributes pane above the
custom attributes.
If it does not, verify that the Lookup Attributes privilege is granted to the user.
Click Reload Plugin after making any changes.
Implementing lookup plug-ins 1520
Configuring LDAP Lookup Plug-Ins
The connection to the LDAP server can be configured from the link in the LDAP
Lookup Plug-In .
3 Create a new LDAP See “Creating new lookup plug-ins” on page 1500.
Lookup Plug-In .
4 Map the attributes. Map the attributes to the corresponding LDAP directory fields. The syntax is
as follows:
attr.CustomAttributeName = search_base:
(search_filter=$variable$):
ldapAttribute
5 Save and enable the The LDAP Lookup Plug-In must be enabled on the Enforce Server.
plug-in.
See “Enabling lookup plug-ins” on page 1505.
6 Test and troubleshoot the See “Troubleshooting lookup plug-ins” on page 1507.
LDAP Lookup Plug-In .
Implementing lookup plug-ins 1521
Configuring LDAP Lookup Plug-Ins
attr.CustomAttributeName = search_base:
(search_filter=$variable$):
ldapAttribute
Element Description
CustomAttributeName The name of the custom attribute as it is defined in the Enforce Server.
Note: If the name of the attribute contains white-space characters, you must
precede each instance of the white space with a backslash. A white-space
character is a space or a tab. For example, you need to enter the Business
Unit custom attribute as: attr.Business\ Unit
Element Description
search_filter The name of the LDAP attribute (field) that corresponds to the lookup parameter
(or other variable) passed to the plug-in from the Enforce Server.
variable The name of the lookup parameter that contains the value to be used as a key to
locate the correct data in the LDAP directory.
In cases where multiple plug-ins are chained together, the parameter might be a
variable that is passed to the LDAP Lookup Plug-In by a previous plug-in.
ldapAttribute The LDAP attribute whose data value is returned to the Enforce Server. This value
is used to populate the custom attribute that is specified in the first element of the
entry.
In the following attribute mapping example, a separate line is entered for each
custom attribute that is to be populated. In addition, note the use of the
TempDeptCode temporary variable. The department code is needed to obtain the
department name from the LDAP hierarchy. But only the department name needs
to be stored as a custom attribute. The TempDeptCode variable is created for this
purpose.
7 Save the plug-in. Verify that the correct save message for the plug-in is
displayed.
8 Enable the following keys at the System > Lookup Plugins > Lookup
Parameters page.
■ Incident
Implementing lookup plug-ins 1525
Configuring Script Lookup Plug-Ins
■ Message
■ Sender
9 Create an incident that generates one of the lookup parameters. For example,
an email incident exposes the sender-email attribute. There must be some
corresponding information in the Active Directory server.
10 Open the Incident Snapshot for the incident.
11 Click the Lookup button and verify the custom attributes created in the Step
1 are populated in the right panel.
2 Create the script. See “Writing scripts for Script Lookup Plug-Ins” on page 1526.
3 Define the Lookup Select the keys to use to extract custom attribute data.
Parameter Keys.
See “Selecting lookup parameters” on page 1500.
4 Create a new Script See “Creating new lookup plug-ins” on page 1500.
Plugin.
5 Enter the Script This value is the local path to the script engine executable on the Enforce Server
Command. host.
6 Specify the Arguments. This value is the path to the Python script file to use for attribute lookup and any
command line arguments. Begin the script path with the -u argument to improve
lookup performance.
7 Enable the stdin and Enable both options to help prevent script injection attacks.
stout options.
See “Enabling the stdin and stdout options” on page 1528.
Implementing lookup plug-ins 1526
Configuring Script Lookup Plug-Ins
8 Optionally, enable You can specify the incident types by protocol for passing attribute values to look
protocol filtering. up scripts.
9 Optionally, enable and You can encrypt and pass credentials required by the script to connect to external
encrypt credentials. systems.
9 Save the plugin. Verify that the correct save message for the plugin is displayed.
10 Enable the lookup You can chain scripts together and chain scripts with other lookup plugins.
plugin.
Output stdout To work with the plugin and populate attributes, scripts
must output a set of key-value pairs to standard out
(stdout).
host-name=mycomputer.company.corp
username=DOMAIN\bsmith
exit code 0 Scripts must exit with an exit code of ‘0.’ If scripts exit with
any other code, the Enforce Server assumes that an error
has occurred in script execution and terminates the
attribute lookup.
error handling stderr to a file Scripts cannot print out error or debug information. Redirect
stderr to a file. In Python this would be:
@ Attributes containing these characters will be ignored during processing if the stdin and
stdout options are enabled.
.
$ Attributes containing the $ and % characters are allowed if these characters are properly
escaped by a backslash.
%
Note: Network protocols are configured at the System > Settings > Protocols
screen. Endpoint protocols are configured at the System > Agents > Agent
Configuration screen. Discover protocols are configured at the Policies >
Discover Scanning > Discover Targets. And, once an incident is generated,
the protocol value for the incident is displayed at the top of the Incident
Snapshot screen.
1 Create a text file that contains the The format of this file is key=value, where key is the name
credentials that are needed by the script of the credential.
to access the appropriate external
For example:
systems.
username=msantos password=esperanza9
2 Save this credential file to the file system The file needs to be saved to the Enforce Server temporarily.
local to the Enforce Server.
For example: C:\temp\MyCredentials.txt.
3 On the Enforce Server, open a shell or This directory on the Enforce Server contains the Credential
command prompt and change directories Generator Utility.
to
\SymantecDLP_home\Protect\bin.
CredentialGenerator.bat C:\temp\MyCredentials.txt
C:\temp\MyCredentialsEncrypted.txt
5 Select Enable Credentials. At the System > Lookup Plugins > Edit Script Lookup
Plugin page, select (check) the Enable Credentials option.
6 Enter the Credentials File Path. Enter the fully qualified path to the encrypted credentials file.
For example:
C:\temp\MyCredentialsEncrypted.txt.
7 Save the plug-in. You can now use the encrypted credentials to authenticate
to an external system.
8 Secure the clear-text credentials file. If you want to save the clear-text credentials file, move it to
a secure location. It can be useful to save the file if you plan
to update and re-encrypt it later. If you do not want to save
the file, delete it now.
9 Reload the lookup plug-in. See “Managing and configuring lookup plug-ins” on page 1498.
Implementing lookup plug-ins 1532
Configuring Script Lookup Plug-Ins
8 Save the plugin and ensure that the plugin loads successfully as indicated by
the system message.
9 Enable the following lookup parameters: Incident, Message, and Sender.
10 Generate an incident that passes the date-sent attribute.
11 Go to the Incident Snapshot for the new incident and click Lookup.
12 Verify that the Script-attribute custom attribute is populated with the value
of script value.
Implementing lookup plug-ins 1534
Configuring Script Lookup Plug-Ins
Example script
The following script is provided as an example for the Script Lookup Plug-In . It is
written in Python 2.6. The purpose of this script is to provide a basic working example
for writing scripts in Python that can be used for Script Lookup Plugins.
This script contains the date-sent lookup parameter key and returns the "script
value" for the custom attribute Script-attribute.
See “Script Lookup Plug-In tutorial” on page 1532.
__name__="__main__"
def main(args):
try:
attributeMap = parseInput(args)
except:
error()
print "something went wrong!"
return "something went wrong!"
def parseInput(args):
def error():
# "SCRIPT PROCESSING ERROR"
if(debugMode):
Implementing lookup plug-ins 1536
Configuring migrated Custom (Legacy) Lookup Plug-Ins
#-----------------------------------------------------------------
# DOS-style shells (for DOS, NT, OS/2):
#-----------------------------------------------------------------
def getstatusoutput(cmd):
""" Return (status, output) of executing cmd in a
shell."""
#-----------------------------------------------------------------
# Entry Point
#-----------------------------------------------------------------
if __name__ == "__main__":
if(len(sys.argv) == 0):
error()
else:
main(sys.argv)
1 Create custom attributes. Create the custom attributes that your Custom (Legacy)
Lookup Plugin will retrieve the values for.
2 Edit the Custom (Legacy) Plugin. Successful upgrade should import the Custom (Legacy)
Lookup Plugin to the user interface where you can enable
it.
3 Verify the Plugin Class. After upgrade, the class name should be populated from
the Plugins.properties file.
4 Verify the Required JARs. After upgrade, the JAR files previously copied to the Enforce
Server should appear in this field.
6 Enable parameter lookup keys. Select the keys to trigger attribute lookup.
7 Create a policy and generate an incident of For example, create a keyword policy and generate an
the type expected by the plug-in. SMTP network incident that passes the sender-name
attribute.
8 Verify that the custom attributes are updated. Check the Incident Snapshot for the populated attributes.
■ A card on the Network Monitor Server host to capture the network traffic that is
acquired from the SPAN or tap. Either a network interface card (NIC) or
high-speed packet capture adapter (Endace or Napatech) can be used. (Note
that in addition to this traffic-capturing card, a separate NIC is required for
communication between the Network Monitor Server and the Enforce Server.
WinPcap is required for this purpose.)
■ Packet capture software. When you use a NIC for packet capture, packet capture
software must be installed on the Network Monitor Server host. When you use
a high-speed packet capture adapter card (Endace or Napatech), the card must
use the correct driver.
See “Choosing a network packet capture method” on page 1542.
To implement packet capture and set up a Network Monitor, perform the following
high-level tasks:
1 Install and set up the network tap or SPAN that captures network traffic.
2 Choose a method of capturing network traffic.
See “Choosing a network packet capture method” on page 1542.
3 Install the necessary NIC or high-speed packet capture adapter (Endace or
Napatech) on the Network Monitor as described by the card documentation.
Also use the appropriate Symantec Data Loss Prevention Installation Guide
(Windows or Linux). This NIC or high-speed packet capture adapter (Endace
or Napatech) must operate in promiscuous mode so that all inbound and
outbound traffic is relayed through this port.
See the Symantec Data Loss Prevention System Requirements and
Compatibility Guide for information about supported NICs and high-speed
packet capture adapters.
Implementing Network Monitor 1541
About IPv6 support for Network Monitor
To see the current status of checksum offloading, use the ethtool -k eth0
command.
implementations of Network Monitor and does not include support for other Symantec
Data Loss Prevention products.
Here is an overview of specific support for IPv6 in Symantec Data Loss Prevention:
■ Installation of a Network Monitor Server that is capable of monitoring IPv6
networks or dual-stack networks is the same as installation of a Network Monitor
Server that monitors an IPv4 network.
■ The hardware and operating system requirements are the same as for IPv4
Network Monitor. See the Symantec Data Loss Prevention System Requirements
Guide for more information on third-party hardware and software compatibility.
■ IP address data types can hold either IPv4 or IPv6 addresses.
■ Network incidents can include IPv6 addresses.
■ Network protocol definitions can include IPv6 addresses.
Symantec Data Loss Prevention IPv6 support is limited to monitoring. The Enforce
Server administration console must still be deployed on an IPv4 network; there is
no support for command and control functionality over IPv6.
This release does not include support for:
■ Deployment of Symantec Data Loss Prevention over IPv6 networks
■ Support of other Symantec Data Loss Prevention servers on IPv6 networks
■ Use of IPv6 system-defined data identifiers
■ Use of IP fragmentation over IPv6
■ Configuring or communicating with detection servers over IPv6
■ Deployment of IPv6 endpoints
■ Deployment of Symantec Encryption Server on IPv6
■ Deployment of the Oracle database on an IPv6 connection
See Configure a protocol in online Help for more information about specific
implementation details of IPv6 support.
Linux Native
Napatech
■ If you use a high-speed packet capture adapter (Endace or Napatech), you will
need to install or update the adpater driver software.
See “Installing WinPcap on a Windows platform” on page 1544.
See “Updating the Endace card driver” on page 1544.
See “Installing and updating the Napatech network adapter and driver software”
on page 1544.
Compatibility Guide for information about the supported Napatech card and driver
versions.
1 Install the supported Refer to the Symantec Data Loss Prevention System Requirements and Compatibility
Napatech Guide for the supported Napatech card version.
high-speed packet
capture adapter.
2 Install the Napatech For supported versions of the Napatech driver, see the Symantec Data Loss Prevention
driver. System Requirements and Compatibility Guide.
■ The Napatech driver has to be compiled from source as a part of installing Napatech
software package (see step 2 above).
■ The Napatech driver has to be loaded using the script
/opt/napatech/bin/load_driver.sh once for each computer bootstrap
before capturing packets. Note for RHEL Linux, edit the file /etc/rc.d/rc.local
to append /opt/napatech/bin/load_driver.sh and restart the system.
■ Verify that the Napatech library file libntcommoninterface.so is present in
directory /<nt_installation_directory>/lib/.
4 Configure the Deploy a Network Monitor detection server and configure the Advanced Server settings:
Network Monitor
■ Enable Napatech packet capture by setting the following flag to true:
detection server.
PacketCapture.IS_NAPATECH_ENABLED.
■ Update the value to the path to the Napatech driver tools directory by entering the
path in the field for the following entry: PacketCapture.NAPATECH_TOOLS_PATH.
■ For example, on Windows Napatech tools binaries are included as part of the
Napatech software package:
\ntcap_package_windows_<version>\tools\nt_tools_windows_<version>.zip
\tools\binary\Tools\<architecture>\
■ For Linux, Napatech tools are compiled from source as part of Napatech
software package installation process:
/<nt_installation_directory>/bin/
4 For Napatech cards, enter the appropriate values in the following fields:
5 Stop and restart the Network Monitor Server. Symantec Data Loss Prevention
displays the Endace card in the Network Interfaces field of the Configure
Server screen for the Network Monitor Server.
Implementing Network Monitor 1547
Enabling GET processing with Network Monitor
6 Go to System > Servers and Detectors > Overview and again click on the
Network Monitor Server.
7 On the Server Detail screen, click Configure. You can verify or modify settings
in the general section at top and on the Packet Capture tab, as described in
subsequent steps.
8 Leave the Source Folder Override field blank to accept the default directory
for buffering network streams before the Network Monitor Server processes
them. (This setting is the recommended setting.) To specify a custom buffer
directory, type the full path to the directory.
9 Select one or more Network Interfaces (NICs, Napatech cards, or Endace
cards) through which the Network Monitor Server should capture traffic.
10 In the Protocol section, select one or more protocols to monitor. For example,
select the check boxes for SMTP, HTTP, and FTP. For a protocol to appear
in this section, it must already be configured on the global Protocols screen in
the Enforce Server.
See the online Help associated with the Configure Server screen.
Symantec Data Loss Prevention has standard settings for each protocol in the
list. To modify a protocol’s settings, click the Pencil icon next to the appropriate
protocol. For details on modifying protocol settings, see the online Help.
11 Click Save.
12 Stop and restart the Network Monitor Server. Click Recycle next to the Status
entry in the Server Detail screen.
After selecting a network interface and choosing protocols, you may want to create
a test policy to test your deployment.
See “Testing Network Monitor” on page 1549.
See “Enabling GET processing with Network Monitor” on page 1547.
See “Creating a policy for Network Monitor” on page 1548.
Note: Network Monitoronly inspects GET requests, it does not inspect HTTP GET
responses.
Note: Network Monitoronly inspects HTTP GET requests; it does not inspect HTTP
GET responses.
See “Enabling GET processing for Network Prevent for Web” on page 1571.
■ Configuring Network Prevent for Email Server for reflecting or forwarding mode
Note: Review the Symantec Data Loss Prevention MTA Integration Guide for
Network Prevent for Email to determine your preferred integration architecture
before you continue with the implementation.
Figure 54-1 shows an integration of Network Prevent for Email Server with a
next-hop MTA that you manage in the network. As an alternative, you can integrate
Network Prevent for Email Server with a hosted mail server that resides outside
the firewall.
First, you need to know the high-level steps that are required for implementing
Network Prevent for Email. You can check the cross-referenced sections for more
details.
Implementing Network Prevent for Email 1552
About Mail Transfer Agent (MTA) integration
See “Specifying one or more upstream mail transfer agents (MTAs)” on page 1558.
Field Description
companyname.com
Field Description
smtp1.companyname.com
smtp2.companyname.com
smtp3.companyname.com
7 Click Save.
Implementing Network Prevent for Email 1556
Configuring Network Prevent for Email Server for reflecting or forwarding mode
Field Description
Field Description
9 Click Save.
10 Click Done.
11 If your email delivery system uses TLS communication in forwarding mode,
each next-hop mail server in the proxy chain must support TLS and must
authenticate itself to the previous hop. This means that Network Prevent for
Email Server must authenticate itself to the upstream MTA, and the next-hop
MTA must authenticate itself to Network Prevent for Email Server. Proper
authentication requires that each mail server stores the public key certificate
for the next hop mail server in its local keystore file.
See “Specifying one or more upstream mail transfer agents (MTAs)” on page 1558.
See “Creating a policy for Network Prevent for Email” on page 1559.
See “Testing Network Prevent for Email” on page 1562.
If the computer receives mail for inspection on a restricted port (for example, port
25), use the iptables command to route that traffic to a non-restricted port, such
as the Network Prevent for Email default port 10025. Then ensure that Network
Prevent for Email listens on the non-restricted port to inspect email.
Use the following instructions to configure a Linux system to route from port 25 to
port 10025. If you use a different restricted port or Network Prevent for Email port,
enter the correct values in the iptables commands.
To configure route traffic from port 25 to port 10025
1 Configure Network Prevent for Email to use the default port 10025 if necessary.
See “Configuring Network Prevent for Email Server for reflecting or forwarding
mode” on page 1553.
2 In a terminal window on the Network Prevent for Email computer, enter the
following commands to reroute traffic from port 25 to port 10025:
iptables -N Vontu-INPUT
iptables -A Vontu-INPUT -s 0/0 -p tcp --dport 25 -j ACCEPT
iptables -I INPUT 1 -s 0/0 -p tcp -j Vontu-INPUT
iptables -t nat -I PREROUTING -p tcp --destination-port 25 -j REDIRECT --to-ports=10025
iptables-save > /etc/sysconfig/iptables
Note: If you only want to test local IP routing between the ports with Telnet,
use the command: iptables -t nat -I OUTPUT -o lo -p tcp
--destination-port 25 -j REDIRECT --to-ports=10025
If later you decide to delete the IP tables entry, use the command:
review and release messages. Such mailboxes are outside the Symantec Data
Loss Prevention system.
■ Network: Modify SMTP Message
Modifies the email messages that contain confidential data or significant metadata
(as defined in your policies). You can use this action to modify the message
subject or add specific RFC 5322 message headers to trigger further downstream
processing. For example, message encryption, message quarantine, or message
archiving.
For details on setting up any response rule action, open the online Help. Go to
Manage > Policies > Response Rules and click Add Response Rule.
For details on using the Network: Modify SMTP Message action to trigger
downstream processes (such as message encryption), see the Symantec Data
Loss Prevention MTA Integration Guide for Network Prevent.
Even if you do not incorporate response rules into your policy, Network Prevent for
Email captures incidents as long as your policies contain detection rules. This
feature can be useful if you want to review the types of incidents Symantec Data
Loss Prevention captures and to then refine your policies.
To create a test policy for Network Prevent for Email
1 In the Enforce Server administration console, create a response rule that
includes one of the actions specific to Network Prevent for Email. For example,
create a response rule that includes the Network: Block SMTP Message
action.
See “Configuring response rules” on page 1266.
2 Create a policy that incorporates the response rule you configured in the
previous step.
For example, create a policy called Test Policy as follows:
■ Include a Content Matches Keyword detection rule that matches on the
keyword secret.
■ Include a Network: Block SMTP Message response rule.
■ Associate it with the Default policy group.
See “Configuring policies” on page 390.
See “About policy violation data headers” on page 1561.
Implementing Network Prevent for Email 1561
About policy violation data headers
Changes to these settings do not take effect until you restart the server.
Three RequestProcessor advanced settings enable different kinds of
multiple-policy-violation message headers:
■ RequestProcessor.TagPolicyCount.
When the setting is set to true, Network Prevent adds a header reporting the
total number of policies that the message violates. For example, if the message
violates 3 policies a header reading: “X-DLP-Policy-Count: 3” is added.
■ RequestProcessor.TagHighestSeverity.
When the setting is set to true, Network Prevent adds a header reporting the
highest severity among the violated policies. For example, if a message violates
three policies, one with a severity of “Medium” and two with a severity of “Low”
a header reading: “X-DLP-Max-Severity: MEDIUM” is added.
■ RequestProcessor.TagScore.
When the setting is set to true, Network Prevent adds a header reporting the
total cumulative score of all the violated policies. Scores are calculated using
the formula: High=4, Medium=3, Low=2, and Info=1. For example, if a message
violates three policies, one with a severity of “medium” and two with a severity
of “low” a header reading: “X-DLP-Score: 7” is added.
Setting a value to “true” causes the corresponding header to be automatically added
to every outgoing message that is processed. This occurs even if the message
violates only a single policy.
See “About policy violation data headers” on page 1561.
First, you need to know the high-level steps that are required for implementing
Network Prevent for Web. You can check the cross-referenced sections for more
details.
To implement Network Prevent for Web
1 Make sure the Network Prevent for Web Server is configured to communicate
with your HTTP proxy server. Optionally, configure the detection server to filter
traffic as wanted.
See “Configuring Network Prevent for Web Server” on page 1565.
2 Configure your HTTP proxy server to work with the Network Prevent for Web
Server.
See “About proxy server configuration” on page 1568.
3 Create and deploy a policy for Network Prevent for Web.
See “Creating policies for Network Prevent for Web” on page 1571.
Implementing Network Prevent for Web 1565
Configuring Network Prevent for Web Server
4 Verify or modify the filter options for requests from HTTP clients (user agents).
The options in the Request Filtering section are as follows:
Ignore Requests Smaller Than Specifies the minimum body size of HTTP
requests to inspect. (The default is 4096
bytes.) For example, search-strings typed
in to search engines such as Yahoo or
Google are usually short. By adjusting this
value, you can exclude those searches
from inspection.
Ignore Requests without Attachments Causes the server to inspect only the
requests that contain attachments. This
option can be useful if you are mainly
concerned with requests intended to post
sensitive files.
Ignore Requests from User Agents Causes the server to ignore requests from
user agents (HTTP clients) you specify.
This option can be useful if your
organization uses a program or language
(such as Java) that makes frequent HTTP
requests. You can type one or more user
agent values, each on its own line.
Implementing Network Prevent for Web 1567
Configuring Network Prevent for Web Server
5 Verify or modify the filter options for responses from Web servers. The options
in the Response Filtering section are as follows:
Ignore Responses Smaller Than Specifies the minimum size of the body of
HTTP responses that are inspected by this
server. (Default is 4096 bytes.)
6 Verify or modify settings for the ICAP connection between the HTTP proxy
server and the Web Prevent Server. The Connection options are as follows:
7 Click Save to exit the Configure Server screen and then click Done to exit
the Server Detail screen.
Note that most proxy servers provide methods of filtering what is forwarded to the
Network Prevent for Web Server in both REQMOD mode and RESPMOD modes.
Consult the proxy server's documentation for details.
See “Specifying one or more proxy servers” on page 1570.
See “Configuring request and response mode services” on page 1569.
icap://ip_address|FQDN[:port]/reqmod
icap://ip_address|FQND[:port]/respmod
Where:
■ ip_address|FQDN identifies the Network Prevent for Web Server using either
an IP address or fully qualified domain name.
■ Port is the port number to which Network Prevent for Web Server listens.
Specifying the port number is optional when the default ICAP port (1344) is
used.
■ /reqmod is required for correct functionality in REQMOD mode.
Examples:
icap://10.66.194.45/reqmod
icap://10.66.194.45:1344/reqmod
icap://netmonitor1.company.com/reqmod
icap://10.66.194.45/respmod
Implementing Network Prevent for Web 1570
Specifying one or more proxy servers
icap://10.66.194.45:1344/respmod
icap://netmonitor1.company.com/respmod
Note that the port that is specified in the ICAP service definition on the proxy must
match the port on which Network Prevent for Web Server listens.
See “About proxy server configuration” on page 1568.
Incidents appear in Network reports, but This is expected behavior when the Network
Symantec Data Loss Prevention does not Prevent for Web Server is running in trial
perform the action specified in the relevant mode (the default setting). If you do not want
response rule. to run in trial mode, change the setting.
Network
Discover Network
Monitor
Network
Protect Enforce
Platform
Endpoint
Network
Endpoint Prevent
Discover
2 Create a policy group. Go to System > Servers and Detectors > Policy
Groups.
3 Create a policy. Go to Manage > Policies > Policy List on the Enforce
Server.
6 Set options for the See “Network Discover/Cloud Storage Discover scan
target. target configuration options” on page 1586.
4 The configuration for parallel scanning is on the Discover tab. Enter the number
of parallel scans to run on this Network Discover/Cloud Storage Discover
Server. The default is 1.
The maximum count can be increased at any time. After it is increased, then
any queued scans that are eligible to run on this Network Discover/Cloud
Storage Discover Server are started.
The count can be decreased only if the Network Discover/Cloud Storage
Discover Server has no running scans. Before you reduce the count, pause or
stop all scans on the Network Discover/Cloud Storage Discover Server.
Parallel scans of server and scanner target types are supported.
See “Configuring parallel scanning of Network Discover/Cloud Storage Discover
targets” on page 1628.
5 When you finish modifying a server configuration, click Save to exit the
Configure Server screen and then click Done to exit the Server Detail screen.
6 To view the active scans on this Network Discover/Cloud Storage Discover
Server, go to Policies > Discover Scanning > Discover Servers.
See “Managing Network Discover/Cloud Storage Discover target scans”
on page 1608.
4 Enter the remaining required parameters. Enter the policy group. Enter the
Network Discover/Cloud Storage Discover Server.
See “Configuring the required fields for Network Discover targets” on page 1588.
5 Continue the addition of a new target, with the entries specific to that target
type.
Network file servers and shares (CIFS, See “Setting up server scans of file
NFS, DFS) systems” on page 1652.
Local file systems on Windows desktops See “Setting up remote scanning of file
and laptops systems” on page 1723.
Web servers (Web sites and Web-based See “Setting up remote scanning of web
applications) servers” on page 1736.
Provide authentication for Box cloud Authorization See “Providing Box cloud
storage. storage authorization
credentials” on page 1594.
Filter targets by date last accessed or Filters See “Filtering Discover targets
modified. by date last accessed or
modified” on page 1601.
Optimize your resources with scan Advanced See “Optimizing resources with
throttling. Network Discover/Cloud Storage
Discover scan throttling”
on page 1603.
Note: The grid scanning feature for file system scan targets provides an
additional option which enables you to distribute the scanning workload across
all of the selected servers, provided that you select at least two servers.
Symantec recommends that you apply the same configuration to all of the
detections servers that you intend to use for grid scans.
.
Only the detection servers that were configured as Discover Servers appear
on the list. If there is only one Discover Server on your network, the name of
that server is automatically specified. You should configure your Discover
Servers before you configure targets. You must specify at least one server
before you can run a scan for this target.
6 On the Scanned Content tab, you must enter the item to be scanned. Refer
to the documentation about each type of target for additional information about
this entry.
See “About Network Discover/Cloud Storage Discover” on page 1576.
7 You can configure other options for this target.
See “Network Discover/Cloud Storage Discover scan target configuration
options” on page 1586.
during specified times, for example when resources are normally busy with other
tasks.
For cloud storage, file shares, Lotus Notes, or SQL databases, the scan schedule
can be completely specified with the Scan Schedule parameters.
For the scanner targets (such as SharePoint or Exchange), the scan must also be
scheduled from the computer where the scanner is installed. You must manually
manage the scan schedule between the Discover target and the scanner application.
The scanners are installed, configured, and run outside of the Enforce Server and
Network Discover/Cloud Storage Discover Server. For example, the scanner can
be scheduled to run automatically using the host’s native scheduling. You can create
a UNIX cron job, or add the scanner to the Windows scheduler. The scanner should
be scheduled to run before the scheduled Network Discover/Cloud Storage Discover
scan, so that the Network Discover/Cloud Storage Discover scan has information
to consume.
If you select a specific time for starting or pausing a scan, the time zone of the
Enforce Server is used.
You can configure other options for this target.
See “Network Discover/Cloud Storage Discover scan target configuration options”
on page 1586.
To set up a scan schedule
1 In the Enforce Server administration console, go to Manage > Discover
Scanning > Discover Targets.
2 Click the name of the scan that you want to schedule.
3 Click the General tab.
4 Select the item Submit Scan Job on Schedule.
When you select this check box to set up a schedule for scanning the specified
target, the Schedule drop-down list becomes available. After you select an
option from the Schedule drop-down list, additional fields appear.
Network Discover scan target configuration options 1591
Scheduling Network Discover/Cloud Storage Discover scans
6 Click Save.
To pause a scan during specified times
1 In the Enforce Server administration console, go to Manage > Discover
Scanning > Discover Targets.
2 Click the name of the scan that you want to pause during specified times.
3 Click the General tab.
4 Select the item Pause Scan between these times.
5 Select the pause options.
This option automatically pauses scans during the specified time interval. You
can override a target’s pause window by going to the Discover Targets screen
and clicking the start icon for the target entry. The pause window remains intact,
and any future scans that run up against the scan window pause as specified.
You can also restart a paused scan by clicking the continue icon in the target
entry.
Note: If the target configuration is modified while it is paused, then the modified
configuration does not apply to items that were already scanned. When a scan
is paused and restarted, the scan is restarted from a checkpoint that is created
when the scan is paused. The modified configuration is used for the items that
are scanned from that checkpoint.
6 Click Save.
Network Discover scan target configuration options 1592
Providing the password authentication for Network Discover scanned content
5 The format of the credentials depends on the type of scan. For the specific
format and examples of credentials for each target type, see the topic for that
target type.
See “About Network Discover/Cloud Storage Discover” on page 1576.
6 You can set other options on the Scanned Content tab.
See “Network Discover/Cloud Storage Discover scan target configuration
options” on page 1586.
Remediation credentials can be set on the Protect tab.
See “Configuring Network Protect for file shares” on page 1671.
Action Description
Create a new cloud authorization You can create a new cloud authorization for Box cloud storage targets.
You can only have one cloud authorization for Box cloud storage
targets.
Edit an existing cloud authorization To modify an existing cloud authorization, click the edit icon.
Delete a cloud authorization To delete a cloud authorization, click the delete icon.
to modify most existing settings, such as the Name, Client ID, Client secret, and
so on.
To modify an existing cloud storage authorization
1 In the Enforce Server Administrative Console, go to System > Settings >
Cloud Authorization.
2 Click the edit icon for the cloud storage authorization you want to modify in the
Cloud Storage Authorizations list.
3 Enter your edits on the Edit Cloud Storage Authorization screen.
4 Click Save.
■ Manage enterprise
■ Manage groups
■ Manage enterprise properties
■ Manage retention policies
4 Enter file names or paths into the include filters and the exclude filters to select
a subset of items that Symantec Data Loss Prevention should process. Delimit
entries with a comma, but no spaces. The path filter is case-sensitive.
When both include filters and exclude filters are present, exclude filters take
precedence.
The include filter and exclude filter file names are relative to the file system
root. Specify full paths or subdirectories, as needed. Some wildcards are
allowed.
Table 58-2 shows the syntax for the filters.
If the exclude filter entry exceeds the 1024-character limit, you can create an
exclude file with the file names to be excluded.
5 Click Save.
To create an exclude file:
1 Create a directory named excludeFiles in the Symantec Data Loss Prevention
configuration directory, for
example\SymantecDLP\Protect\config\excludeFiles\.
For a configuration with multiple Discover servers, a copy of this directory and
file must be present on each Discover server.
2 In this directory create one text file for each set of items to exclude.
For example, you can create one file for each UNIX system to be scanned.
Name the files hostname.txt, where hostname is the name of the system to
be scanned, as provided in the target configuration. The host name in this text
file must match exactly the name that is in the Network Discover/Cloud Storage
Discover target.
3 In each file, list the paths (each path on a separate line) that you want to exclude
from the scan.
The paths can be files, directories, symbolic links, or mounted directories. The
paths must each begin with a delimiter of “/” or “\” followed by the share name,
directory name, and file name. For example, a valid path is
\excludeshare\excludedir\excludefile.
Table 58-2 Syntax for the include filters and exclude filters
Wildcard Description
Table 58-2 Syntax for the include filters and exclude filters (continued)
Wildcard Description
The forward slash (/) and backslash (\) These characters are equivalent. They usually
characters represent directory separators, although on
Linux the backslash is a valid character in a
file name.
White space at the beginning and end of the White space is ignored at the beginning and
pattern end of the pattern. Do not use spaces before
or after the commas that delimit entries.
Syntax and examples for SQL Database scanning are in the SQL Database section.
See “Configuring and running SQL database scans” on page 1682.
Network Discover scan target configuration options 1600
Filtering Discover targets by item size
Syntax and examples for SharePoint scanning are in the SharePoint section.
See “Configuring and running SharePoint server scans” on page 1693.
4 Select Only Scan files added or modified since the last full scan for a
differential scan.
See “Scanning new or modified items with differential scans” on page 1628.
This option scans only the items that have been added or modified (whichever
is newer) since the last full scan.
If you do not select this option, Symantec Data Loss Prevention uses no date
filter. It performs matching on items of all dates in the specified target.
The first scan has to be a full scan. A full scan occurs if you select this option
before Symantec Data Loss Prevention scans this target for the first time.
When you select this option, you can also select the option Make next scan
a full scan. When you select this option, the date filters for Only scan files
added or modified and for Only scan files last accessed are disabled. The
next scan is a full scan (if no previous full scans have completed). Subsequent
scans cover only those items that have been added or modified since the full
scan. After Symantec Data Loss Prevention performs the full scan, this check
box is automatically deselected.
This option is not available for the target for a file system (file share). Use
incremental scanning, instead.
See “About incremental scans” on page 1625.
See “About the difference between incremental scans and differential scans”
on page 1624.
5 Select Only scan files added or modified to include files based on the added
or modified date.
Symantec Data Loss Prevention only scans items after the specified After
date, before the specified Before date, or between the dates you specify.
Note that if the After date is later than the Before date, then no items are
scanned. If the Before date and the After date are the same, then no items
are scanned. No items are scanned because the assumed time of the Before
parameter is at zero hours, and After is at 24 hours.
When you select this option, you can also select from the following options:
■ After
To include the items that are created or modified (whichever is newer) after
a particular date, type the date. You can also click the date widget and
select a date.
■ Before
Network Discover scan target configuration options 1603
Optimizing resources with Network Discover/Cloud Storage Discover scan throttling
To include the items that are created or modified (whichever is older) before
a particular date, type the date. You can also click the date widget and
select a date.
6 Select Only scan files last accessed to include files based on the last
accessed date.
Symantec Data Loss Prevention only scans items after the specified After
date, before the specified Before date, or between the dates you specify.
The last-accessed feature is only supported for Windows Network Discover
Server scanning of CIFS shares.
Note that if the After date is later than the Before date, then no items are
scanned. If the Before date and After date are the same, then no items are
scanned. No items are scanned because the assumed time of the Before
parameter is at zero hours, and After is at 24 hours.
When you select this option, you can also select from the following options:
■ After
To include the items that are accessed after a particular date, enter the
date. You can also click the date widget and select a date.
■ Before
To include the items that are accessed before a particular date, enter the
date. You can also click the date widget and select a date.
Note: The default mount process uses the CIFS client. If the default mount
does not work, the mount task can use theJCIFS client by setting
filesystemcrawler.use.jcifs=true in the properties file
Crawler.properties.
Note: Use of item throttling significantly reduces the scan rate. Expect the scan rate
to reduce to half the original scan rate or less.
Maximum files scanned per minute per Specify the maximum number of files,
detection server documents (in Lotus Notes), or rows (in
SQL Databases) to be processed per
minute per server.
Maximum size scanned per minute per Specify the maximum number of bytes to
detection server be processed per minute per server.
■ File shares
For file shares, you can also specify whether to count incidents by content root,
or by computer. The content root is one file share on the list that is specified on
the Scanned Content tab. The selection is specified in the field Count
Incidents By.
When the incident threshold is reached, the scan moves to the next content
root on the list to scan. If that content root is on the same physical computer
as the previous item, it is skipped.
Note that the computer name must be literally the same for the content root
to be skipped. For example, \\localhost\myfiles and
\\127.0.0.1\myfiles are treated as different computers, even though
they are logically the same.
Chapter 59
Managing Network Discover
target scans
This chapter includes the following topics:
You can select the number of entries to display in the Discover Target list using
the drop-down menu above the Actions column.
See “Managing Network Discover/Cloud Storage Discover target scans” on page 1608.
Table 59-1 lists the columns for each target scan.
Target Description
Information
Target Type Type of target for the scan (such as File System or SharePoint).
Policy Groups Lists the policy groups to which the target is assigned.
Last Modified Specifies the date and time that the target was last modified.
Scan Status Displays the status of the scan. Click the link in this column to view a
filtered scan history page for this target.
Next Scan Displays the next scheduled scan for the target, if applicable.
Actions Click the Edit Target icon to edit the target definition.
Click the Delete icon to delete the target.
4 To clear a filter, clear the value from the relevant text field or drop-down list,
or click Filter.
Table 59-2 lists the fields that are displayed for each scan.
Scan Description
History
Target Type Type of target for the scan (such as File System or SharePoint).
Scan Status Current status of the scan: Running, Paused, Completed, Stopped.
Bytes/Items Number of bytes scanned in the target, as well as the number of items
Scanned scanned.
Actions Click the View Incidents icon to view an incident summary report for the scan.
Click the Delete icon to delete the scan. Make sure to first delete differential
scans before you delete the base scan.
4 To clear a filter, clear the value from the relevant text field or drop-down list,
or click Filter.
To delete a scan
1 In the Enforce Server administration console, go to Manage > Discover
Scanning > Scan History.
2 Delete any differential scans before you delete the base full scan for that target.
This step is not necessary for incremental scans.
3 Select the scan to be deleted, then click the delete icon in the Actions column.
To delete multiple scans, mark the checkboxes for the scans you want to delete,
then click Delete on the toolbar.
General Description
Scan
Detail
Target The type and icon of the target that was scanned.
Type
Table 59-4 shows the Scan Statistics section, which provides detailed information
about the scan.
Scan Description
Statistics
Processed Number of content roots (users, shares, or sites) that have been scanned.
If the scan is still running, this field provides a benchmark of scan progress.
Run Time Amount of time that the scan took to complete. If the scan is still running,
(dd:hh:mm:ss) the amount of time that it has been running. The total does not include any
time during which the scan was paused.
Errors Number of errors that occurred during the scan. A list of the errors is
available in the Recent Scan Errors section.
Current Number of incidents that were detected during the current scan, less any
Incident deleted incidents. You can click this number to see an incident list for this
Count scan.
The Recent Grid Status section is a listing of the servers that were assigned to
the scan target to perform a grid scan. Grid scans are currently supported only for
File System scan targets.
By default, the Recent Grid Status section is collapsed when you open the Scan
Detail screen.
Recent Description
Grid Status
Details
Grid Leader The name of the detection server that was assigned the role of grid leader
during the scan.
You can click each server name to navigate to the Server / Detector Detail
screen for that server.
Managing Network Discover target scans 1617
Managing Network Discover/Cloud Storage Discover scan histories
Recent Description
Grid Status
Details
Participating The names of the detection servers in the grid that performed the scan.
Detection
You can click each server name to navigate to the Server / Detector Detail
Servers
screen for that server.
Non The names of the detection servers in the grid that were unable to perform
Participating the scan. An error message is displayed next to each server name to describe
detection the reason for its inability to participate in the scan.
Servers
You can click each server name to navigate to the Server / Detector Detail
screen for that server.
The Recent Scan Errors section is a listing of the errors that occurred during the
scan.
If a scan has many errors, the Scan Detail screen does not display them all. To
see a complete list of errors that occurred during the scan, click Download Full
Error Report.
Table 59-6 shows the information in the Recent Scan Errors report, which provides
information about each error.
Recent Description
Scan Error
Details
Date The date and time of the error during the scan.
Path The directory path to the location of the file with the error during the scan.
Recent Scan Activity displays the most recent log entries of the notable events that
occurred during the scan.
If a scan has many activity messages, the Scan Detail screen does not display
them all. To see a complete list of scan activity messages, click Download Full
Activity Report.
Table 59-7 shows the Recent Scan Activity report, which provides information about
each activity.
Managing Network Discover target scans 1618
Managing Network Discover/Cloud Storage Discover scan histories
Date/Time The date and time when the logged event occurred.
Download Full Download a report with all scan statistics in CSV format.
Statistics
Report
Download Full Download a report with all scan errors in CSV format.
Error Report
Download Full Download a report with all scan activity in CSV format.
Activity
Report
Note: Grid scans are currently supported only on File System server scan targets.
See “Configuring scans of file systems” on page 1665.
Note: When the grid leader's grid communication certificate expire, the Scan Errors
section of the Scan Details screen also displays the Grid communication
certificate expired or not yet valid error message. You must then renew the grid
communication certificate for the grid leader.
See “Renewing grid communication certificates for detection servers” on page 249.
Server Name The name of the server. In parentheses is the type of detection server,
either Discover or Endpoint.
Running Scans A list of the scans that are currently running on this server.
Queued Scans A list of the scans that are queued to run on this server.
Scheduled Scans A list of scans that are scheduled to run in the future on this server.
You can break up scans with include, exclude, size, and date filters.
See “Setting up Endpoint Discover filters to include or exclude items from the
scan” on page 1835.
See “Filtering Discover targets by item size” on page 1600.
See “Filtering Discover targets by date last accessed or modified” on page 1601.
■ Scan non-binary files first. Binary files are less likely to contain policy violations.
For example, you can set the Exclude Filter to the following list to scan non-binary
files:
*.exe,*.lib,*.bin,*.dll,*.cab,*.dat
*.au,*.avi,*.mid,*.mov,*.mp,*.mp3,*.mp4,*.mpeg,*.wav,*.wma
To scan the rest of the files, use this filter as the Include Filter of a different scan
target.
See “Setting up Endpoint Discover filters to include or exclude items from the
scan” on page 1835.
■ For cloud storage targets, you can configure one incremental scan with a narrow
scan window (seven or fewer days) and a one-time full scan for your entire data
set. The incremental scan will find recent sensitive data at risk quickly, while
the full scan works through the bulk of your data. Because cloud repositories
can contain terabytes or petabytes of data, you can expect the full scan to take
a number of days to complete.
See “Scanning new or modified items with incremental scans” on page 1626.
See “About the difference between incremental scans and differential scans”
on page 1624.
■ For File System targets, you can configure incremental scans to check only
those files that have not yet been scanned.
See “Scanning new or modified items with incremental scans” on page 1626.
See “About the difference between incremental scans and differential scans”
on page 1624.
■ Scan new or recently modified items in one scan target, and older ones in a
second scan target.
Use the date filter to break up scans by date values, by files older than, or files
newer than.
See “Filtering Discover targets by date last accessed or modified” on page 1601.
■ After the initial scan, run differential scans to check only those items that were
added or modified since the last complete scan.
See “Scanning new or modified items with differential scans” on page 1628.
See “About the difference between incremental scans and differential scans”
on page 1624.
Managing Network Discover target scans 1623
About Network Discover/Cloud Storage Discover scan optimization
■ Scan small files in one scan target and large files in another. Scanning many
small files carries more overhead than fewer large files.
Use the size filter to break up scans by size.
See “Filtering Discover targets by item size” on page 1600.
■ Scan compressed files in a separate scan target.
Use the Include Filter to scan compressed files. For example, use the following
list:
*.zip,*.gzip
To scan the rest of the files, use this filter as the Exclude Filter of a different
scan target.
See “Setting up Endpoint Discover filters to include or exclude items from the
scan” on page 1835.
■ Scan database or spreadsheet files in a separate scan target.
Use the SQL Database target to scan database files.
See “Configuring and running SQL database scans” on page 1682.
Use the Include filter to scan spreadsheet files:
*.xls
Set up a separate scan target and use the Exclude Filter to scan everything
else.
See “Setting up Endpoint Discover filters to include or exclude items from the
scan” on page 1835.
■ Exclude the folders internal to applications. For example, in the scan of a DFS
share, exclude the internal DfsrPrivate folder. In the scan of a share on a
NetApp filer, exclude the .snapshot folder.
See “Excluding internal DFS folders” on page 1664.
See “Configuring scans of file systems” on page 1665.
■ Use Inventory Mode scanning to move to the next scan item after an incident
threshold is reached. Inventory Mode scanning can audit where confidential
data is stored without scanning all of it.
See “Creating an inventory of the locations of unprotected sensitive data”
on page 1605.
■ Dedicate as much hardware as possible to the scans. For example, suspend
or quit any other programs that run on the server.
■ Use Scan Pausing to automatically suspend scanning during work hours.
■ Run scans in parallel.
Managing Network Discover target scans 1624
About the difference between incremental scans and differential scans
Incremental scans are Differential scans are supported for the following targets:
supported for the following
■ Server > IBM (Lotus) Notes
targets:
■ Server > Exchange
■ Cloud > Box (On-prem ■ Endpoint > File System
Detection Server)
■ Server > File System
■ Server > SharePoint
Managing Network Discover target scans 1625
About incremental scans
Partial scans retain the Differential scans begin with a full scan of the Discover target.
information about the items This full scan is called the base scan.
that have been scanned.
Partial scans cannot be used as a base scan.
If files, shares, or other items
are missed because they are
inaccessible, the next
incremental scan
automatically covers the
missed items.
Subsequent runs scan all Subsequent runs scan all items that have been added or
items that have not modified since the date of the most recent full (base) scan
previously been scanned, completed.
including new or modified
The system considers the start date of the base scan for
items.
differential scanning.
An incremental scan index The most recent complete base scan serves as the
keeps track of which items comparison for which items to scan, based on the date of the
have already been scanned. base scan.
5 Complete the other steps to set up or modify a Discover target and run the
scan.
See “Configuring the required fields for Network Discover targets” on page 1588.
See “Network Discover/Cloud Storage Discover scan target configuration
options” on page 1586.
See “Setting up server scans of file systems” on page 1652.
6 To manage incremental scanning and diagnose issues, refer to the following
topic:
See “About managing incremental scans” on page 1627.
Note: Optionally, when you select the Scan only new or modified items
(incremental scan) option, you can select one or more existing file system
server scan targets whose incremental indexes will be re-used in the new scan.
Re-using incremental indexes enables you to save time on indexing scanned
items in the new scan target. This functionality is available only while you are
creating a new scan target, or modifying an existing one before running a scan
on it for the first time.
■ To scan all items, set Always scan all items (full scan) for the Discover
detection server target.
■ If the setting Always scan all items (full scan) is selected, then any previous
index entries for that target are cleared before the scan starts. The index is not
repopulated during the scan.
If you want to scan all items and then continue incremental scanning, select the
option Scan all items for the next scan. Subsequent scans will be
incremental. This is not an option for cloud storage targets.
■ When a Discover target is deleted, the incremental scan index is not automatically
removed.
Managing Network Discover target scans 1628
Scanning new or modified items with differential scans
For File System server scan targets, you can alternatively choose two or more
servers to perform a grid scan. The scan workload is then distributed across the =
servers in the grid.
After a scan starts, it continues to run on the same server until the scan completes,
is aborted, or paused. On resumption the scan may be assigned to run on a different
server. For grid scans, the role of the grid leader is assigned to one of the servers
in the grid based on server availability.
Automated load balancing is not supported. If a Network Discover/Cloud Storage
Discover Server completes running all its scans, scans from other servers do not
migrate to the unloaded server. However, a scan can be migrated manually, by
pausing and restarting the scan.
To run multiple scanner targets on the same Network Discover/Cloud Storage
Discover Server, separate ports must be configured for each scanner. The default
port for a new scanner is a value not already used by any scan targets.
See “Troubleshooting scanners” on page 1715.
To configure parallel scanning
1 In the Enforce Server administration console, go to System > Servers and
Detectors > Overview.
2 Select a Network Discover/Cloud Storage Discover Server to configure, and
click the server name.
3 Click the Configure option at the top.
4 Then select the Discover tab.
5 Set the maximum number of parallel scans to run on this Network
Discover/Cloud Storage Discover Server.
The default value for Maximum Parallel Scans is 1. The maximum count can
be increased at any time. After it is increased, then any queued scans that are
eligible to run on the Network Discover/Cloud Storage Discover Server are
started. The count can be decreased only if the Network Discover/Cloud Storage
Discover Server has no running scans. Before you reduce the count, pause or
stop all scans on the Network Discover/Cloud Storage Discover Server.
Note: If you plan to use the grid scanning feature to distribute the scanning
workload across multiple detection servers, retain the default value (1).
6 Click Save.
Managing Network Discover target scans 1630
Configuring parallel scanning of Network Discover/Cloud Storage Discover targets
7 Click Done.
8 You can view the scans that are actively running, queued, scheduled, or paused
on each Network Discover/Cloud Storage Discover Server. In the Enforce
Server administration console, go to Manage > Discover Scanning > Discover
Servers.
See “Managing Network Discover/Cloud Storage Discover target scans”
on page 1608.
Chapter 60
Using Server FlexResponse
plug-ins to remediate
incidents
This chapter includes the following topics:
the Java programming language. The Server FlexResponse API enables developers
to build a plug-in that can be used to implement incident responses for use in
Automated and Smart Response rules.
The following are example Network Protect actions that you can implement by
developing a Server FlexResponse plug-in:
■ Change Access Control Lists (ACL) on files. For example, you can remove guest
access to selected files.
■ Apply Digital Rights Management (DRM). For example, you can apply digital
rights to documents so external parties are restricted in their access to sensitive
material. These digital rights can include “do not forward” or “do not print.”
■ Encrypt files.
■ Migrate files to SharePoint. The custom protect action can move files from shares
to a SharePoint repository, and then apply DRM and ACLs.
■ Perform workflow and automation of remediation responses.
■ Use the Symantec Workflow business process automation workflow.
The following steps are involved in building, deploying, and using a Server
FlexResponse plug-in:
■ Developing a plug-in using the Java API. This stage involves designing and
coding the plug-in and remediation action.
Note: Server FlexResponse plug-ins that were created for Symantec Data Loss
Prevention versions 12.x and 14.x are compatible with Symantec Data Loss
Prevention 15.x.
The sections that follow describe how to deploy and configure pre-made
FlexResponse plug-ins, as well as how to use custom plug-in actions in Symantec
Data Loss Prevention policies. You can obtain some Server FlexResponse plug-ins
directly from Symantec. You can also develop your own custom plug-ins using the
Server FlexResponse API. For information about developing plug-ins using the
Java API, See the Symantec Data Loss Prevention Server FlexResponse Platform
Developers Guide.
Table 60-1
Step Action Description
1 Deploy a Server FlexResponse plug-in to the Each Server FlexResponse plug-in must be deployed to
Enforce Server computer. the Enforce Server computer before you can use the plug-in
actions in Symantec Data Loss Prevention policies.
2 Create a response rule that uses a custom See “Configuring the Server FlexResponse action”
Server FlexResponse incident response on page 1290.
action.
Using Server FlexResponse plug-ins to remediate incidents 1634
Deploying a Server FlexResponse plug-in
3 (Optional) Use the Server FlexResponse If you are using a Server FlexResponse plug-in action in a
plug-in to manually remediate incidents. smart response rule, you must manually locate an incident
and execute the FlexResponse action.
4 Verify the results. See “Verifying the results of an incident response action”
on page 1642.
SymantecDLP\Protect\plugins\
SymantecDLP\Protect\plugins\
5 Make sure that the Symantec Data Loss Prevention protect user has read and
execute access to both the plug-in JAR file and the plug-in properties file.
6 To load the plug-in, stop the Vontu Incident Persister and Vontu Manager
services, and then restart them.
Note: If you have installed the Network Protect ICE license and configured the
Enforce Server to connect to the Symantec ICE Cloud, you can use the SharePoint
Encrypt response rule action which is made available through an encryption Server
FlexResponse plug-in that is installed automatically with Symantec Data Loss
Prevention 15. No additional configuration or customization is required for the
encryption plug-in. See “Configuring the Enforce Server to connect to the Symantec
ICE Cloud” on page 212.
Note: The SharePoint Encrypt plug-in only functions if you are connecting to your
SharePoint deployment using the SharePoint solution. If you are scanning
SharePoint without using the SharePoint solution, you cannot use this plug-in.
Using Server FlexResponse plug-ins to remediate incidents 1636
Deploying a Server FlexResponse plug-in
SymantecDLP\Protect\config
2 Locate the following line in the file, which specifies the JAR files of the plug-ins
to construct at load time:
com.symantec.dlpx.flexresponse.Plugin.plugins =
plugin1.jar,plugin2.jar
Remove the comment mark from the beginning of the line, if necessary, and
replace plugin1.jar,plugin2.jar with the names of the plug-in JAR files
you want to deploy. Separate multiple JAR files with commas.
3 Edit any additional parameters in this file.
Table 60-2 describes the additional properties for the Server FlexResponse
API in the Plugins.properties file.
4 Stop the Vontu Incident Persister and Vontu Manager services, and then restart
them. This loads the new plug-in and the other parameters in this file.
If you later change the Plugins.properties file, you must restart both the
Vontu Incident Persister and Vontu Manager services to apply the change.
In Table 60-2 plugin-id is a unique identifier of the plugin within this properties file,
for example test1.
protect.plugins.directory The directory under which all Symantec Data Loss Prevention
plug-ins are installed.
Using Server FlexResponse plug-ins to remediate incidents 1637
Deploying a Server FlexResponse plug-in
The container in which your JAR file is deployed includes all of the
public JRE classes provided by the JVM installed with Symantec
Data Loss Prevention. The container also includes all of the
FlexResponse API classes described in this document (classes in
the com.symantec.dlpx package hierarchy). Your FlexResponse
plug-in code may have dependencies on other JAR files that are
not provided by the plug-in container. Place any external JAR files
that you require in the \plugins directory of the Enforce Server
where the FlexResponse plug-in is deployed. Then reference the
JAR in this property.
com.vontu.enforce.incidentresponseaction. The maximum number of incidents that can be selected from the
incident list report for one Server FlexResponse Smart Response
IncidentResponseActionInvocationService.
rule invocation.
maximum-incident-batch-size
The default is 100.
com.vontu.enforce.incidentresponseaction. The execution thread timeout for the serial thread executor (global).
Note: If you have installed the Network Protect ICE license and configured the
Enforce Server to connect to the Symantec ICE Cloud, you can use the SharePoint
Encrypt response rule action which is made available through an encryption Server
FlexResponse plug-in that is installed automatically with Symantec Data Loss
Prevention 15.0 and later versions. No additional configuration or customization is
required for the encryption plug-in. See “Configuring the Enforce Server to connect
to the Symantec ICE Cloud” on page 212.
2 In this file, enter the keys and values of all the parameters for the plug-in:
display-name=plugin 1
plugin-identifier=IncidentResponseAction1
To update the properties, you must stop the Vontu Manager and Vontu Incident
Persister services, and then restart them to load in the new values.
See Table 60-3 on page 1639.
3 Make sure that the Symantec Data Loss Prevention protect user has read and
execute access to the plug-in properties file.
Table 60-3 describes the properties in the plug-in-name.properties file.
Using Server FlexResponse plug-ins to remediate incidents 1639
Deploying a Server FlexResponse plug-in
If you change the value of this name in the properties file after the plug-in is loaded,
you must restart the Vontu Incident Persister and Vontu Manager services to load in
the new name.
This value is mandatory and it must be specified in at least one place, either in the
configuration properties file, or the plug-in metadata class.
For international environments, this display name can be in the local language.
plugin-identifier The identifier for this plug-in. This identifier should be unique for all Server
FlexResponse plug-ins on this Enforce Server.
This value is mandatory and it must be specified in at least one place, either in the
configuration properties file, or the plug-in metadata class.
If any response rule is assigned to this Server FlexResponse plug-in, do not change
this identifier in your properties file.
inventory-credential.credential=
InventoryDB1
custom name These optional custom parameters are required to pass information to your plug-in.
These parameters are passed to each invocation of the plug-in and can optionally
Example:
be made available at the time this plug-in is constructed.
test1.value.1
test1.value.2
Using Server FlexResponse plug-ins to remediate incidents 1640
Locating incidents for manual remediation
timeout Optional parameter with the timeout in milliseconds for the execution threads for this
plug-in.
If the timeout value is reached, the user interface shows the Server FlexResponse
plug-in status as failed, and the incident history is updated with a timeout message.
If you change the value of this property in the properties file after the plug-in is loaded,
you must stop the Vontu Incident Persister and Vontu Manager services, and then
restart them.
maximum-thread-count Optional parameter with the number of parallel threads available for execution of this
plug-in. This parameter is ignored if is-serialized is set.
The default is 2.
If you change the value of this property in the properties file after the plug-in is loaded,
you must stop the Vontu Incident Persister and Vontu Manager services, and then
restart them.
is-serialized The value of this parameter can be true or false. Set this optional parameter to true
if this plug-in execution must be serialized (one thread at a time). All serialized plug-ins
share a single execution thread. If this parameter is set, then timeout and
maximum-thread-count are ignored.
If you change the value of this property in the properties file after the plug-in is loaded,
you must stop the Vontu Incident Persister and Vontu Manager services, and then
restart them.
■ From the list of incidents, check the box to the left of each incident to select
that incident for remediation. You can select multiple incidents.
■ From the list of incidents, select all incidents on this page by clicking the
check box on the left of the report header.
■ From the list of incidents, select all incidents in the report by clicking the
Select All option on the upper-right side of the report.
■ Click one incident to display the Incident Detail, and select that one incident
for possible remediation.
After you have selected the incidents for remediation, you can manually
remediate them.
See “Using the action of a Server FlexResponse plug-in to remediate an incident
manually” on page 1641.
Issue Suggestions
During creation of a Smart Response This issue happens because your plug-in did not
Rule, the drop-down menu does not load.
display the action All: Server
At the end of the file Plugins.properties, enter
FlexResponse.
the name of your plug-in JAR file on the list of
During creation of an automated plug-ins. Make sure that this line is not commented
Response Rule, the drop-down menu out.
does not display the action All: Server
Restart both the Vontu Incident Persister and Vontu
FlexResponse.
Manager services to load your plug-in.
If you have multiple plug-ins, your
Your plug-in properties file and plug-in code may
plug-in name does not display in the All:
not match appropriately. Look at the Tomcat log
Server FlexResponse drop-down
for errors.
menu.
The log file is localhost.date.log. This log
file is in SymantecDLP\Protect\logs\tomcat.
Issue Suggestions
Your plug-in does not execute Check the incident snapshot history for messages
successfully. from your plug-in and the plug-in framework.
Table 61-1 Setting up a Box cloud storage scan using an on-premises detection
server
1 Go to Manage > Discover See “Configuring scans of Box cloud storage targets” on page 1646.
Scanning > Discover Targets
to create a new target and to
configure scanning Box cloud
storage.
2 Set any additional scan target See “Network Discover/Cloud Storage Discover scan target
configuration options. configuration options” on page 1586.
3 To apply a visual tag to See “Configuring remediation options for Box cloud storage targets”
confidential files, or to quarantine on page 1649.
confidential files in the cloud or
on-premises, configure Network
Protect.
4 Start the Box cloud storage scan. Select the scan target from the target list, then click the start icon.
5 Verify that the scan is running See “About the Network Discover/Cloud Storage Discover scan
successfully. target list” on page 1609.
■ Users/Groups: Select Scan all to scan all users and groups for this target.
Select Scan selected to scan only the specified users and groups. Upload
a CSV or text file (comma- or new-line separated) list for the users and
groups you want to scan.
■ Folder Collaboration: Select an option for scanning collaborative folders
from the drop-down list in this section:
■ Scan All: Select this option to scan all folders for this target.
■ Scan only private folders: Select this option to scan only private,
non-collaborative folders.
■ Scan only collaborative folders (external or internal): Select this
option to scan all collaborative folders for this target.
■ Scan only external collaborative folders: Select this option to scan
only external collaborative folders for this target.
■ Shared Links: Select Scan only shared links to scan if you only want to
scan files or folders with shared links. You can select from these additional
options:
■ Not password protected: Select this option to scan only files and
folders with shared links that are not password protected.
■ With no expiration date: Select this option to scan only files and folders
with shared links that have no expiration date.
■ With download permissions: Select this option to scan only files and
folders with shared links that have download permissions.
■ File Type: Enter the extension for file types you want to include or exclude
from your scan, such as *.dwg or *.csv.
■ File Size Filters: Enter the lower and upper file size limits you want to
ignore in your scan, in bytes, kilobytes, or megabytes.
■ File Date Filters: Enter a date range for the added or modified files and
folders you want to scan.
5 Click Save.
6 Add a new policy, or edit an existing policy.
See “Configuring policies” on page 390.
7 Click the Response tab.
8 In the pull-down menu, select one of the response rules that you previously
created.
9 Click Add Response Rule.
The selected response rule specifies the automated response when this policy
triggers an incident.
Several response rules with different conditions can exist for a policy.
10 Create a new Box cloud storage Network Discover target, or edit an existing
target.
See “Configuring scans of Box cloud storage targets” on page 1646.
11 Click the Protect tab on the Box target page.
12 Under Allowed Protect Remediation, check Quarantine and/or Enable all
tag response rules when scanning, as appropriate.
13 Under Quarantine Details, select one of the following options:
■ Quarantine in the cloud
Optional: To quarantine the sensitive content in the cloud, enter the Box
User and Quarantine sub-folder in the appropriate fields. The Box User
account can be either the scanning account or a non-administrative user
account.
If you select Quarantine in the cloud and leave these fields blank,
Symantec Data Loss Prevention uses the scanning account as the
quarantine account.
Setting up scans of Box cloud storage using an on-premises detection server 1651
Configuring remediation options for Box cloud storage targets
14 Click Save.
Chapter 62
Setting up scans of file
shares
This chapter includes the following topics:
1 Verify that your network file system is on the list of supported targets. See “Supported file system targets”
on page 1653.
2 Optional: Run a Content Root Enumeration scan to automatically See “Automatically discovering
discover file system content roots within your domain. servers and shares before
configuring a file system target”
on page 1654.
3 Go to Manage > Discover Scanning > Discover Targets to create a See “Configuring scans of file
new target for a file system and to configure scanning of file systems. systems” on page 1665.
4 Set any additional scan target configuration options. See “Network Discover/Cloud
Storage Discover scan target
For scanning of Microsoft Outlook Personal Folders, verify that the option
configuration options” on page 1586.
is set.
See “Configuring scans of Microsoft
Outlook Personal Folders (.pst
files)” on page 1664.
5 To automatically move, quarantine, or encrypt files, configure Network See “Configuring Network Protect
Protect. for file shares” on page 1671.
Note: The encryption functionality is available only after you configure
the Enforce Server to connect to Symantec ICE.
6 Start the file system scan. Select the scan target from the
target list, then click the Start icon.
Go to Manage > Discover Scanning > Discover Targets.
7 Verify that the scan is running successfully. See “About the Network
Discover/Cloud Storage Discover
scan target list” on page 1609.
In addition, the File System target supports scanning of the following file types:
■ Microsoft Outlook Personal Folders (.pst files) created with Outlook 2007, 2010,
2013, and 2016.
The Network Discover Server scanning this target must be running a Windows
operating system, and Outlook 2007 or later must be installed on that system.
See “Configuring scans of Microsoft Outlook Personal Folders (.pst files)”
on page 1664.
■ File systems on UNIX systems, even if they are not exposed as CIFS or NFS
shares.
Use the SFTP protocol to provide a method similar to the scans of file shares.
You can also scan the local file system on a Linux Network Discover Server by
listing the path name in the content root. For example, you can enter
/home/myfiles.
7 In the Filters section, select at least one filter for your scan:
■ IP Range: Specify an IP range to scan for content roots.
■ Server Names: Specify one or more server name filters. Use the drop-down
menu to refine your filter.
8 Click Save.
To start or stop a Content Root Enumeration scan
1 In the Enforce Server administration console, go to Manage > Discover
Scanning > Content Root Enumeration.
2 Select the scan or scans you want to start or stop.
3 Do one of the following:
■ To start a scan, click Start.
■ To stop a running scan, click Stop.
Setting up scans of file shares 1656
Automatically discovering servers and shares before configuring a file system target
Table 62-2
Configuration property Default value Description
You can view the latest remediation status of an incident in the incident snapshot.
See “Discover incident snapshot” on page 1385.
You can also filter and summarize Network Discover reports by incident remediation
status.
See “About filters and summary options for reports” on page 1441.
have a multi-tier installation, there will be separate files for the Enforce Server and
Network Discover Server.
Table 62-4
Property Default value Description
6 Optionally, if you selected the Scan only new or modified items (incremental
scan) option, you can select one or more existing scan targets whose
incremental indexes will be re-used in the new scan. Re-using incremental
indexes enables you to save time on indexing scanned items in the new scan
target.
Setting up scans of file shares 1666
Configuring scans of file systems
Note: You can add and remove re-usable incremental indexes only while
configuring a new scan target and before running a scan on this target for the
first time.
Note: Before you run a grid scan for the first time, ensure that the grid
communication port that is configured in the ScanManager.properties file is
open on all of the servers in the grid. See “Configuration options for grid
scanning” on page 1730.
9 For the Scan Mode option, select one of the following options:
■ Select Use single server for scan to run scans using only one server. If
you selected more than one server in the previous step, Symantec Data
Setting up scans of file shares 1667
Configuring scans of file systems
Loss Prevention automatically selects one of the servers when the scan
starts.
■ Select Use all selected servers for scan in a grid to enable the grid
scanning feature which distributes the scan workload across multiple
servers. When you initialize a scan, one of the servers is assigned the role
of the Grid Leader which coordinates the actions of the other servers.
Note: You must select at least two servers for the scan target to be able to
run a grid scan. Symantec recommends that you apply the same hardware
and software configuration to all of the detections servers that you intend
to use for grid scans. Symantec Data Loss Prevention currently supports
grids scans using a maximum of 11 detection servers, including the grid
leader.
\\server\marketing
nfs:\\share\marketing
//server/engineering/documentation
/home/protect/mnt/server/share/marketing
c:\share\engineering
\\server\share
\\server.company.com
smb://server.company.com
\\10.66.23.34
Note: If you chose to enable incremental scanning for this scan target,
and if you selected one or more existing scan targets whose incremental
indexed will be re-used, you can merge existing scan targets by
specifying a higher level directory path. Alternatively, you can specify
more a granular directory path to split a larger existing scan target into
multiple smaller scan targets.
If your content root list includes a large number of content roots, you can filter
the list to include only those content roots that are relevant to your Discover
Target scan. In the Content Roots section, click Filters, then enter your filter
text. For example, to see only shares on a server named my_company, enter
\\my_company in the Filters text field.
To delete content roots from your target, select the content roots from the list
and click Delete.
12 On the Filters tab, specify include and exclude filters, size filters, and date
filters.
■ Use Include Filters and Exclude Filters to specify the files that Symantec
Data Loss Prevention should process or skip. Note that you must specify
absolute paths. If the field is empty, Symantec Data Loss Prevention
Setting up scans of file shares 1669
Configuring scans of file systems
performs matching on all files in the file share. If you enter any values for
the Include Filters, Symantec Data Loss Prevention scans only those
folders, files, or documents that match your filter. Delimit entries with a
comma, but do not use any spaces. When both Include Filters and Exclude
Filters are present, Exclude Filters take precedence.
See “Setting up Endpoint Discover filters to include or exclude items from
the scan” on page 1835.
When scanning DFS shares, exclude the internal DFS folder.
See “Excluding internal DFS folders” on page 1664.
When scanning shares on a NetApp filer with the Snapshot application,
exclude the .snapshot folder. This folder is usually at the base of the file
system or network share; for example, \\myshare\.snapshot.
■ Specify size filters.
The size filters let you exclude files from the matching process based on
their size. Symantec Data Loss Prevention includes only the files that match
your specified size filters. If you leave these fields empty, Symantec Data
Loss Prevention performs matching on files or documents of all sizes.
■ Specify date filters.
The date filters let you include files from the matching process based on
their dates. Any files that match the specified date filters are scanned.
4 For the Action, select Network Protect: Copy File, Network Protect:
Quarantine File, or Network Protect: Encrypt File.
For the Quarantine File action, you can optionally leave a marker file in place
of the file that was removed by checking the Marker File check box. Type the
marker text in the Marker Text box. The marker file is a text file. The marker
text can contain substitution variables. Click inside the Marker Text box to see
a list of insertion variables.
If the original file was of some other file type, the original file is moved to the
quarantine area. The marker file has the original file name plus a .txt
extension. The default file extensions that are retained are listed in the
properties file ProtectRemediation.properties. The retained file extensions
include txt, doc, xls, ppt, java, c, cpp, h, and js. For example, a file that is
named myfile.pdf would have a marker file name of myfile.pdf.txt.
You can create a new subdirectory for the quarantined files from each scan
(the default). You can change the default and append the scan information to
the file name (versioning) in one quarantine directory. Edit the properties file
ProtectRemediation.properties to change the default.
Note: The encryption function is available only if you have installed the Network
Protect ICE license and configured the Enforce Server to connect to the
Symantec ICE Cloud.
5 Click Save.
6 Add a new policy, or edit an existing policy.
See “Configuring policies” on page 390.
7 Click the Response tab.
8 In the pull-down menu, select one of the response rules that you previously
created.
9 Click Add Response Rule.
This response rule then specifies the automated response when this policy
triggers an incident during the scanning of a file.
Several response rules with different conditions can exist for a policy.
10 Create a new file system Network Discover target, or edit an existing target.
See “Configuring scans of file systems” on page 1665.
Setting up scans of file shares 1673
Configuring Network Protect for file shares
11 With Network Protect enabled in the license, a Protect tab appears on the File
System target page that contains the Network Protect remediation options.
Under Allowed Protect Remediation, choose whether the file should be
copied or quarantined (moved) or encrypted to protect the information.
This selection must match the Action selection from the response rule.
Also, a response rule with that action (copy, quarantine, or encrypt) should
exist within one of the policies that are selected for this file system target.
12 If you chose to copy or quarantine confidential files, under Copy/Quarantine
Share, specify the share where files are quarantined or copied.
Optionally, you can select a named credential from the credential store in the
Use Saved Credentials drop-down menu.
13 If you chose to copy or quarantine confidential files, under Protect Credential,
specify the write-access credential for the location of the file that was scanned.
To move the files for quarantine during remediation, the Network Discover
target definition must have write access for both the quarantine location and
the original file location. Specify the path (location) where the files are copied
or quarantined. Type the write-access user name and password for that location.
Normally, scanned shares require only read-access credentials (for example,
if the Copy option was selected).
Specify the share write-access credential, if it is different from the read-access
credential.
Optionally, you can select a named credential from the credential store in the
Use Saved Credentials drop-down menu.
See “Configuring the Enforce Server to connect to the Symantec ICE Cloud”
on page 212.
Chapter 63
Setting up scans of Lotus
Notes databases
This chapter includes the following topics:
1 Verify that your IBM (Lotus) Notes database is on the list of See “Supported IBM (Lotus) Notes targets”
supported targets. on page 1675.
2 Configure the scan for IBM (Lotus) Notes DIIOP mode. See “Configuring IBM (Lotus) Notes DIIOP
mode configuration scan options” on page 1679.
Setting up scans of Lotus Notes databases 1675
Supported IBM (Lotus) Notes targets
3 Click Manage > Discover Scanning > Discover Targets to See “Configuring and running IBM (Lotus)
create a Lotus Notes target and to configure scans of Lotus Notes scans” on page 1675.
Notes databases.
4 Set any additional scan options for the IBM (Lotus) Notes target. See “Network Discover/Cloud Storage
Discover scan target configuration options”
on page 1586.
5 Start the IBM (Lotus) Notes database scan. Select the scan target from the list, then click
the Start icon.
Click Manage > Discover Scanning > Discover Targets.
6 Verify that the scan is running successfully. See “Managing Network Discover/Cloud
Storage Discover target scans” on page 1608.
To set up a new target for the scan of IBM (Lotus) Notes databases
1 In the Enforce Server administration console, go to Manage > Discover
Scanning > Discover Targets.
2 Click New Target, and use the pull-down menu to select the Lotus Notes
target type.
3 On the General tab, type the Name of this Discover target.
Type a unique name for the target, up to 255 characters.
4 Select the Policy Group.
If no other policy group has been selected, the Default Policy group is used.
To apply a policy group, select the policy group to use for this target. You can
assign multiple policy groups to a target.
You can define policy groups on the Policy Group List page.
5 Specify scheduling options.
Choose Submit Scan Job on Schedule to set up a schedule for scanning the
specified target. Select an option from the schedule drop-down list to display
additional fields. Choose Pause Scan between these times to automatically
pause scans during the specified time interval. You can override the pause
window of a scan target by going to the Discover Targets screen and clicking
the start icon for the target entry. The pause window remains intact, and any
future scans that run up against the window can pause as specified. You can
also restart a paused scan by clicking the continue icon for the target entry.
6 On the Targeting tab, under Scan Server and Target Endpoints, select the
Discover Server (or multiple Discover Servers) where you want to run the scan.
Only the detection servers that were configured as Discover Servers appear
on the list. If there is only one Discover Server on your network, the name of
that server is automatically specified. You should configure your Discover
Servers before you configure targets. You must specify at least one server
before you can run a scan for this target.
7 On the Scanned Content tab, select or enter the credentials.
You can specify a default user name and password to access all Domino
servers that are specified in the target. Credentials can be overridden for a
server by editing a single entry in the list of Domino servers. Credentials for a
single entry are possible only if the list is created with individually entered server
names. Credentials for a single entry are not possible in an uploaded text file
that contains the list of servers.
8 On the Scanned Content tab, specify the content root for a Lotus Notes scan
as either one Domino server, or a list of Domino servers.
Setting up scans of Lotus Notes databases 1677
Configuring and running IBM (Lotus) Notes scans
[hostname,username,password]
For a native mode configuration, you can use the name "local" in the list of
Domino servers. Specifying "local" includes the local databases visible to
the client only to be scanned. For example, instead of the URI enter the
following text:
local
dominoserver1.company.com
dominoserver2.company.com
dominoserver3.company.com
They can be found in the installation directories of an IBM (Lotus) Notes client,
and an IBM (Lotus) Domino server with the Domino Designer installed.
The Notes.jar file is in the following IBM (Lotus) Notes client default installation
directories:
■ IBM Notes 8
C:\Program Files\IBM\lotus\notes\jvm\lib\ext\Notes.jar
■ Lotus Notes 7
C:\Program Files\lotus\notes\jvm\lib\ext\Notes.jar
Use the version of the JAR file corresponding to the version of the IBM (Lotus)
Notes client.
See “Supported IBM (Lotus) Notes targets” on page 1675.
The NCSO.jar file is in the following IBM (Lotus) Domino server default
installation directories, when the Domino Designer is installed:
■ IBM Notes 8
C:\Program Files\IBM\lotus\Notes\Data\domino\java\NCSO.jar
Setting up scans of Lotus Notes databases 1680
Configuring IBM (Lotus) Notes DIIOP mode configuration scan options
■ Lotus Notes 7
C:\Program Files\lotus\notes\data\domino\java\NCSO.jar
lotusnotescrawler.use.diiop = true
1 Verify that your SQL database is on the list of supported See “Supported SQL
targets. database targets”
on page 1682.
2 Click Manage > Discover Scanning > Discover See “Configuring and
Targets to create an SQL database target and to running SQL database
configure scans of SQL databases. scans” on page 1682.
Setting up scans of SQL databases 1682
Supported SQL database targets
3 Set any additional scan options for the SQL database See “Network
target. Discover/Cloud Storage
Discover scan target
configuration options”
on page 1586.
4 Install the JDBC driver for the SQL database, if needed. See “Installing the JDBC
driver for SQL database
targets” on page 1686.
5 Start the SQL database scan. Select the scan target from
the target list, then click the
Click Manage > Discover Scanning > Discover
Start icon.
Targets.
Contact Symantec Data Loss Prevention support for information about scanning
any other SQL databases.
Scanning of SQL databases occurs for a specific set of column data types. The
SQL Database scan extracts data of the following Java Database Connectivity
(JDBC) types: CLOB, BLOB, BIGINT, CHAR, LONGVARCHAR, VARCHAR,
TINYINT, SMALLINT, INTEGER, REAL, DOUBLE, FLOAT, DECIMAL, NUMERIC,
DATE, TIME, and TIMESTAMP. The mapping between these column types and
those of a specific database depends on the implementation of the JDBC driver for
the scan.
To set up a scan for an SQL Database
1 In the Enforce Server administration console, go to Manage > Discover
Scanning > Discover Targets.
2 Click New Target, and use the pull-down menu to select the SQL Database
target type.
3 On the General tab, type the Name of this Discover target.
Type a unique name for the target, up to 255 characters.
4 Select the Policy Group.
If no other policy group has been selected, the Default Policy group is used.
To apply a policy group, select the policy group to use for this target. You can
assign multiple policy groups to a target.
5 Specify scheduling options.
Choose Submit Scan Job on Schedule to set up a schedule for scanning the
specified target. Select an option from the Schedule drop-down list to display
additional fields. Choose Pause Scan between these times to automatically
pause scans during the specified time interval. You can override a target’s
pause window by going to the Discover Targets screen and clicking the start
icon for the target entry. The pause window remains intact, and any future
scans that run up against the window can pause as specified. You can also
restart a paused scan by clicking the continue icon in the target entry.
6 On the Targeting tab, under Scan Server and Target Endpoints, select the
Discover Server (or multiple Discover Servers) where you want to run the scan.
Only the detection servers that were configured as Discover Servers appear
on the list. If there is only one Discover Server on your network, the name of
that server is automatically specified. You should configure your Discover
Servers before you configure targets. You must specify at least one server
before you can run a scan for this target.
7 On the Scanned Content tab, select or enter the credentials.
8 Select one of the following methods for entering the databases:
■ Use database servers from an uploaded file
Setting up scans of SQL databases 1684
Configuring and running SQL database scans
Create and save a plain text file (.txt) with the servers you want to scan.
Click Browse to locate the list and Upload to import it. The user name and
password that is specified on the Scanned Content tab of the Add SQL
Database Target page is used.
Enter the databases using the following syntax. The vendor name can be
oracle, db2, or sqlserver. The data source is the subname of the JDBC
connection string for that driver and database. The documentation for the
JDBC driver describes this subname. You can optionally enter the maximum
rows to scan per table in the database.
vendor_name:datasource[, maximum-rows-to-scan]
For example:
oracle:@//oracleserver.company.com:1521/mydatabase
db2://db2server.company.com:50000/mydatabase,300
For some SQL Servers, you must also specify the SQL instance name, as
in the following example:
sqlserver://sqlserver.company.com:1433/mydatabase;
instance=myinstance
9 On the Filters tab, enter the optional Include and Exclude filters.
Use the Include Filters and Exclude Filters to specify SQL databases and the
tables that Symantec Data Loss Prevention should process or skip.
When both Include Filters and Exclude Filters are used, the Exclude Filters
take precedence. Any table that matches the Include Filters is scanned, unless
it also matches the Exclude Filters, in which case it is not scanned.
If the Include Filters field is empty, Symantec Data Loss Prevention performs
matching on all tables. These tables are returned from the table query of the
target SQL databases. If you enter any values in the field, Symantec Data Loss
Prevention scans only those databases and tables that match your filter.
The syntax is a pattern for the database, a vertical bar, and a pattern for the
table name. Multiple patterns can be separated with commas. Standard pattern
matching applies. For example, “?” matches a single character.
Because the table name matching is not case-sensitive for many databases,
upper case conversion occurs. The table name in the pattern and the table
name it is matched against are converted to upper case before the match.
The following example would match the employee table in all databases.
*|employee
The following example would match all tables in all Oracle databases.
oracle:*|*
For SQL Server 2005 and DB2, the default table query returns table names in
the format schema_name.table_name. Include Filters and Exclude Filters for
SQL Server and DB2 should match this format.
See the following examples:
sqlserver:*|HRschema.employee
sqlserver:*|*.employee
10 Select the Advanced tab for options to optimize scanning. On the Advanced
tab, you can configure throttling options or Inventory Mode for scanning.
■ Throttling Options
Enter the maximum number of rows to be processed per minute per
detection server or the maximum number of bytes to be processed per
minute per detection server. If you select both options, then the scan rate
is slower than both options. The scan rate is slower than the specified
number of rows per minute and the specified number of bytes per minute.
Setting up scans of SQL databases 1686
Installing the JDBC driver for SQL database targets
For bytes, specify the unit of measurement from the drop-down list. The
options are bytes, KB (kilobytes), or MB (megabytes).
■ Inventory Scanning
Enter the number of incidents to produce before moving on to the next item
to scan. The next item is the next database from the list in the Scanned
Content tab. To audit whether confidential data exists on a target, without
scanning all of it, set up Inventory Mode for scanning. Setting incident
thresholds can improve the performance of scanning by skipping to the
next item to scan, rather than scanning everything.
See “Creating an inventory of the locations of unprotected sensitive data”
on page 1605.
2 Copy the driver files to the default SQL drivers directory Protect/lib/jdbc.
3 Change the permissions of the JDBC driver files so that the Protect user has
at least read permission.
4 The sqldatabasecrawler.properties file may also need to be modified to
specify the correct JAR names for the selected drivers.
See “SQL database scan configuration properties” on page 1687.
Setting up scans of SQL databases 1687
SQL database scan configuration properties
driver_class.sqlserver = net.sourceforge.jtds.jdbc.Driver
■ driver_subprotocol.vendor_name
Specifies the subprotocol portion of the JDBC connection string.
Example:
driver_subprotocol.sqlserver = jtds:sqlserver
■ driver_jar.vendor_name
Specifies the list of JAR files that the driver requires. The JAR files are stored
in the directory that is named in sqldrivers.dir.
See “Installing the JDBC driver for SQL database targets” on page 1686.
Examples:
driver_jar.sqlserver = jtds-1.2.2.jar
driver_jar.db2 = db2jcc.jar, db2jcc_license_cu.jar
■ driver_table_query.vendor_name
Specifies the query to execute to return a list of tables to scan. Typically, the
query should return all user tables in the database. Note that the database
account that issues this query needs appropriate rights to be granted to it by
the database administrator.
You must use an account to scan that can make the driver_table_query in
sqldatabasecrawler.properties and return results. You can test the scan
configuration by using sqlplus to log on as the scan user, and to run the query.
If you get results, you have the permissions to complete the scan. If you do not
get results, then you either have to change the query, or change the privileges
for the scan user.
Example:
Setting up scans of SQL databases 1688
SQL database scan configuration properties
■ driver_row_selector.vendor_name
Specifies the format of the query to use to select the rows from the table. This
vendor name varies, depending on the database. Examples are included in the
sqldatabasecrawler.properties configuration file for the most common
databases.
The following substitution variables are used in the query:
0=TABLENAME
1=COLUMNS
2=ROWNUM
Example:
■ quote_table_names.vendor_name
Specifies whether table names are quoted before the row selection query is
created. Enabling this feature allows tables with numeric names to be scanned.
For example, Payroll.1 becomes “Payroll”.“1” when the name is quoted.
Example:
quote_table_names.sqlserver=true
■ sqldrivers.dir
Specifies the location of the directory in which the JDBC driver JAR files are
placed.
Chapter 65
Setting up scans of
SharePoint servers
This chapter includes the following topics:
1 Verify that your SharePoint server is on the list of See “Supported SharePoint
supported targets. server targets” on page 1692.
Setting up scans of SharePoint servers 1690
About scans of SharePoint servers
2 Optional: Verify that you have sufficient See “Access privileges for
permissions to install the SharePoint solution on SharePoint scans” on page 1692.
the Web Front Ends in a Farm.
See “Installing the SharePoint
Also verify that the scan user has the permissions solution on the Web Front Ends
to run the scan of the SharePoint server. in a farm” on page 1697.
3 Optional: Install the SharePoint solution on the See “Installing the SharePoint
Web Front Ends in a Farm. solution on the Web Front Ends
in a farm” on page 1697.
Optional: configure your Discover server or
servers to scan SharePoint without using the See “Enabling SharePoint
SharePoint solution. scanning without installing the
SharePoint solution” on page 1699.
4 Click Manage > Discover Scanning > Discover See “Configuring and running
Targets to create a SharePoint target and to SharePoint server scans”
configure scans of SharePoint servers. on page 1693.
5 Set any additional scan options for the SharePoint See “Network Discover/Cloud
target. Storage Discover scan target
configuration options”
on page 1586.
about policies and scan targets. It sends information about the exposed confidential
data that it finds to the Enforce Server for reporting and remediation.
The following types of SharePoint items are scanned:
■ Wiki pages
■ Blogs
■ Calendar entries
■ Tasks
■ Project tasks
■ Discussion entries
■ Contact lists
■ Announcements
■ Links
■ Surveys
■ Issue tracking
■ Custom lists
■ Documents in the document library
The communication between the Discover Server and the SharePoint Web Front
End (WFE) is SOAP-based.
Communication is secure when the SharePoint Web sites are configured to use
SSL.
For HTTPS, validation of the server SSL certificate is not the default. To enable
validation of the server SSL certificate, turn on the advanced setting
Discover.ValidateSSLCertificates. Then import the server SSL certificate to
the Discover Server.
See “Advanced server settings” on page 257.
See “Importing SSL certificates to Enforce or Discover servers” on page 248.
If the specified SharePoint site is configured to be on a port that is not the default
(80), ensure that the SharePoint server allows the Discover detection server to
communicate on the required port.
Setting up scans of SharePoint servers 1692
Supported SharePoint server targets
User access to the content is based on the rights for the specified user in SharePoint.
Enter the user credentials to specify this user when you configure a SharePoint
scan.
See “Configuring and running SharePoint server scans” on page 1693.
and permission levels. If the user account does not have the “Enumerate
Permissions” right, then the ACL is not obtained for the SharePoint content.
The following permission levels in SharePoint already have these permissions
defined:
■ Full Control (includes Browse Directories, Use Remote Interfaces, and Enumerate
permissions)
■ Design (includes Browse Directories and Use Remote Interfaces permissions)
■ Contribute (includes Browse Directories and Use Remote Interfaces permissions)
Note: Select this option if you have configured the SharePoint Encrypt
Server FlexResponse action for the assigned policy group.
■ Forms
■ Claims, for Microsoft Active Directory Federation Services (ADFS) only
If you choose Claims authentication, enter the Federation Service Name.
The Federation Service Name is the URL of the ADFS server. You can
find the correct name in the Federation Services Properties section of the
ADFS console.
You can specify a default user name for access to all SharePoint sites, except
those specified using the Add editor.
If you specify SharePoint sites with the Add editor, you can specify separate
credentials for each site.
Setting up scans of SharePoint servers 1695
Configuring and running SharePoint server scans
For the SharePoint site, use the public URL instead of the internal URL.
The Following syntax applies for the URL and credentials on each line.
URL,[username,password]
Select one of the following methods of entering the location for the SharePoint
server:
■ Uploaded file
Select Scan Sites From an Uploaded File. Create and save a plain text
file (.txt) listing the servers you want to scan. Create the file using an
ASCII text editor and enter one URL per line. Then click Browse to locate
the file with the list. Click Upload Now to import it.
■ Individual entries
Select Scan Sites. Click Add to use a line editor to specify the servers you
want to scan. Server information that is entered here takes precedence
over the default values and applies only to the path specified.
8 Under Scan Type, select Scan only new or modified items (incremental
scan). This option is the default for new targets.
If you have changed the policy or other definitions in an existing scan, you can
set up the next scan as a full scan. Select the following option:
Scan all items for the next scan. Subsequent scans will be incremental.
If you always want to scan all items in this target, select the following option:
Always scan all items (full scan)
Setting up scans of SharePoint servers 1696
Configuring and running SharePoint server scans
Note: Byte throttling is only applied after the fetch of each item. Therefore,
actual network traffic may not exactly match the byte throttling that is set.
■ Inventory Scanning
Enter the number of incidents to produce before moving on to the next site
to scan (a URL from the Scanned Content tab). To audit whether
confidential data exists on a target, without scanning all of it, set up Inventory
Mode for scanning. Setting incident thresholds can improve the performance
of scanning by skipping to the next site to scan, rather than scanning
everything.
After the incident threshold has been reached, the scanning of this site is
stopped, and scanning proceeds to the next site. Because the process is
asynchronous, a few more incidents may be created than specified in the
incident threshold.
SharePoint. You can configure the application to use SSL if secure data transfer
is required between the Network Discover and SharePoint servers.
Specific permissions are required for the SharePoint solution installation process.
See “Access privileges for SharePoint scans” on page 1692.
The Symantec SharePoint solution is versioned, and is not backward-compatible.
If you are upgrading from Symantec Data Loss Prevention version 14.x or earlier,
you must uninstall your existing SharePoint solution and install the 15.0 version.
Table 65-2 lists the SharePoint Solution version that is compatible with your version
of Symantec Data Loss Prevention.
11.5.1 11.5.1
15.0 15.0
2 Use the spSites.txt file to enter your site collections when configuring your
Discover target.
3 Update the default realm and directory server parameters (realms) in this file.
[libdefaults]
default_realm = ENG.COMPANY.COM
[realms]
ENG.COMPANY.COM = {
kdc = engADserver.emg.company.com
}
MARK.COMPANY.COM = {
kdc = markADserver.emg.company.com
}
See “Creating the configuration file for Active Directory integration” on page 125.
4 On the Discover Server, update the Protect.properties file in the folder
C:\SymantecDLP\Protect\config (in a Windows default Symantec Data Loss
Prevention installation). Update the property that points to the updated krb5.ini
file.
If an internal Specify the public URL for the SharePoint site. All the site collections
SharePoint URL is are scanned.
specified, only the
default site collection
is scanned.
No site collections, or Specify the site collection/site/web application URL with a fully
only the default site qualified domain name.
collection, are
To validate the access from the Discover Server, try to access the
scanned when the
SharePoint URL from a browser. If a short name does not work, try
Discover Server and
to use the fully qualified domain name.
SharePoint site are in
different domains. Only the default site collection is scanned if the web application URL
does not contain fully qualified domain name.
Setting up scans of SharePoint servers 1702
Troubleshooting SharePoint scans
The bytes reported as To improve performance, the scan statistics do not include items in
scanned does not the folders that are skipped (filtered out).
match the number of
Dynamic content, such as .aspx files, can change size.
bytes in the content.
You can set the Advanced Server setting
Discover.countAllFilteredItems to get more accurate scan
statistics.
Scans are not working If you are having trouble with Kerberos authentication, check the
properly with following items:
Kerberos configured.
■ Ensure that DNS resolution for the domain controller and
SharePoint servers is successful from the detection server.
■ Ensure that client integration is enable for the zone in which the
web application runs.
■ Consider adding domain realms to the
C:/SymantecDLP/jre/lib/security/krb5.ini file. For
example:
[domain_realms]
.MYDOMAIN.COM=MYDOMAIN.COM
Scans using Confirm that the Federation Service Name is entered correctly. The
claims-based Federation Service Name is the URL of the ADFS server. You can
authentication fail with find the correct name in the Federation Services Properties section
an ADFS connection of the ADFS console.
error.
General Symantec Data Loss Prevention logs scan errors in the scan log
troubleshooting and the file reader logs.
Chapter 66
Setting up scans of
Exchange servers
This chapter includes the following topics:
1 Verify that Exchange Web Services and the For information about Exchange Web Services and the
Autodiscover Service are enabled on your Exchange Autodiscover service, see your Microsoft Exchange
server and are accessible from the Network Discover documentation.
server.
Setting up scans of Exchange servers 1704
About scans of Exchange servers
2 If you need secure access between the Discover Server By default, Symantec Data Loss Prevention only allows
and Exchange Web Services or your Active Directory HTTPS connections to the Active Directory server and
server, set up HTTPS and LDAPS. Exchange Web Services. To allow HTTP connections,
set the
Discover.Exchange.UseSecureHttpConnections
setting in Server Detail > Advanced Server Settings
to false.
3 Ensure that your Exchange user credentials can For information about enabling impersonation for your
impersonate any mailbox you want to scan. user credentials, see your Microsoft Exchange
documentation.
4 Go to Manage > Discover Scanning > Discover See “Configuring Exchange Server scans” on page 1706.
Targets to create an Exchange target and to configure
scans of Exchange servers.
5 Set any additional scan options for the Exchange See “Network Discover/Cloud Storage Discover scan
target. target configuration options” on page 1586.
6 Start the Exchange server scan. Go to Manage > Discover Scanning > Discover
Targets.
Select the scan target from the target list, then click
the Start icon.
7 Verify that the scan is running successfully. See “Managing Network Discover/Cloud Storage
Discover target scans” on page 1608.
Note: Network Discover does not support scans of Exchange targets using Dynamic
Distribution Groups.
DOMAIN_NAME\user_name
Ensure that the user credentials you provide can impersonate all mailboxes
you want to scan. For information about configuring Exchange Impersonation,
see http://msdn.microsoft.com/en-us/library/bb204095.aspx.
See “Providing the password authentication for Network Discover scanned
content” on page 1592.
7 Enter a target URL for the Microsoft Active Directory server. For example,
ldaps://dc.domain.com:636.
Note: Only one Active Directory server can be specified per Discover target.
Setting up scans of Exchange servers 1707
Configuring Exchange Server scans
8 Select Public folders to scan all public folders on the Exchange server. The
user of the credentials that are specified must have access to these public
folders.
You can select this option in addition to All users on a Directory Server or
Directory groups and users.
9 Select Mailboxes to scan user mailboxes on your Exchange servers. Select
one of the following methods of entering the items to scan on the Exchange
server:
■ All users on Directory Server
If a directory server is available, then select the Directory Server from the
drop-down list.
To use this option, select the Directory Server connection you have already
specified, or click the Create new Directory Connection link to configure
another directory connection.
See “Configuring directory server connections” on page 146.
■ Directory groups and users
If directory user groups are available, then select the groups to include in
this target.
To use this option, directory groups must be established. If no directory
groups are set up, click the link Create new User Group to jump to the
page to configure the directory user groups.
See “Configuring User Groups” on page 775.
■ Specify User Mailboxes to include in this Target
Enter specific mailboxes. Alphanumeric characters and the following special
characters are allowed in mailbox names:
! # $ ' - ^ _ ` { }
You can combine this option with directory groups and users. No directory
groups are needed for the user mailboxes option.
■ Personal Archives
Setting up scans of Exchange servers 1708
Configuring Exchange Server scans
Select this option to scan Exchange 2010 and 2013 Personal Archive
mailboxes for the users you have specified.
You can provide filters using regular expressions, or paths relative to the
location of the Exchange site. Filters can include a site collection, site, sub site,
folder, file name, or file extension. All path filters are case-sensitive .
For Include Filters, regular expression matching is applied to files, but not to
folders.
For Exclude Filters, regular expression matching is applied to both files and
folders.
Only the path until the first "?" or "*" is considered when a folder or file is
matched.
When all the specified path filters are relative, the matching folder is skipped,
and the scan statistics do not include the items in the skipped folders.
See “Setting up Endpoint Discover filters to include or exclude items from the
scan” on page 1835.
11 On the Filters tab, select size filters.
The size filters let you exclude items from the matching process based on their
size. Symantec Data Loss Prevention includes only the items that match your
specified size filters. If you leave this field empty, Symantec Data Loss
Prevention performs matching on items of all sizes.
See “Filtering Discover targets by item size” on page 1600.
Setting up scans of Exchange servers 1709
Setting up Exchange scans to use Kerberos authentication
[libdefaults]
default_realm = ENG.COMPANY.COM
[realms]
ENG.COMPANY.COM = {
kdc = engADserver.emg.company.com
}
MARK.COMPANY.COM = {
kdc = markADserver.emg.company.com
}
See “Creating the configuration file for Active Directory integration” on page 125.
4 On the Discover Server, update the Protect.properties file in the folder
C:\SymantecDLP\Protect\config (in a Windows default Symantec Data Loss
Prevention installation). Update the property that points to the updated krb5.ini
file.
Scan all user mailboxes and Select the following options in the user interface:
public folders.
■ Public folders
■ Mailboxes > All users on Directory Server
The credentials must have permission to impersonate all mailboxes you want to scan.
Scan all user mailboxes (but Select Mailboxes > All users on Directory Server in the user interface.
not public folders).
The credentials must have permission to impersonate all mailboxes you want to scan.
Scan all public folders. Select Public folders in the user interface.
Scan specific groups or Select Mailboxes > Directory groups and users in the user interface.
users.
To scan a Directory Group, select the Directory Group from the groups in the list. All
user mailboxes in the group are scanned. You can click Create new User Group to
create a new Directory Group.
To scan for specific users, enter a comma-separated list of user mailbox names.
The credentials must have permission to impersonate all mailboxes you want to scan.
Scan an Exchange 2010 Select Mailboxes > All users on Directory Server > Personal Archives or Mailboxes
Personal Archive. > Directory groups and users > Personal Archives in the user interface. If necessary,
specify which mailboxes to scan. Network Discover scans the Personal Archives
associated with the specified mailboxes.
java.util.logging.FileHandler.level = FINEST
org.apache.cxf.interceptor.LoggingInInterceptor.level = FINEST
org.apache.commons.beanutils.converters.level = WARNING
■ Exchange logs: You might find useful troubleshooting information in the logs
created by your Microsoft Exchange Server.
Chapter 67
About Network Discover
scanners
This chapter includes the following topics:
■ Troubleshooting scanners
■ Scanner processes
■ Scan all the mailboxes using an Administrator account that can access all the
mailboxes.
■ Scan a particular user's mailbox using the Administrator account.
■ Scan a single user's mailbox, with the user name and password known.
To set up scanning of Microsoft Exchange Servers , complete the following process:
5 On the Enforce Server, add a new Exchange See “Adding a new Network
target. Discover/Cloud Storage
Discover target” on page 1583.
Troubleshooting scanners
After a scan is started, it extracts content and metadata from the repository. Then
it passes this content to the Scan Controller and the Network Discover Server.
See “How Network Discover scanners work” on page 1714.
If a scanner does not seem to be processing items, use the following suggestions:
Issue Suggestions
Scanner does not seem to Verify that the scanner was installed properly.
be running.
On the system where the scanner is installed, make sure that the scanner processes
are running.
Incidents do not appear in Verify that the scan target is set up properly. Scanners can only send content to a target
the reports. of the same type. Multiple scanners of the same type can feed content to a Network
Discover scan of that type.
Issue Suggestions
If a given scanner cannot send content to Network Discover, that content queues up in
the outgoing folder.
Items that appear and disappear from this folder indicate normal progress.
The scan appears stalled. If a scanner cannot send content to Network Discover, the scanner content queues up
on the scanner system. The scanner system must have access to the Network Discover
Server. System warnings such as low disk space or down services should be in place
on both systems before installation.
To verify received content on the Network Discover Server, view the scan statistics page
of the scan. To view scan statistics, click on the running scan in the target scan list.
Verify that scan information moves through the scan process by checking the logs and
temporary directories.
Scanner processes
Table 67-3 provides the information about Network Discover scanner processes
on a Windows operating system.
Path Description
/scanner_typeScanner
Path Description
ScannerControllerLogging.properties In the
ScannerControllerLogging.properties
file, you can configure the following options:
discover.host localhost The host name or IP address of the Network Discover Server
the scanner routes content to. Before you configure this value,
the Network Discover Server should be added to the Enforce
Server, and access to it from the scanner verified.
discover.port 8090 The Network Discover port to which the scanner routes data.
discover.retry.interval 1000 Milliseconds the scanner should wait before it retries to connect
to the Network Discover Server after a disconnect or previous
failure.
scanner.send.endofscanmarker true If this parameter is set to false, the scanner runs until it is
stopped manually in the Enforce Server console. The scan
restarts from the beginning after it reaches the end of the scan
list.
scanner.incremental false When true, the scanner only scans documents with created
or modified dates after the last complete scan. When false, all
files are scanned each time the scan is run.
dre.fake.port disabled Used only by certain scanners to prevent content from being
misdirected to an incorrect process. Must also be modified
http://localhost:19821
with values for DREHost and ACIPort in the
scanner_typeScanner.cfg file.
queue.folder.path disabled Used only for certain scanners to bridge a difference in location
between where .idx files are written and where they are
./scanner/outgoing
expected. This parameter is for the Exchange and SharePoint
2003 scanners.
Chapter 68
Setting up scanning of file
systems
This chapter includes the following topics:
■ Example configuration for scanning that skips symbolic links on UNIX systems
Setting up scanning of file systems 1723
Setting up remote scanning of file systems
1 Verify that your file system is on the list of See “Supported file system
supported targets. scanner targets” on page 1724.
2 On the server that contains the file system, install See “Installing file system
the file system scanner. scanners” on page 1724.
The setup for scanning file systems requires See “Installing file system
installation of the scanner software on the scanners silently from the
computer where the file system is located. command line” on page 1728.
3 Perform any manual configurations by editing the See “Configuration options for
configuration files and properties files. file system scanners”
on page 1729.
4 On the Enforce Server, add a new Scanner File See “Adding a new Network
System target. Discover/Cloud Storage
Discover target” on page 1583.
5 Start the file system scan. See “Starting file system scans”
on page 1727.
Start the scanner on the scanner computer, and
also start the scan on the Enforce Server.
■ xlC.rte (v8.0.0.0+)
The following 32-bit Solaris file systems can be scanned (64-bit systems are not
supported):
■ Solaris 9 (SPARC platform)
■ Solaris 10 (SPARC platform)
Solaris requires the following patch levels for the scanner:
■ Solaris 9, 115697-01
http://sunsolve.sun.com/search/document.do?assetkey=1-21-115697-02-1
File systems on UNIX systems can also be scanned using the SFTP protocol. This
protocol provides a method similar to share-based file scanning, instead of using
the File System Scanner. Contact Symantec Professional Services for details.
■ SymantecDLPScanners_Aix_15.0.sh
Note: You can install either the 32-bit or 64-bit scanner on 64-bit Linux
systems. Symantec recommends the 64-bit version.
■ SymantecDLPScanners_Solaris_15.0.sh
SymantecDLPScanners_windows_x32_15.0.exe
./SymantecDLPScanners_Unix_x32_15.0.sh
./SymantecDLPScanners_Unix_x32_15.0.sh -c
3 If applicable, confirm the version of the scanner you want to install (32-bit or
64-bit).
4 Confirm the license ageement.
5 Select File System Scanner.
6 Select the installation Destination Directory (the directory where you want the
SymantecDLP File System Scanner installed).
Setting up scanning of file systems 1726
Installing file system scanners
7 For Windows, select the Start Menu Folder (shortcut in the Start menu). The
default is SymantecDLP FileSystem Scanner.
8 Enter the following connection information for the Network Discover Server:
■ Discover Host (IP or host name of the Network Discover Server)
■ Discover Port
/opt/FileSystemScanner/bin/FileSystemScanner_Console
To start a file system scan with multiple scanners for one target
1 On each of the scanner computers, start the File System scanner on that
computer.
On Windows, select Start > Vontu FileSystem Scanner > Vontu FileSystem
Scanner Console.
On UNIX, enter the following command:
/opt/FileSystemScanner/bin/FileSystemScanner_Console
Make sure that each of the scanners has started, and has posted information.
Check the outgoing folder on each of the computers.
See “Scanner installation directory structure” on page 1717.
2 Log on to the Enforce Server.
Go to Manage > Discover Scanning > Discover Targets to navigate to the
list of targets.
3 Select the scan target from the target list, then click the Start icon.
4 The scanner starts the process of scanning data.
See “How Network Discover scanners work” on page 1714.
5 If the scan does not progress normally, you can troubleshoot it.
See “Troubleshooting scanners” on page 1715.
6 Stop and restart the scanner whenever you make changes to the configuration
file. To stop the scanner, type the control-C character in the console window.
sys.programGroup.allUsers$Boolean=true
discover.host=test-server.test.lab
discover.port=8090
sys.service.selected.417$Boolean=true
job.0.excludeFilters=
sys.languageId=en
sys.programGroup.linkDir=/usr/local/bin
installService$Boolean=false
sys.installationDir=/opt/FileSystemScanner
sys.programGroup.enabled$Boolean=true
job.0.includeFilters=
job.0.directory=/home/text_files/text_scan/text
sys.service.startupType.417=auto
startAfterInstall$Boolean=false
3 To run the installation with the varfile, type the following command (for Linux):
# ./FileSystemScanner_Unix_11.6.sh
-varfile FileSystemScanner.varfile -q
DirectoryFileMatch=*
Note: If you update the ScanManager.properties file, make sure that you restart
the Vontu Monitor Controller service on the Enforce Server. If you update the
Crawler.properties file, make sure that you restart the Restart the Vontu Monitor
service on that particular detection server.
DirectoryPathCSVs=C:\
DirectoryMustHaveCSVs=
DirectoryCantHaveCSVs=
Setting up scanning of file systems 1732
Example configuration for scanning the /usr directory on UNIX
DirectoryPathCSVs=/usr
DirectoryMustHaveCSVs=
DirectoryCantHaveCSVs=
DirectoryPathCSVs=C:\Windows
DirectoryMustHaveCSVs=*/temp/*
DirectoryCantHaveCSVs=
Include only the files that end with extension tmp or the directory name has xml in
the path.
DirectoryPathCSVs=C:\Windows
DirectoryMustHaveCSVs=*/xml/*,*.tmp
DirectoryCantHaveCSVs=
Include only the files that end with the extension txt under the UNIX directory
/home/data.
DirectoryPathCSVs=/home/data
DirectoryMustHaveCSVs=*.txt
DirectoryCantHaveCSVs=
Setting up scanning of file systems 1733
Example configuration for scanning with exclude filters
DirectoryPathCSVs=C:\Windows
DirectoryMustHaveCSVs=
DirectoryCantHaveCSVs=*.exe
Exclude all files that end with extension tmp or if the directory name contains bin
under the UNIX directory /home/data.
DirectoryPathCSVs=/home/data
DirectoryMustHaveCSVs=
DirectoryCantHaveCSVs=*/bin/*,*.tmp
DirectoryPathCSVs=C:\data
DirectoryMustHaveCSVs=*/temp/*,*.pdf
DirectoryCantHaveCSVs=*/bin/*,*.tmp
DirectoryMustHaveCSVs=*.pdf
DirectoryAfterDate=-180
DirectoryBeforeDate=0
Scan all files that have been modified between 60 days and 360 days in the past.
DirectoryAfterDate=-360
DirectoryBeforeDate=-60
ImportPreImportMinLength=3000
ImportPreImportMaxLength=4000
ImportEmptyFiles=false
DirectoryMustHaveCSVs=*.doc
ImportPreImportMinLength=4096
ImportEmptyFiles=false
Setting up scanning of file systems 1735
Example configuration for scanning that skips symbolic links on UNIX systems
PollingMethod=1
FilePollFilename=/opt/test/filenames.txt
Chapter 69
Setting up scanning of Web
servers
This chapter includes the following topics:
files to Network Discover for content processing. The web server scanner can
retrieve content from various document types, including web documents, Word,
Excel, and PDF files.
The web server scanner crawls web pages for links and content. The crawler
processes the page content and either accepts or rejects the page for retrieval. If
the page is accepted, the crawler looks for links from the page, filters the links and
queues the accepted links for the crawler process. If the page is rejected, the crawler
looks for links only if you have configured it to follow links on rejected pages. The
links are filtered before they are added to the crawler queue. The crawler then
retrieves the page content of accepted pages. The crawler requests the next link
in its queue, and the process repeats.
To set up scanning of web servers, complete the following process:
1 The web server scanner can scan web sites. See “Supported web server
(scanner) targets” on page 1737.
It has been tested with IIS and Apache web
servers.
2 On the server with read access to the web site, See “Installing web server
install the web server scanner. scanners” on page 1738.
3 Perform any manual configurations by editing the See “Configuration options for
configuration files and properties files. web server scanners”
on page 1741.
4 On the Enforce Server, add a new Scanner File See “Adding a new Network
System target. Discover/Cloud Storage
Discover target” on page 1583.
5 Start the file system scan. See “Starting web server scans”
on page 1740.
Start the scanner on the scanner computer, and
also start the scan on the Enforce Server.
SymantecDLPScanners_windows_x32_15.0.exe
Linux GUI:
./SymantecDLPScanners_Unix_x32_15.0.sh
Linux console:
./SymantecDLPScanners_Unix_15.0.sh -c
3 Confirm the version of the scanner you want to install (32-bit or 64-bit).
4 Confirm the license ageement.
5 Select web Server Scanner.
6 Select the installation Destination Directory (the directory where you want
the web server scanner installed).
Click Next.
7 Select the Start Menu Folder (shortcut in the Start menu). The default is
Symantec DLP WebServer Scanner.
Click Next.
Setting up scanning of Web servers 1739
Installing web server scanners
8 Enter the following connection information for the Network Discover Server:
■ Discover Host (IP or host name of the Network Discover Server)
■ Discover Port
Click Next.
9 Configure the web server scanner by entering the following information:
■ Start URL
Enter the URL where the scan starts.
■ Include Filter
Only the paths that include all the strings specified here are scanned. Delimit
entries with a comma, but do not use any spaces. Wildcards are supported.
■ Path Exclude Filter
Everything but the paths that contain the strings specified here are scanned.
Delimit entries with a comma, but do not use any spaces. Wildcards are
supported.
Click Next.
10 The scanner installs.
11 Select the Startup Mode.
While you initially test or verify that the scanner runs successfully, do not select
either of these options, but start the scanner manually.
You can select one (or none) of the following options:
■ Install as a service on a Windows system.
■ Start after installation.
Click Next.
Click Finish.
12 The web server scanner installation is complete on the scanner computer.
13 Perform any manual configurations by editing the configuration files and
properties files.
See “Configuration options for web server scanners” on page 1741.
See “Scanner installation directory structure” on page 1717.
See “Scanner configuration files” on page 1719.
14 On the Enforce Server, create a New Target for the scanner web server type.
15 Start the scan on both the scanner computer and the Enforce Server.
See “Starting web server scans” on page 1740.
Setting up scanning of Web servers 1740
Starting web server scans
3 Select the scan target from the target list, then click the Start icon.
4 The scanner starts the process of scanning data.
See “How Network Discover scanners work” on page 1714.
5 If the scan does not progress normally, you can troubleshoot it.
See “Troubleshooting scanners” on page 1715.
6 Stop and restart the scanner whenever you make changes to the configuration
file. To stop the scanner, type the control-C character in the console window.
Scanned Content NavDirAllowCSVs The list with include filters for paths. This list
contains the strings that the URL of a page
must contain for the scanner to process the
page. Use the parameter NavDirCheck to
specify how and when the scanner checks
for these strings.
Scanned Content NavDirDisallowCSVs The list with exclude filters for paths. This list
contains the strings that the URL of a page
must not contain for the scanner to process
the page. Use the parameter NavDirCheck
to specify how and when the scanner checks
for these strings.
Extensions=*.doc,*.html*
Scanned Content StayOnSite You can configure the crawler to stay on the
web site on which it starts, or allow it to follow
links to external web sites in domains
different from the starting web site. By
default, the crawler stays on the starting web
site domain.
Authentication LoginUserField The name of the user name form field (for
FORMPOST or FORMGET logon methods).
//##########################################################
//# Jobs
//##########################################################
URL=http://www.cnn.com
//##########################################################
//# Jobs
//##########################################################
URL=http://site.domain.com
LoginURL=http://domain.server.com/login.html
LoginMethod=AUTHENTICATE
LoginUserValue=some_user
LoginPassValue=9sfIy8vw
Setting up scanning of Web servers 1745
Example configuration for a web site scan with form-based authentication
//##########################################################
//# Jobs
//##########################################################
URL= http://wiki.symantec.corp/dashboard.action
LoginMethod=FORMPOST
LoginURL=http://wiki.symantec.corp/login.action
LoginUserField=os_username
LoginUserValue=some_user
LoginPassField=os_password
LoginPassValue=9sfIy8vw
//##########################################################
//# Jobs
//##########################################################
URL=http://some_site
NTLMUsername=Some_Domain\some_domain_user
NTLMPassword=9sfIy8vw
Create the NavDirCheck number by adding together some of the following numbers:
Case insensitive 64 If you add 64 to the URL value, the scanner checks the
URL of a page for a match for the strings that are specified
in the parameter NavDirAllowCSVs or
NavDirDisallowCSVs. This match is not case-sensitive
.
Before download 128 If you add 128 to the URL value, the scanner checks
whether the URL has any NavDirAllowCSVs or
NavDirDisallowCSVs strings before the page is
downloaded.
Valid site structure 512 If you add 512 to the URL value, the scanner rechecks the
NavDirAllowCSVs and NavDirDisallowCSVs values
for the site to ensure that the site is still valid before it
updates it. If you do not include this setting, then changes
to these values are never checked. If the site is not valid,
it is not downloaded.
In the following example, the scanner checks the URLs for matches for the strings
"archive" or "test." This match is not case-sensitive , and part of a word or a whole
word is matched. If the URL contains one of these strings, the page is not processed.
NavDirDisallowCSVs=*archive*,*test*
NavDirCheck=65
In the following example, the scanner checks the URLs for matches for the strings
"news" or "home." This match is not case-sensitive , and part of a word or a whole
word is matched. If the URL does not contain one of these strings, the page is not
processed.
NavDirAllowCSVs=*news*,*home*
NavDirCheck=65
AfterDate=-365
BeforeDate=7
Chapter 70
Setting up scanning of
Documentum repositories
This chapter includes the following topics:
3 Perform any manual configurations by editing the See “Configuration options for
configuration files and properties files. Documentum scanners”
on page 1753.
4 On the Enforce Server, add a new Scanner See “Adding a new Network
Documentum target. Discover/Cloud Storage
Discover target” on page 1583.
SymantecDLPScanners_windows_x32_15.0.exe
9 Click Next.
Setting up scanning of Documentum repositories 1751
Installing Documentum scanners
Doc Broker The name of the server where the repository for the DocBase is
Host stored.
Doc Base The name of the repository you want the Documentum scanner to
retrieve.
User Name Specify an account with full access rights to the Documentum files
you want to scan.
Password Password for the account. This password is plain text in the
configuration file.
WebTop Host The host name of the Web interface to the Documentum content
repository.
11 Click Next.
12 The scanner installs.
13 Select the Startup Mode.
While you initially test or verify that the scanner runs successfully, do not select
either of these options, but start the scanner manually.
You can select one (or none) of the following options:
■ Install as a service on a Windows system.
■ Start after installation.
The default is to start the scanner manually.
14 The Documentum scanner installation is complete on the scanner computer.
15 Perform any manual configurations by editing the configuration files and
properties files.
See “Configuration options for Documentum scanners” on page 1753.
See “Scanner installation directory structure” on page 1717.
See “Scanner configuration files” on page 1719.
16 After installing the Documentum scanner, copy the dmcl40.dll file from your
Documentum installation bin directory, to the \DocumentumScanner\scanner
folder in the scanner installation directory.
See “Scanner installation directory structure” on page 1717.
Setting up scanning of Documentum repositories 1752
Starting Documentum scans
17 On the Enforce Server, create a New Target for the scanner Documentum
type.
18 Start the scan on both the scanner computer and the Enforce Server.
See “Starting Documentum scans” on page 1752.
Parameter Description
Parameter Description
ExtensionCSVs=*.doc,*.htm,*.ppt,*.xls
first_value,second_value
first_valuedocument_idsecond_value
ImportRefReplaceWithCSVs=
http://documentum-server.mycompany.com:8080/
webtop/component/drl?objectId=
N hours
N days
N weeks
N months
Parameter Description
N hours
N days
N weeks
N months
FolderCSVs=/support,/clients,/marketing,/finance
[DOCBROKER_PRIMARY]
host = documentum-server.mycompany.com
During installation of the Symantec Data Loss Prevention scanner, the host
parameter is set in the dmcl.ini file. If the Documentum Document Broker (server)
later changes, this file must be edited to point to the new server.
Parameter Description
host The computer that hosts the Documentum Document Broker (server).
//##########################################################
//# Jobs
//##########################################################
[JOBS]
NUMBER=1
0=Job0
[Job0]
DocBase=Vontu_1
UserName=Administrator
Password=mypassword
ImportRefReplaceWithCSVs=
http://documentum-server.mycompany.com:8080/webtop/
component/drl?objectId=
LogFile = Job0.log
Chapter 71
Setting up scanning of
Livelink repositories
This chapter includes the following topics:
2 Create an ODBC data source for SQL Server. See “Creating an ODBC data
source for SQL Server”
Install the Livelink scanner.
on page 1758.
3 Perform any manual configurations by editing the See “Configuration options for
configuration files and properties files. Livelink scanners” on page 1763.
4 On the Enforce Server, add a new Scanner See “Adding a new Network
Livelink target. Discover/Cloud Storage
Discover target” on page 1583.
Note: On 64-bit Windows systems, use the 32-bit ODBC administrator tool to
configure the data source. The 32-bit version is available at
c:\windows\sysWOW64\odbcad32.exe.
3 Click Add.
4 Select SQL Server.
5 Give it a name (for example, “OpenText”). This name is referenced in the
VontuLivelinkScanner.cfg file.
6 Click Next.
7 Select With SQL Server authentication using a login ID and password
entered by the user.
8 Check the option for Connect to SQL Server to obtain default settings for
additional configuration options and enter the SQL Server credentials.
9 Click Next. Accept the defaults.
10 Click Next. Accept the defaults.
11 Click Finish.
SymantecDLPScanners_windows_x32_15.0.exe
7 Select the installation Destination Directory, the folder where you want the
Livelink Scanner to be installed.
The default is c:\Program Files\LivelinkScanner\.
Click Next.
8 Select the Start Menu Folder (shortcut in the Start menu).
The default is SymantecDLP Livelink Scanner.
Click Next.
9 Enter the following connection information for the Network Discover Server:
■ Discover Host (IP or host name of the Network Discover Server)
■ Discover Port
Click Next.
10 Enter the following Livelink configuration values for the scanner:
Livelink User Name The user name to use when you scan.
Livelink Connection The Livelink API connection name. This name is the
Name dbconnection in the opentext.ini file on the Livelink
server.
Livelink API Port This port should be 2099 unless it has been changed in the
opentext.ini file on the Livelink server. The default is
2099.
ODBC DSN The name of the ODBC data source on the computer running
the Livelink scanner.
SQL User Name User name to use to connect to the ODBC data source.
Click Next.
Setting up scanning of Livelink repositories 1761
Starting OpenText (Livelink) scans
■ LAPI_ATTRIBUTES.dll
■ LAPI_BASE.dll
■ LAPI_DOCUMENTS.dll
■ LAPI_USERS.dll
■ LLKERNEL.dll
16 Create an ODBC data source for the database instance that OpenText (Livelink)
uses. This data source is referenced in the VontuLivelinkScanner.cfg file.
See “Creating an ODBC data source for SQL Server” on page 1758.
17 On the Enforce Server, create a New Target for the scanner Livelink type.
18 Start the scan on both the scanner computer and the Enforce Server.
See “Starting OpenText (Livelink) scans” on page 1761.
5 If the scan does not progress normally, you can troubleshoot it.
See “Troubleshooting scanners” on page 1715.
6 Stop and restart the scanner whenever you make changes to the configuration
file. To stop the scanner, type the control-C character in the console window.
//##########################################################
//# Jobs
//##########################################################
[JOBS]
Number=1
0=Job0
[Job0]
OpenTextServer=mydatabase-Livelink.test.lab
OpenTextPort=80
OpenTextUsername=Admin
OpenTextPassword=Livelink
LLConnection=LivelinkDB
LLApiPort=2099
DSN=Livelink
SQLUserName=lldbuser
SQLPassWord=Livelink
Chapter 72
Setting up Web Services for
custom scan targets
This chapter includes the following topics:
3 Save and modify the WSDL, and a create a client See “About setting up the Web
(such as a Java client), or SOAP request. Services Definition Language
(WSDL)” on page 1766.
4 Run the client, and verify the results. See “Example of a Web Services
Java client” on page 1766.
See the online Help for a Web Services sample WSDL and for a Web Services
sample SOAP request.
JAVA_HOME=jdk_install_dir
apache-cxf-installdir\bin\wsdl2java
-client sample_folder\DiscoverSOAPTarget.wsdl
javac DiscoverSOAPClient.java
Setting up Web Services for custom scan targets 1768
Sample Java code for the Web Services example
11 On the Enforce Server, verify that the expected number of items are reported
for the Network Discover target that is created in step 1.
import javax.xml.datatype.DatatypeFactory;
import javax.xml.namespace.QName;
import java.io.ByteArrayOutputStream;
import java.io.File;
import java.io.FileInputStream;
import java.net.URL;
import java.util.Date;
import com.vontu.discover.ComponentContentType;
import com.vontu.discover.ComponentType;
import com.vontu.discover.DocumentType;
import com.vontu.discover.ProcessDocumentsType;
import com.vontu.wsdl.discoversoaptarget.DiscoverSOAPTargetPortType;
import com.vontu.wsdl.discoversoaptarget.DiscoverSOAPTargetService;
import com.sun.org.apache.xerces.internal.impl.dv.util.Base6
{
private static final QName SERVICE_NAME = new QName(
"http://www.vontu.com/wsdl/DiscoverSOAPTarget.wsdl",
"DiscoverSOAPTarget_Service");
private static final String OWNER = "DiscoverSOAPClient";
private static final String BODY = "This is the body";
private static final String TYPE = "Text";
private static final String ENCODING = "base64";
//Change this based on your discover host name and scanner port
private static final String WSDL_PATH =
"http://localhost:8090/?wsdl";
//create a component
ComponentType body = new ComponentType();
documentType.setComponent(body);
body.setName(file.getName());
//add body
ComponentContentType bodyContent =
Setting up Web Services for custom scan targets 1770
Sample Java code for the Web Services example
new ComponentContentType();
body.setComponentContent(bodyContent);
bodyContent.setType(TYPE);
bodyContent.setContent(BODY);
ByteArrayOutputStream bytes =
new ByteArrayOutputStream();
FileInputStream in = new FileInputStream(file);
byte[] buf = new byte[1024];
for(;;)
{
int len = in.read(buf);
if(len == -1)
{
break;
}
bytes.write(buf,0,len);
}
attachmentContent.setContent(
Base64.encode(bytes.toByteArray()));
}catch(Exception e)
{
}
}
}
Section 9
Discovering and preventing
data loss on endpoints
Endpoint Discover scans the internal hard drives of an endpoint to identify stored
confidential data so steps can be taken to inventory, secure, or relocate this data.
It enables high-performance, parallel scanning of tens of thousands of endpoints
with minimal system effect. Each DLP Agent can scan approximately 5 GB/hr. Users
can set up Endpoint Discover scans to use multiple Endpoint Servers to increase
performance and scan availability. Endpoint Discover can automatically quarantine
confidential files either locally to a folder on the Windows endpoint computer
(including to an encrypted folder) or remotely to a folder on the network. Table 73-1
provides description of these features as well as where to find additional information.
See “About Endpoint Discover” on page 63.
You can configure agent settings, group agents, set response rules, check agent
health, and troubleshoot agents.
Agent groups You use agent groups to send See “About agent groups”
agent configurations to on page 1912.
groups of agents.
Agent health and You can review DLP Agent See “About Symantec DLP
management health and complete Agent administration”
troubleshooting and on page 1926.
management tasks.
Application monitoring You can configure this feature See “About monitoring
to monitor applications for applications” on page 1962.
CD/DVD burning, IM, email,
or HTTP/S clients.
Endpoint tools You use Endpoint tools to See “About agent password
complete various management”on page
maintenance tasks on the 1990 on page 1990.
endpoint, like shutting down
watchdog services, inspecting
the agent database, and
restarting Mac agents.
When considering your Endpoint deployment, be aware that there are differences
in the features that are supported between Mac and Windows DLP Agents. See
“About DLP Agent feature-level support” on page 1777.
Note: Agents running on Mac endpoints can perform IDM and DCM detection only.
Two-tiered detection has implications for the kinds of detection rules and response
rules you can combine in a policy and use on endpoints. It also has implications
for the optimization of system usage and performance of Symantec Data Loss
Prevention on endpoints. As you create the policies that apply to endpoints, the
following guidelines are recommended.
Do not create a policy that combines a server-side detection rule with an Endpoint
Prevent response rule. For example, do not combine an EDM or DGM rule with an
Endpoint Block or Endpoint Notify response rule. If a server-side detection rule
triggers an Endpoint Prevent response rule, Symantec Data Loss Prevention cannot
execute the Endpoint Prevent response rule, and the system displays an error
message.
See “Author policies to limit the potential effect of two-tier detection” on page 433.
Overview of Symantec Data Loss Prevention for endpoints 1775
Guidelines for authoring Endpoint policies
When creating an endpoint policy that includes a server-side detection rule, combine
that detection rule with an agent-side detection rule in one compound rule. This
practice helps Symantec Data Loss Prevention perform detection on the endpoint
without sending the content to the Endpoint Server. Symantec Data Loss Prevention
saves network bandwidth and improves performance by performing detection on
the endpoint.
For example, you can couple an EDM detection rule with a keyword detection rule
in one compound rule. In a compound rule, all conditions must be met before
Symantec Data Loss Prevention registers a match. Conversely, if one condition is
not met, Symantec Data Loss Prevention determines there is no match without
having to check the second condition. For example, to register a match the content
must meet the first condition AND all other conditions in the same rule. When you
set up the compound rule in this way, the DLP Agent checks the input content
against the agent-side rule first. If there is no match, Symantec Data Loss Prevention
does not need to send the content to the Endpoint Server. However, if you create
a compound rule that involves a DCM or an EDM policy, the content is still sent to
the Endpoint Server.
Before you combine a server-side detection rule (for example, an EDM rule) with
an All: Limit Incident Data Retention response rule that retains original files for
endpoint incidents, consider the bandwidth implications of retaining original files.
When it sends data to an Endpoint Server for analysis, the DLP Agent sends either
text data or binary data according to policy requirements. Whenever possible, DLP
Agents send text to cut down on bandwidth use. By default, Symantec Data Loss
Prevention discards original files for endpoint incidents. If a response rule retains
original files for endpoint incidents, DLP Agents must send binary data to the
Endpoint Server. In this case, make sure that your network can handle the increased
traffic between DLP Agents and Endpoint Servers without degrading performance.
Combine agent-side detection rules (for example, DCM) with an Endpoint Prevent
response rule in the same policy. Symantec Data Loss Prevention can execute an
Endpoint Prevent response rule only when a DLP Agent detection rule triggers the
response.
Table 73-2 lists detection and response rules that cannot be combined.
Overview of Symantec Data Loss Prevention for endpoints 1776
Guidelines for authoring Endpoint policies
■ Endpoint tools
See “Mac endpoint tools features” on page 1779.
■ Endpoint location
See “Mac agent endpoint location” on page 1780.
■ Agent groups
See “Mac agent groups features” on page 1780.
■ Detection technologies
See “Mac agent detection technologies” on page 1781.
■ Policy and response rules
See “Mac agent policy response rule features” on page 1784.
■ Monitoring support
See “Mac agent monitoring support” on page 1797.
■ Endpoint Prevent advanced agent settings
See “Endpoint Prevent for Mac agent advanced agent settings features”
on page 1793.
■ Endpoint Discover features
See “Endpoint Discover for Mac targets features” on page 1794.
See “Endpoint Discover for Mac file system support” on page 1795.
See “Endpoint Discover for Mac advanced agent settings support” on page 1795.
■ Command-line installation for installing a ■ UI-based installer for single agent manual
single agent manually. installation.
■ You can find more information in the
"Process to install the DLP Agent on Mac"
topic of the Symantec Data Loss
Prevention Installation Guide.
■ Installation of many agents using endpoint
deployment tools.
■ You can find more information in the
"Installing DLP Agents on Mac endpoints
silently" topic of the Symantec Data Loss
Prevention Installation Guide.
■ create_package ■ GetAppInfo
■ DeviceID You can use the Activity Monitor
■ logdump application to gather the same information.
■ start_agent See “Defining macOS application binary
names” on page 1975.
■ uninstall_agent
■ vontu_sqlite3
■ service_shutdown
Table 74-6 Policy rules and detection scenarios for Mac endpoints
DCM rule DCM rule is applied If the policy uses keyword matching
with EDM index matching (connected
OR
by OR expression), the documents
EDM or VML rules that contain the keyword log incidents.
DCM rule No rules are applied If the policy uses keyword matching
with EDM index exact matching
AND
(connected by AND expression), the
EDM or VML rules documents that contain the keyword
do not log incidents, even if the
document matches the EDM index.
The EDM index is not applied.
Exception rule in a policy that contains DCM exception is applied If the policy uses an exception with
DCM detection keyword matching (for example,
"sensitive") and uses EDM profile
OR
matching (connected by OR
Exception rule in a policy that contains expression), the document that
EDM, or VML rules contains the "sensitive" keyword is
excluded from being monitored.
Table 74-6 Policy rules and detection scenarios for Mac endpoints (continued)
Exception rule in a policy that contains No exceptions are applied If the policy uses an exception with
DCM detection keyword matching (for example,
"sensitive") and EDM profile matching
AND
(connected by AND expression), the
Exception rule in a policy that contains document that contains the "sensitive"
EDM or VML keyword is excluded from being
monitored even if the document
matches the EDM index. Documents
that match the EDM index are not
excluded from being monitored.
DCM rule DCM rule is applied If the policy uses keyword matching
(for example "sensitive") and uses an
AND
EDM profile exception (connected by
Exception rule in a policy that contains AND expression), the documents that
EDM or VML contain the keyword log incidents.
■ Destinations ■ Destinations
■ Removable storage ■ CD/DVD
See “Mac agent removable storage ■ Local drive
features” on page 1787. ■ Printer/Fax
■ Clipboard ■ Clipboard
■ Paste ■ Copy
See “Clipboard features supported on ■ Email
Mac agents” on page 1788. ■ Lotus Notes
■ Email ■ Web
■ Outlook
■ IE (HTTPS)
See “Mac agent Email features”
■ Edge (HTTPS)
on page 1789.
■ HTTP
■ Web
■ FTP
■ Firefox (HTTPS)
■ Configured Applications
■ Chrome (HTTPS)
■ Cloud Storage
■ Safari (HTTPS)
■ Network Shares
See “Mac agent browser features”
■ Copy to Local Drive
on page 1790.
■ Location based monitoring
■ Configured Applications
If Manual is used for the Endpoint
■ Application File Access
Location, all Mac agents are identified as
See “Mac agent Application Monitoring
Off the Corporate Network.
features” on page 1791.
■ Device Control
■ Network Shares
■ USB Storage
■ Copy to Share
■ Network Share
See “Mac agent copy to network share
features” on page 1792. ■ Block Print Screen
■ Location based monitoring
If Automatic is used for the Endpoint
Location, DLP Agents running on Mac
endpoints support this feature.
The Mac agent does not support monitoring files saved from Microsoft Office
applications to the following cloud and web locations:
■ WebDAV shares
■ SharePoint
■ SharePoint Online
■ OneDrive
■ OneDrive for Business
Summary of DLP Agent for Mac support 1787
Mac agent monitoring support
■ Removable storage file systems include HFS+ (all ■ True file type filtering. The Mac agent does not perform
versions of macOS Extended), FAT, and exFAT a file signature match when it filters on certain file types.
■ File type filters applied based on file extension The agent uses the file extension to apply file type
■ USB devices mounted as mass storage device filters.
■ USB 2.0 and 3.0 removable storage devices See “Filter by File Properties settings” on page 1851.
■ File copy operations, including support for these ■ Configurable recovery file path. When a block response
applications: Finder and Terminal rule is applied, sensitive files are moved to the recovery
folder on the Mac endpoint. This recovery folder is at
■ Documents that are saved to removable storage using
$HOME/My Recovered Files, where $HOME is the
Save As operation from the following applications:
endpoint user's home directory. The file is saved in the
■ Microsoft Office 2011
recover location to prevent a complete loss of the file.
■ TextEdit
The recover location is specified in the Block pop-up.
■ Preview
See “Recovering sensitive files on Mac endpoints”
■ Archive Utility on page 1865.
■ Acrobat Reader ■ File copies to NTFS removable storage file systems
■ Sensitive files that are blocked are automatically moved ■ File types for iWorks 2013 and higher
to the File Recovery location
■ USB 1.0 removable storage devices
See “Recovering sensitive files on Mac endpoints”
■ Response rule pop-ups when sudo commands are
on page 1865.
used to move sensitive files to removable storage
■ Restoring files devices. Detection occurs, appropriate response rules
are executed, and default pop-up responses are sent.
■ File transfers over Media Transfer Protocol (MTP)
■ Pop-up when command-line terminals (for example,
SSH client) from remote machines are used to move
sensitive files to removable storage devices
■ Actual file names in incidents for Microsoft Office files.
When an Office file is saved to a removable storage
device using a Save As operation, the Mac agent
displays the actual file name in the incident. For other
applications, the Mac agent might capture a temporary
file name that macOS creates during the Save As
process.
See “About endpoint incident lists” on page 1365.
Summary of DLP Agent for Mac support 1788
Mac agent monitoring support
Description Workaround
A file copy operation of multiple files using Finder is blocked when one file contains sensitive data. None
Sensitive files that have been recovered may no longer contain Spotlight metadata-like comments. None
If a keyword policy that uses a Block response rule detects sensitive information being moved from None
a Mac endpoint to a removable storage device and the sensitive information is found in a package
file (for example .pkg, .dmg, or .lpdf), the sensitive file is blocked and the rest of the package
file is moved to its intended destination. This often causes the package file to become corrupt.
Description Workaround
Duplicate incidents are created when the Disable Clipboard Paste for the browser on
Clipboard Paste setting is enabled for the Application Monitoring screen.
browsers monitored using the Application
Monitoring feature, and the browser's HTTPS
monitor channel is also enabled.
Some applications use paste operations that Symantec advises that you test the
the endpoint user does not initiate, which may application behavior before you enable
cause false positive incidents. Clipboard Paste monitoring.
Description Workaround
Description Workaround
Duplicate incidents are created for users who Disable the Monitor Application File Access
upgraded from a previous version of setting on the Application Monitoring
Symantec Data Loss Prevention in which screen.
Chrome was monitored using the Monitor
See “Changing application monitoring
Application File Access feature.
settings” on page 1963.
Summary of DLP Agent for Mac support 1791
Mac agent monitoring support
Description Workaround
■ Monitoring and preventing file uploads using browsers ■ The following fields do not apply to Mac applications:
(Chrome, Firefox, and Safari) ■ Internal Name
■ Monitoring and preventing files sent in emails in Outlook ■ Original Filename
2011 and Outlook 2016 ■ Publisher Name
■ White listing applications ■ Monitoring using the Local Drive and Print/Fax
Enable the Removable Storage setting under the settings under the Application Monitoring
Application Monitoring Configuration, Destinations Configuration, Destinations area
area to use this feature. ■ Monitoring using the monitoring setting under the
You can find more information on white listing. See Application Monitoring Configuration area
“Ignoring macOS applications ” on page 1976. ■ Monitoring using the Clipboard, Copy monitoring
■ Monitoring using the Application File Access, Open setting under the Application Monitoring
access monitoring setting under the Application Configuration, Clipboard area
Monitoring Configuration, Application File Access ■ Monitoring using the HTTP and FTP settings under the
area Application Monitoring Configuration, Web area
■ Monitoring using the Clipboard, Paste monitoring ■ Monitoring using the Application Monitoring
setting under the Application Monitoring Configuration setting: Application File Access, Read
Configuration, Clipboard area
The system defaults to the Open setting.
■ Monitoring using the Application Monitoring
■ Monitoring data pasted from the Clipboard for 32-bit
Configuration setting: Application File Access, Open
applications.
Description Workaround
Duplicate incidents are created and pop-ups display when Disable these applications on the Application Monitoring
sensitive data is moved to the following applications or screen.
protocols:
■ Chrome
■ Safari
■ Firefox
■ Outlook
Supported Unsupported
■ File type The Mac DLP Agent does not perform true
■ File size file type matching when it filters file types.
■ File path The agent uses the file extension to apply
file type filters.
Note: File path filters are supported for
Application File Access but not Removable See “True file type filtering” on page 1855.
Storage monitoring.
■ File extension monitoring
Note: For macOS, a file’s timestamp (the timestamp when the file was created,
modified, or accessed) does not change if you copy the file from one location to
some other location. If an Endpoint Discover full scan is run, and later, if any files
are locally moved into the Endpoint Discover target folder path, but the files were
last modified prior to the time of the full scan, then the next incremental scan does
not scan these files. Since the timestamp of the files predates the time of the full
scan, even though the files were added to the target folder after the scan, they are
not recognized as files to be considered for an incremental scan.
In such a case, Symantec recommends that you run a full scan instead of an
incremental scan.
Note: Policy groups that are assigned to an Endpoint Server apply equally only to
connected Windows agents.
Endpoint Prevent can perform many different types of monitoring. The following
table provides references to the types of monitoring you can select.
Type of Monitoring
Type of Monitoring
Endpoint Prevent monitors the activity on endpoints regardless if they are connected
to an Endpoint Server. If an endpoint is disconnected from the network and cannot
connect to an Endpoint Server, Endpoint Prevent continues to monitor the endpoint.
All incidents are stored in the Agent Store until the endpoint is re-connected to the
Endpoint Server. If the Agent Store exceeds the specified size limit, older files are
ejected until the size limit is no longer exceeded. Endpoint Prevent does not stop
monitoring the endpoint if the Agent Store exceeds the specified size limit.
See “About Endpoint Prevent monitoring” on page 1796.
See “About the DLP Agent store” on page 1864.
See “Workflow for implementing policies” on page 350.
See “Mac agent monitoring support” on page 1797.
the file to the flash drive. The justification that the user enters into the pop-up window
is visible on the incident snapshot for this incident.
See “About Endpoint Prevent monitoring” on page 1796.
See “Mac agent removable storage features” on page 1787.
The support of specific capabilities of browsers varies between Windows and Mac
endpoints. See “Mac agent browser features” on page 1790.
Note: Some network types do not match on the file name monitoring condition.
These network events do not contain file names and so cannot match on this
condition. The network monitoring types that cannot match the file name condition
include HTTP/HTTPS and Outlook message body and text.
All incidents are reported under Endpoint Prevent in the Reports section.
See “About Endpoint Prevent monitoring” on page 1796.
See “About monitoring applications” on page 1962.
the policy. Policies can be created using AND/OR Boolean conditions. Specify the
content criteria only using the AND condition in the policy builder.
For example, you want to create a policy that prevents files with the keyword Farallon
from being burned to a DVD. Your DVD burning application is Roxio 9. Create a
blank policy with a protocol or a device type rule. Select the CD/DVD device type
and also match a Content Matches Keyword rule. Enter Farallon as the keyword.
Finish creating the rule with an Endpoint Block response rule. After you save the
policy, the DLP Agent blocks any file that contains the keyword Farallon from being
burned to a DVD.
By selecting the CD/DVD device type, you have specified that the policy affects
only files burned to a CD/DVD. Endpoint hard drives and USB connected media
are not affected. By combining the device type and keyword match rules, you
guarantee that DLP Agents block only files with the specified keyword. The agents
do not block all of the files that are sent to the CD/DVD application. If you create
the CD/DVD block rule without the conjoined keyword rule, the policy blocks every
file that is sent to the burning application. Or, it would block the files that contain
the keyword at the endpoint hard drive and USB connected media as well.
Note: Small files of less than 64 bytes are not detected when read by CD/DVD
monitoring. Files over 64 bytes in size are detected normally.
Note: Endpoint Prevent does not monitor the text in the cover page of a fax.
Using Endpoint Prevent 1802
About Endpoint Prevent monitoring
The DLP Agent can also monitor and block the entire print job. The DLP Agent
always monitors PDF files printed from Adobe Acrobat in this manner. You can set
the DLP Agent to monitor files printed from Microsoft Word, PowerPoint, and Excel
when Monitor entire file is enabled.
See “Printer/Fax settings” on page 1868.
The incident snapshot contains information regarding which endpoint sent the
violating file, the violating file, and the printer name and the printer type. The printer
type is a locally connected printer, a shared printer, or a network printer, or the user
selected the Print to file option. When Monitor entire file is enabled, the incident
snapshot lists the location where the file was located.
See “Setting report preferences” on page 1404.
See “About Endpoint Prevent monitoring” on page 1796.
the information pasted into the email message. Incidents are created at the time of
the cut, copy or paste action.
See “Setting report preferences” on page 1404.
See “About Endpoint Prevent monitoring” on page 1796.
See “Clipboard features supported on Mac agents” on page 1788.
■ WebDAV share
■ SharePoint
■ SharePoint Online
■ Microsoft OneDrive
■ Microsoft OneDrive for Business
The agent also monitors files uploaded from supported Microsoft Office applications
(including Outlook) to Box using the Box for Office add-in. You enable this feature
on the Agent Configuration screen. See “Cloud Storage settings” on page 1867.
If you use a block response rule in the policy, Symantec Data Loss Prevention
creates a Cloud Storage incident, and sensitive content is quarantined on the
endpoint. The endpoint user can restore the previous file version from the configured
recovery location where the file is saved indefinitely. See “File Recovery Area
Location settings” on page 1865.
You cannot delete any of the default cloud storage applications that are provided
on the Application Monitoring screen. If you want to monitor a cloud storage
application that is not listed on this screen, you can add it. See “Adding a Windows
application” on page 1968.
You can allow uploads of sensitive files by corporate users to corporate Box accounts
and prevent sensitive file uploads to non-corporate Box accounts (for Windows
endpoints). This feature monitors and prevents file uploads through the Box Sync
application as well as those performed from the Word, Excel, PowerPoint, and
Outlook Microsoft Office applications (versions 2010, 2013, and 2016) through the
Box for Office add-in. See “Ignore User Identities for Cloud Storage Applications
settings” on page 1859.
Table 75-3 lists the default cloud storage applications that Symantec Data Loss
Prevention monitors.
Table 75-3 Brand names and binary names of monitored cloud storage
applications
Box BoxSync.exe
Dropbox Dropbox.exe
HighTail Hightail.exe
iCloud iCloudDrive.exe
Using Endpoint Prevent 1806
About Endpoint Prevent monitoring
Table 75-3 Brand names and binary names of monitored cloud storage
applications (continued)
Citrix XenApp ■ You must install the DLP Agent software on each XenApp server
host and on any individual application servers that publish
applications through XenApp.
■ All detection on Citrix XenApp is performed in a single thread (all
user activities are analyzed sequentially).
■ Symantec tests indicate that the DLP Agent software can support
a maximum of 40 simultaneous clients per Citrix server. However,
detection performance varies depending on the server hardware,
the type of applications that are used, and the activities that Citrix
clients perform. You must verify the DLP Agent performance
characteristics for your environment.
Citrix XenDesktop ■ You must install the DLP Agent software on each virtual machine
on the XenDesktop server.
■ The DLP Agent software can connect either to a dedicated Endpoint
Prevent server or to an Endpoint Prevent server that is shared with
non-Citrix agents. You cannot connect to an Endpoint Prevent
server that is reserved for Citrix XenApp.
Note: If you use the same server for both Citrix and non-Citrix
agents, you cannot configure events independently for each
environment.
■ Volumes
■ Print/fax requests
■ Clipboard
■ Network
■ Scanning Microsoft Office files
■ Restoring files on Citrix client drives
■ Monitoring application file access and files uploaded to browsers
that content. RRC speeds detection because it allows the DLP Agent to only perform
detection on new or recently changed content.
Only Described Content Matching (DMC) rule results can be cached in the DLP
Agent. Other types of detection, Exact Data Matching (EDM), File Properties Type
(FPT), and Indexed Data Matching (IDM) are not applicable to RRC. Additionally,
RRC is not applicable to protocol or to group detection rules.
See “Detecting data loss” on page 353.
Any time that the policies that are associated to the DLP Agent change, the RRC
cache is deleted. Previous RRC results are cleared and you must scan all of your
content again. However, after the initial scan is complete, subsequent scans are
much quicker to complete.
By default, RRC is active. If you do not want RRC, go to the advanced agent settings
and set it to Off.
violate policies. Endpoint Notify educates the user about the violation that has
occurred, but does not block or stop movement of the data. Endpoint Quarantine
moves a file with sensitive information from the local drive to a secure location.
Endpoint Quarantine is only applicable for Endpoint Discover. User Cancel lets the
endpoint user decide whether or not to allow the data to transfer. All rules create a
pop-up display window that contains information about the violated policy. Each
rule requests that the user provide a justification for the action. Endpoint Block and
Endpoint Notify, and User Cancel are applicable to all Endpoint Prevent detection
policies that are performed on the endpoint. For example, HTTP/HTTPS,
Email/STMP, FTP, CD/DVD, eSATA, Print/Fax, and USB monitoring all use Endpoint
Block or Endpoint Notify rules.
The Endpoint Notify and Block and User Cancel response rules are not applicable
to:
■ Violations that are found through Endpoint Discover
■ Violations on local drive monitoring
See “Workflow for implementing policies” on page 350.
See “Mac agent policy response rule features” on page 1784.
pop-up message describing the violation and educates the endpoint user on the
appropriate policy.
For example, an endpoint user sends an email that contains the word Farallon in
the body of the email. Endpoint Notify generates an incident that is sent to the
Endpoint Server and displays a pop-up notification on the endpoint. The notification
states the policy that was violated and that the endpoint action is now monitored.
The endpoint user enters a reason for the violation, accepts the notification, and
the email proceeds normally. Endpoint Notify does not prevent data movement, it
only notifies users of policy violations. The endpoint user’s justification for the
violation becomes part of the incident report that is sent to the Enforce Server.
Not all policy groups and policies are applicable with Endpoint response rules. If
you try to create a policy with incompatible rules and responses, you will receive
an error message. The error states that the policy is incompatible with the Endpoint
response rules.
Response rules can distinguish between those incidents that are created on the
corporate network and those created off of the corporate network. This condition
lets you specify whether the rule operates at all times or only when the endpoint is
connected or disconnected from the corporate network.
Note: You can specify whether or not to allow the default action of a timeout to block
the data transfer or allow it.
See “Configuring the Endpoint Prevent: User Cancel action” on page 1328.
See “Guidelines for authoring Endpoint policies” on page 1774.
2 Create endpoint agent configurations. See “About agent configurations” on page 1846.
3 Set the endpoint location. This is an optional See “Setting the endpoint location” on page 1813.
step.
4 Install the Symantec DLP Agent. For installation details, see the appropriate Symantec
Data Loss Prevention Installation Guide.
5 Create an endpoint policy. See “About policy creation for Endpoint Prevent”
on page 1809.
6 Create endpoint response rules. See “Response rule actions for endpoint detection”
on page 1245.
Note: You must use automatic endpoint location to identify Mac endpoint
locations. Manual endpoint location is not supported for DLP Agents running
on Mac endpoints.
4 Click Save.
The changes take effect after the agent reconnects to the Endpoint Server.
See “How to implement Endpoint Prevent” on page 1812.
See “Endpoint Server—basic configuration” on page 231.
See “Mac agent endpoint location” on page 1780.
you want is unsupported, the Enforce Server tries to display the English-language
notification.
For example, you have a Japanese-locale endpoint and a Vietnamese-locale
endpoint. The Vietnamese locale is not a supported locale. If a violation occurs on
the Japanese-locale computer, the Enforce Server displays the Japanese notification.
If no Japanese notification is available, the Enforce Server displays the
default-language notification. If the Vietnamese-locale computer violates a policy,
the Enforce Server displays the English notification because no Vietnamese
notification is possible. If the English notification is unavailable, the Enforce Server
displays the default-language notification.
If the first language you add is not supported on the endpoint, that language cannot
be considered the default language. The endpoint must contain the specific language
details to consider a language as the default language. Although the text of the
notification appears in the unsupported language, the notification window buttons
and title bar appear in the default locale of the Enforce Server.
If you want to define an unsupported language as the default language, you must
select Other as the first language. This Other label removes all other languages
in the list. Use the Endpoint configuration options to modify the text of the pop-up
window labels. You cannot specify other language responses if you select the Other
option. The Other setting displays that language notification on every endpoint,
regardless of the system locale of the endpoints.
See “Advanced agent settings” on page 1869.
Note: All English locales default to the English (United States) setting. All French
locales default to the French setting. For example, the French (France) setting
supports all types of French such as French (Canada) and French (France).
See “Setting Endpoint Prevent response rules for different locales” on page 1815.
You can use Endpoint Discover to scan all the endpoints in an organization and
scan only the specified endpoints in an organization.
Note: From Symantec Data Loss Prevention 15.0, Two Tier Detection (TTD) is not
supported. However, even if a Two Tier Detection request is generated for DLP
Agent versions earlier than 15.0, Endpoint Server ignores these agents, and does
not perform two-tier detection.
To start or stop a scan that is configured for an Endpoint Server, the DLP Agent
must be connected to the Endpoint Server. If the DLP Agent is not connected to
the Endpoint Server, the scan starts when it reconnects to the Endpoint Server. A
scan is only complete when all of the endpoints have completed the scan. If one
endpoint is disconnected from the Endpoint Server, the scan cannot complete until
that endpoint reconnects or the scan times out. If an endpoint is disconnected after
a scan has started, the endpoint continues the scan offline and communicates the
status after it reconnects to the Endpoint Server. If the endpoint remains
disconnected and exceeds a configured timeout period, the scan reports a timeout
status.
In a load-balanced environment, select all of the Endpoint Servers that connect to
a load balancer. So that when endpoints connect to any of these Endpoint Servers,
the endpoints receive the same scan details.
All incidents are stored in the Agent Store until the computer is reconnected to the
Endpoint Server. If the Agent Store exceeds the specified size limit, the scan pauses
until the Agent reconnects to the Endpoint Server and transfers the incidents.
See “About the DLP Agent store” on page 1864.
Option Description
Specify the Endpoint In this case, the Enforce Server sends the scan details to the
Servers without specified Endpoint Servers. When the endpoints connect to the
specifying the endpoints specified Endpoint Servers, then the scan details are sent to them.
Specify the Endpoint In this case, the Enforce Server sends the scan details to the
Servers and the specified Endpoint Servers. When the specified endpoint connects
endpoints to the specified Endpoint Server, the scan details are sent to the
specified endpoints. Thus, only the specified endpoints run the
scan, and optimize the network bandwidth and save time.
Note: With the addition of the incremental scan support for Endpoint Discover, the
differential scan option is no longer available. However, if you have endpoints with
DLP Agent versions 14.6 and 15.0, and you run an Endpoint Discover incremental
scan, then versions 14.6 agents still run the differential scan. See “Scanning new
or modified items with differential scans” on page 1628. for more information on
differential scan.
■ Consider another example, where a new Endpoint Discover Target scan is run
for the first time with the incremental scan option, then in this case only the
phase 2 is applicable. The incremental scan scans all the files that are added
or modified since January 1st 1970 (Epoch time).
Using Endpoint Discover 1821
About Endpoint Discover scanning
Scan 1. DLP Agent A waits for Scan 1 to complete on DLP Agent B, before it can
start running Scan 3.
You can run parallel scans. You do not have a hard limit on how many parallel
scans you can run. However, the following are the constraining factors:
■ Size and complexity of the policy
■ DLP Agent polling interval (ServerCommunicator.CONNECT_
POLLING_INTERVAL_SECONDS.int)
See “Advanced agent settings” on page 1869.
■ Endpoint Server memory
However as an indication, in our test labs, we have been able to run over 30 parallel
scans per Endpoint Server computer that has memory of 9 GB for a medium policy
complexity, and with DLP Agent polling interval of 15 minutes.
See “Creating an Endpoint Discover scan” on page 1826.
See “Creating a new Endpoint Discover target” on page 1828.
Note: DLP Agents running on Mac endpoints do not use CPU bandwidth
management and minimum battery life setting.
4 Choose the detection server to assign to this policy group. This is an optional
step.
You can assign the policy group to all detection servers or to individual servers.
Note that Symantec Data Loss Prevention automatically assigns all policy
groups to all Endpoint Discover servers.
5 Click Save.
See “Setting up and configuring Endpoint Discover” on page 1826.
See “Creating and modifying policy groups” on page 413. for more details creating
a policy group.
Note: Endpoint quarantine is not available for DLP Agents running on Mac endpoints.
The quarantine location can be either a secured folder on the local drive or a folder
on a remote file share that is accessible by the endpoint through the corporate
network. You can choose if you want to enable credentials on the secure location
or allow any anonymous user to access the location.
Note: Encrypting File Service (EFS) folders cannot support anonymous access.
Using Endpoint Discover 1826
Setting up and configuring Endpoint Discover
Not all policy groups and policies are applicable with Endpoint response rules. If
you try to create a policy with incompatible rules and responses, you receive an
error message. The error states that the policy is incompatible with the Endpoint
response rules.
See “Guidelines for authoring Endpoint policies” on page 1774.
See “How to implement Endpoint Prevent” on page 1812.
See “Configuring the Endpoint Discover: Quarantine File action” on page 1315.
Step Create an Endpoint Discover target. See “Creating an Endpoint Discover scan”
1 on page 1826.
Step Install the Symantec DLP Agent. For installation details, see the appropriate
2 Symantec Data Loss Prevention Installation
Guide.
Table 76-5 Steps to configure scan settings for an Endpoint Discover scan target
4 Add location, file size, date, and file type filters to You enter this information on
the Endpoint Discover target. the Filters tab when you
configure the new target.
5 Configure the scan idle timeout and max scan You set this information on
duration settings. the Advanced tab when you
configure the new target.
Note: You cannot schedule Endpoint Discover targeted scans. Each scan must be
started manually. You must also manually stop the scan, allow it to complete, or
allow it to timeout. You cannot pause an Endpoint Discover scan.
Using Endpoint Discover 1828
Creating an Endpoint Discover scan
Policy Groups Select the Endpoint Discover policy group you created.
If no other policy group has been selected, the Default Policy group
is used. You can assign multiple policy groups to a target.
Scan Execution Select the Scan only new or modified items (incremental scan)
option for an incremental scan. This option is the default for new
targets.
See “About Endpoint Discover incremental scanning” on page 1819.
4 Configure the following items on the Targeting tab under the Scan Server
and Target Endpoints section.
Only scan files added or modified... Select this option to include files based on
the added or modified date. Endpoint
Discover only scans items after the
specified After date, before the specified
Before date, or between the dates you
specify.
Note: If the On or After date is later than
the Before date, then no items are
scanned. If the Before date and the On or
After date are the same, then no items are
scanned. No items are scanned because
the assumed time of the Before parameter
is at zero hours, and On or After is at 24
hours.
Only scan files last accessed... Select this option to include files based on
the last accessed date.
Files types You can enter file extensions in the Include Filters and Exclude
Filters to include or exclude file types, respectively.
Folder paths You can enter folder paths in the Include Filters and Exclude
Filters to include or exclude folders, respectively.
You can specify a folder path filter for both Windows and Mac
endpoints in the same Include filters and Exclude filters fields.
Whenever you change the values of the Include or Exclude filters for an Endpoint
Discover Target with the incremental scan option selected, based on the type of
change, it is recommended that you run the consecutive scan with the full scan
option selected.
For example, if you run an Endpoint Discover Target with incremental scan and
include filter: *.docx, then all the files with the extension .docx that were added or
modified since the previous scan is scanned. Later if you change the value of the
include filter to: *.pdf and run an incremental scan, then only the PDF files that
are modified since last scan (with include filter: *.docx) are scanned. In case you
Using Endpoint Discover 1834
Creating an Endpoint Discover scan
want to scan all the PDF files, you need to run the Endpoint Discover Target scan
with the full scan option selected.
See “About Endpoint Discover incremental scanning” on page 1819.
Table 76-7 table lists the syntax you can use when you add filters.
Table 76-7 Syntax for the include filters and exclude filters
Syntax Description
A *.* pattern added at the end of the path has the same behavior
as a *. For instance a filter like $Desktop$/* or $Desktop$/*.*
have the same meaning.
? (question mark) Use this wildcard to match one character in the place where it
appears.
The forward slash (/) These characters are equivalent. They usually represent directory
and backslash (\) separators, although on macOS the backslash is a valid character
characters in a file name.
Escape characters The matching process does not support escape characters, so
there is no way to match a question mark, a comma, or an asterisk
explicitly. In general, special characters in filter items are not
supported.
Following are some additional examples for the Include and Exclude filters:
Using Endpoint Discover 1835
Creating an Endpoint Discover scan
■ To scan the entire disk except the Windows folder and Program files on Windows,
use the Exclude filter with value: $Windows$/*,$ProgramFiles$/*
■ To scan the entire disk except Windows folder and Program files on Windows
and /usr, /sbin, /opt on Mac, use the Exclude filter with value:
$Windows$/*,$ProgramFiles$/*,/usr/*,/sbin/*,/opt/*
■ To scan only the office files on Windows and Mac computers, use the Include
filter with value: *.docx,*.doc,*.pptx,*.ppt,*.xlsx,*.xls
■ To scan only the office files on Windows and Mac computers except Windows
folder and Program files on Windows and /usr, /sbin, /opt on Mac, use the
following filters:
Include filter with value: *.docx,*.doc,*.pptx,*.ppt,*.xlsx,*.xls
Exclude filter with value:
$Windows$/*,$ProgramFiles$/*,/usr/*,/sbin/*,/opt/*
See “Setting up Endpoint Discover filters to include or exclude items from the scan”
on page 1835.
$Windows$/*,/Applications/*,/System/*,/.Spotlight*,*.mp3,*.wma,*.wav,
*.vox,*.aac,*.3gp,*.dat,*.avi,*.mpeg,*.wmv,*.mov,*.mp4,*.dylib,*.jar,
*.dll,*.exe,$ProgramFiles$/*,/opt/*,/sbin/*,/bin/*,/usr/bin/*,
/Library/Manufacturer/*
Note: You can configure what filters display in the Exclude Filters field by
updating the VontuManager file located here on the Enforce Server host.
The listed filters apply to both Mac and Windows endpoints. Filters display in
English only.
4 Enter file names or paths in the Include Filters field and the Exclude Filters
field to select a subset of items that Symantec Data Loss Prevention should
process. Delimit entries with a comma, but no spaces. The path filter is
case-sensitive.
Use * (asterisk) at the end of a path to include or exclude all content in the
specified folder. For example, if you enter C:/Users/*, /Users/* in the
Include Filter field, all contents in the C:/Users folder on Windows endpoints
and the /Users/ folder on Mac endpoints are scanned.
The include filter and exclude filter file names are relative to the file system
root. Specify full paths or subdirectories, as needed. Some wildcards are
allowed.
5 Click Save.
See “Creating an Endpoint Discover scan” on page 1826.
See “Using include and exclude filters” on page 1833.
Note: Environment variables are not supported on DLP Agents running on Mac
endpoints.
Using Endpoint Discover 1837
Creating an Endpoint Discover scan
Table 76-8 lists the environment variable types you can use.
Operating system % You use this variable type to scan paths specific to the endpoint operating system.
defined variable For example, you would use %TEMP% to scan the TEMP folder on all targeted
endpoints.
Symantec Data Loss $ You use this variable to scan all user profile paths on a single endpoint. For
Prevention defined example, you would use $Documents$\* to scan the Documents folder in all
variable user profiles present on the targeted endpoints.
Variables that include or exclude user profile paths (whether Symantec Data Loss
Prevention or operating system defined) are resolved to all the user profiles present
on the endpoint. For example, if two user profiles exist on an endpoint, and you
specify $Documents$\* in the include filter, Symantec Data Loss Prevention scans
C:\Users\User1\Documents\ and C:\Users\User2\Documents.
Table 76-9 lists the Symantec Data Loss Prevention defined variables.
$CommonTemplates$ %ALLUSERSPROFILE%\Microsoft\Windows\Templates
$Cookies$ %APPDATA%\Microsoft\Windows\Cookies
$Desktop$ %USERPROFILE%\Desktop
$Documents$ %USERPROFILE%\Documents
$Favorites$ %USERPROFILE%\Favorites
$Fonts$ %WINDIR%\Fonts
Using Endpoint Discover 1838
Creating an Endpoint Discover scan
$History$ %LOCALAPPDATA%\Microsoft\Windows\History
$LocalizedResourcesDir$ %WINDIR%\Resources\0409
$Music$ %USERPROFILE%\Music
$Pictures$ %USERPROFILE%\Pictures
$PublicDesktop$ %PUBLIC%\Desktop
$PublicDocuments$ %PUBLIC%\Documents
$PublicDownloads$ %PUBLIC%\Downloads
$PublicGameTasks$ %ALLUSERSPROFILE%\Microsoft\Windows\GameExplorer
$PublicMusic$ %PUBLIC%\Music
$PublicPictures$ %PUBLIC%\Pictures
$PublicVideos$ %PUBLIC%\Videos
Using Endpoint Discover 1839
Creating an Endpoint Discover scan
$Recent$ %APPDATA%\Microsoft\Windows\Recent
$ResourceDir$ %WINDIR%\Resources
$RoamingAppData$ %USERPROFILE%\AppData\Roaming
$SendTo$ %APPDATA%\Microsoft\Windows\SendTo
$System$ %WINDIR%\system32
$SystemX86$ %WINDIR%\system32
$Templates$ %APPDATA%\Microsoft\Windows\Templates
$UserProfiles$ %SystemDrive%\Users
$Videos$ %USERPROFILE%\Videos
$Windows$ %WINDIR%
Note: To disable Scan Idle Timeout, select Indefinite for the duration of time.
Note: To disable Max Scan Duration, select Indefinite for the duration of time.
Target Type The type and icon of the target that was scanned.
Using Endpoint Discover 1843
Managing Endpoint Discover target scans
Table 76-12 summarizes details in the Scan Statistics section, which provides
detailed information about the scan.
Icon Description
Processed Number of bytes that has been scanned across the DLP Agents
participating in the scans.
Run Time Amount of time that the scan took to complete. If the scan is still
(dd:hh:mm:ss) running, the amount of time that it has been running. The total
does not include any time during which the scan was paused.
Items Filtered Number of items that were filtered when the Include filters and
Exclude filters fields are selected.
Bytes Filtered Number of bytes filtered when the Include filters and Exclude
filters fields are selected.
Items Unprocessed Number of items that could not be scanned due to some system
error.
Current Incident Count Number of incidents that were detected during the current scan,
less any deleted incidents. You can click this number to see an
incident list for this scan.
Agents Starting Scan Number of DLP Agents that have received the scan details and
are starting to run the scan.
Agents Scanning Number of DLP Agents that are running the scan.
Using Endpoint Discover 1844
Managing Endpoint Discover target scans
Icon Description
Agents Never Number of DLP Agents that have never reported to the Endpoint
Reported Server and therefore, did not receive the scan details.
Agents Not Reporting Number of DLP Agents that are not reporting to the Endpoint
Server as per the time set in the Scan Idle Timeout field on the
Advanced tab on the Manage > Discover Scanning > Discover
Targets > New Target > Endpoint > File System screen.
Agents Completed Number of DLP Agents that have completed the scan.
Agents Stopped Number of DLP Agents that have stopped the scan.
Download Full Download a report with all scan statistics in CSV format.
Statistics Report
detection parameters of a policy rule. Such data may include specific file content,
an email sender or recipient, attachment file properties, or many other types of
information. Each piece of data that matches detection parameters is called a match,
and a single incident may include any number of individual matches.
Reporting for Endpoint Discover is found under the Discover Reporting section.
Endpoint Discover incidents are marked to distinguish them from other types of
Discover incidents.
Reporting for Endpoint Prevent is found in the Reports tab of the Enforce Server.
You can view the following reports:
■ Exec. Summary - Endpoint
■ Incidents - All
■ Incidents - New
■ Policy Summary
■ Status Summary
■ Highest Offenders
If an incident is created that includes user justifications, those justifications are
included in the report in the Incident snapshot section. For example, if a violation
occurs that requires the user to enter the response User error, the incident report
includes the text SPECIAL: User typed response: "User error".
If the user selects a pre-generated justification, the justification appears in the report.
Justifications appear in the detailed report under the header Justifications.
Justifications and notifications are not compatible with Endpoint Discover, therefore
no justifications appear in Endpoint Discover reports.
You can also create customized reports for Endpoint Discover and Prevent.
However, if the user is not on the network at the time the justification is entered,
the justification section of the incident snapshot remains empty.
See “About Symantec Data Loss Prevention reports” on page 1402.
See “How to implement Endpoint Prevent” on page 1812.
See “Setting up and configuring Endpoint Discover” on page 1826.
Chapter 77
Working with agent
configurations
This chapter includes the following topics:
Tab Description
Channels Use this tab to select which aspects of the endpoint items
you want to monitor.
Channel Filters Use this tab to create and edit monitoring filters.
Device Control Use this tab to control endpoint user access to devices and
copies to the print screen.
Tab Description
Advanced Settings You can also specify advanced settings for the agents. These
settings affect how the Symantec DLP Agents process
information, detect violations, and perform on endpoints.
Note: Contact Symantec Support before changing any of
the advanced settings.
Note: If you modify an existing agent configuration, clicking the Save button applies
the changes to all of the agent groups associated with the configuration. If you
create a new configuration, the configuration is saved and you can apply it on the
Agent Groups screen.
You can apply specific monitor settings based on whether the Windows agent is
on or off the corporate network. See “Setting specific channels to monitor based
on the endpoint location” on page 1910.
See “About Symantec Data Loss Prevention administration” on page 65.
See “Server configuration—basic” on page 220.
See “Server controls” on page 219.
See “About agent configurations” on page 1846.
See “Applying agent configurations to an agent group” on page 1911.
Channel settings
Use the Enable Monitoring section on the Channels tab to select which aspects
of the endpoint items you want to monitor.
See “Enable Monitoring settings” on page 1849.
Note: You can set specific channels to monitor based on whether the Windows
endpoint is located on or off the corporate network by selecting Allow different
channels for endpoints residing on and off the corporate network. See “Setting
specific channels to monitor based on the endpoint location” on page 1910.
Working with agent configurations 1849
Adding and editing agent configurations
Note: You can set specific monitor settings based on whether the Windows endpoint
is located on or off the corporate network by selecting Allow different monitoring
for endpoints residing on and off the corporate network. See “Setting specific
channels to monitor based on the endpoint location” on page 1910.
Field Description
■ Removable Storage
■ CD/DVD
■ Local drive
■ Printer/Fax
Field Description
Field Description
Note: You can set specific filters based on whether the Windows endpoint is located
on or off the corporate network by selecting Allow different filters for endpoints
residing on and off the corporate network. See “Setting specific channels to
monitor based on the endpoint location” on page 1910.
path. Existing filters are listed in this section. The filters run in the order they appear
in the list as determined by the Order column.
Note: The DLP Agent installed on Mac endpoints does not filter using a file signature
match for all file types. Instead, the agent uses the file extension to apply file type
filters. See “Mac agent filter by file properties features” on page 1792.
When you filter to ignore files by type, the agent filters files based on the file
extension or signature. If files that you want to filter (for example DOC files) are
contained in other files (for example, ZIP files), the file you want to filter is still sent
to the detection engine. The agent does not extract the contents of container files
like ZIP during the filtering process, so the agent cannot read and, therefore, filter
the file contents.
When you filter by file path, the drive letter is ignored and the specified path for
every local drive on the agent is filtered. For example, entering c:\temp causes
c:\temp and d:\temp to be filtered on an agent with two local drives.
■ File Attributes
The Filter Action section lets you select whether you want the filter to monitor the
following attributes or not. You can include files to be monitored or exclude files
from the relevant protocol or destination.
You can select one of the following choices:
■ Monitor
■ Ignore (do not monitor)
The Endpoint Channel section lets you select the destinations, protocols, or
applications that you want to filter. You must select at least one option. Select the
items that you want the Endpoint Server to monitor.
You can select from the following items:
CD/DVD
Local Drive
HTTP/HTTPS Attachment
IM File transfer
Note: This setting only applies to 14.0.x and
earlier DLP Agent versions.
FTP transfer
Cloud Storage
Copy to Share
The Application File Access option lets you monitor any applications that appear
on the Application Monitoring page.
See “About monitoring applications” on page 1962.
The File Attributes section is where you specify the filters that you want to apply.
Information you enter in this section applies to local drive and application file access
monitoring. Select Local Drive or Application File Access to edit the File Path
on Destination field.
Working with agent configurations 1854
Adding and editing agent configurations
General For IP-based filters, paths and asterisks IP-based filter: \\10.211.*.*\path\\*
[*] can be used for wild-card matching. \\10.211.*.*\path\*
\\10.211.*.*\path/*
Add an asterisk for each octet.
Specific shared drive filter (in
//10.211.*.*/path/*
Paths that are specified in Windows UNC this case the c
format are handled automatically for Mac drive):\\10.211.*.*\c$\* \\10.211.201.*\path\
Endpoints.
RDP share Paths must begin with \\rdp, \\RDP, or \\rdp\e\* \\rdp\*
\\tsclient.
\\RDP\c\testshare\*
\\tsclient\e\sharedPath\*
Note: Filtering on the DLP Agent for Mac occurs using the file extension only; true
file type filtering is not supported for the DLP Agent for Mac.
Because the DLP Agent for Windows can filter based on the true file type, the agent
can correctly identify and filter files that have file extensions that do not match the
original file extension. For example, if a user changes the .doc file name extension
to .jpg, the agent can identify the file based on its signature as a DOC file, and either
monitor or ignore it based on the agent configuration filter.
Note: Text files (.txt) do not contain file signature data; consequently, the agent
can only monitor or ignore these types of files based on the file extension. True
type filtering is not possible for TXT files.
Table 77-3 Supported files for true file type filtering on Windows endpoints
Table 77-3 Supported files for true file type filtering on Windows endpoints
(continued)
Filtering IP addresses
You can only filter using IP addresses on Windows endpoints. For filtering IP
addresses, use the following rules. Enter any IP-based filters that you want to use.
If you leave this field blank, Symantec Data Loss Prevention inspects all packets.
The format of the IP protocol filters (found in the protocol definitions and protocol
filter definitions) is:
ip_protocol_filter := protocol_filter_multiple_entries [; *]
protocol_filter_multiple_entries := protocol_filter_entry
[; protocol_filter_multiple_entries]
protocol_filter_entry := +|-, destination_subnet_description,
destination_subnet_description source_subnet_description
source_subnet_description := subnet_description
subnet_description := subnet_description
:= network_ip_address / bitmask
| *
Working with agent configurations 1858
Adding and editing agent configurations
Note: Separate each entry with a comma to correctly monitor or ignore specified
items.
Each stream is evaluated in order against the filter entries until an entry matches
the IP parameters of the stream.
A minus sign (-) at the start of the entry indicates that the stream is dropped. A plus
sign (+) at the start of the entry indicates that the stream is kept.
A subnet network description of * means that any packet matches this entry.
A subnet bitmask size of 32 means that the entry must match the exact network
address. For example, a filter of +,10.67.0.0/16,*;-,*,* matches all streams going to
network 10.67.x.x but does not match any other traffic.
Note: The more specific you are when you define the recognition characteristics,
the more specific your results. For example, if you define only one specific IP
address, only incidents involved that IP address are captured. If you do not define
any IP addresses, or if you define a wide range of IP addresses, you achieve broader
results. Include at least one plus sign (+) clause and one minus sign (-) clause to
be explicit about what is included and what is excluded.
Filtering domains
The Domain filters need to be applied separately for HTTP and HTTPS. To add
filters for any website that supports HTTP and HTTPS, add individual filters for
HTTP and HTTPS in the respective text boxes. The IP address filter works with all
other network protocols.
Note: You can use HTTP and HTTPS filters to monitor and ignore domains for
browsers on both Windows and Mac endpoints. See “Enable Monitoring settings”
on page 1849.
You can use filters to include (inspect) or exclude (ignore) messages from specific senders.
You can also use filters to include or exclude specific recipients. The specific filter syntax
depends on the protocol.
■ You can use the wildcard symbol (*) in the domain entry.
For example, *symantec.com would match www.symantec.com, www.dlp.symantec
.com, and all domains that end with symantec.com.
■ A minus sign (-) at the start of the entry indicates that the URL is ignored.
■ A plus sign (+) at the start of the entry indicates that the URL is inspected.
■ If you add an asterisk (*) to the end of the filter expression, any URL domain not explicitly
matching any of the filter masks is ignored.
These filters are executed is from left to right until the first match occurs or the agent reaches
the end of the filter entries.
-sales.symantec.com,+*symantec.com,*
HTTP requests to sales.symantec.com are ignored, and all of the requests that are sent to
any other symantec.com domain are inspected. The last asterisk in the filter filters out all
other domains like www.xyz.com.
Note: If you leave the HTTP/HTTPS filter empty, all the URLs are inspected.
Note: Sensitive files are moved to the file recovery location and remain there until
the endpoint users deletes them. See “File Recovery Area Location settings”
on page 1865.
Note: Add multiple printers to ignore by adding them to new lines in the Filter by
Printer Properties field. Do not use comas [,] or semi-colons [;] to separate multiple
printers; these separators prevent printer filtering.
Note: To ignore a printer with an asterisk [*] in its name, you must enter an escape
character before the asterisk in the filter. For example, if the printer name is
Printer*Name, enter Printer\*Name.
Note: You can set different access configurations based on whether the Windows
endpoint is located on or off the corporate network. Select Allow different device
controls for endpoints residing on and off the corporate network. See “Setting
specific channels to monitor based on the endpoint location” on page 1910.
The Device Control tab provides you with the following controls:
■ USB Storage
You can set the agent to only block or provide read only access to USB storage
devices. Other non-USB storage devices (for example, eSATA drives, MTP
devices, and virtual hard disks [VHD]) are not controlled.
■ Network shares
You can set the agent to only block or provide read only access to network
shares.
■ Block Print Screen
You can select this item prevent endpoint users from copying their screens using
the Print Screen key or when they hit the [Shift + Print Screen] key combination.
Enabling Block Print Screen applies to Window 7, 8 and 10 endpoints but not
endpoints running in virtual environments.
If you set access to a device, and an endpoint user exceeds the access limits, the
agent enforces access and a pop-up displays on the endpoint. The pop-up notifies
the user that access to the device is limited. The pop-up displays for the first instance
Working with agent configurations 1862
Adding and editing agent configurations
that the endpoint user exceeds access limits, but for subsequent violations no
pop-ups display.
Agent settings
The Settings tab is divided into the following sections:
■ Server Communication
See “Server Communication settings” on page 1862.
■ Resource Consumption on the Endpoint Host
See “Resource Consumption on the Endpoint Host settings” on page 1863.
■ Resource Consumption for Endpoint Discover Scans
See “Resource Consumption for Endpoint Discover Scans settings” on page 1863.
■ File Recovery Area Location
See “File Recovery Area Location settings” on page 1865.
■ Safe Mode
See “Safe Mode settings” on page 1866.
■ Cloud Storage
See “Cloud Storage settings” on page 1867.
■ Printer/Fax
See “Printer/Fax settings” on page 1868.
■ Information Centric Encryption
See “Information Centric Encryption settings for DLP Agents” on page 1868.
Field Description
From Agent Throttle Maximum rate at which the DLP Agent uploads incidents, status,
events to the Endpoint Server.
Working with agent configurations 1863
Adding and editing agent configurations
Field Description
To Agent Throttle Maximum rate at which the DLP Agent downloads policy and
agent configuration updates from the Endpoint Server.
Field Description
% of Total Disk Space limit For percentage enter the amount in the corresponding box.
The default percentage is 5% of total disk space.
Absolute disk space size limit Select the radio button for this option, enter the particular
size in the field, and choose the unit of measurement from
the drop-down list (Bytes, KB, MB, or GB).
Note: The long-term average CPU usage and minimum battery life remaining
features are not currently supported for agents running on Mac endpoints.
Working with agent configurations 1864
Adding and editing agent configurations
Field Description
Note: Files recovered from cloud sync application incidents are not removed from
the endpoint.
Field Description
File Recovery Area Location Specify the path to the file recovery
directory. The default is
%USERPROFILE%\My Recovered
Files on Windows endpoints.
Recovered files are segregated by folder. Each folder is named according to the
application in which the file was moved. Also, a ReadMe.txt file is created in the
same folder from where the sensitive file was moved. This file states where the file
originally resided. For example, if a user attempts to use TextEdit to save a sensitive
file to a removable storage device attached to a Mac endpoint, Symantec Data Loss
Prevention moves the file to the path $HOME/My Recovered Files /TextEdit and
creates a ReadMe.txt file with original file information.
Occasionally file recovery fails. This occurs if permissions to the recovery folder
have been changed or if user authentication failed. If this occurs, Symantec Data
Loss Prevention moves the sensitive file to the root directory folder /Alternate
Recovered Files using a high privilege account to ensure that files are recovered
without being deleted.
Endpoint users can recover sensitive files from both locations ($HOME/My Recovered
Files and the root directory folder /Alternate Recovered Files), as well as
recover deleted files. Symantec Data Loss Prevention deletes files in a number of
situations. If a user copies a sensitive file from the endpoint to a removable device
using the cut operation, the file is deleted. To recover the file, the user must locate
it in the recovery location and move it to its original location. Also, a sensitive file
located on a removable device is deleted when sensitive information is added to it
and the file is saved. In this scenario, the save operation is blocked and the file is
deleted. Endpoint users can recover the file at $HOME/My Recovered Files.
Table 77-4 lists example entries used to filter data saved from Microsoft Office
applications to cloud (domain) and web (IP) locations.
Printer/Fax settings
You can set DLP Agents to monitor data that is sent by Microsoft Office applications
to a printer. If sensitive data is present in the print file, the agent can stop the print
job on the page that contains sensitive data or prevent the entire document from
printing.
Select one of the following options in the Printer/Fax area.
■ Monitor only pages that are being printed/faxed
The default setting monitors printed and faxed data in page-by-page sequence.
If the agent detects sensitive data, it blocks the print job on the page where
sensitive data resides, as well as subsequent pages. For example, if an endpoint
user prints a 10-page document and sensitive data resides on page 9, then the
agent allows pages 1-8 to print and prevents page nine and 10 from printing,
then the agent logs an incident.
Note: If you enable Monitor only pages that are being printed/faxed, (including
if a Limit Incident Data Retention response rule is used), the print buffer file (a
plain text file) is retained in the incident snapshot when there is a policy violation.
Note: If you use a Limit Incident Data Retention response rule, and enable
Monitor entire file, the original file is retained in the incident snapshot when
there is a policy violation.
Note: Apply the Endpoint Prevent ICE license to use this feature.
For information about how Symantec Data Loss Prevention interacts with Symantec
ICE, refer to the Symantec Information Centric Encryption Deployment Guide at:
https://support.symantec.com/en_US/article.DOC9707.html
See “Configuring the Enforce Server to connect to the Symantec ICE Cloud”
on page 212.
Note: If you change advanced agent settings and the agents connect to Endpoint
Servers in a load-balanced environment, you must apply the same changes to all
Endpoint Servers in the load-balanced environment.
See “Endpoint Prevent for Mac agent advanced agent settings features” on page 1793.
See “Endpoint Discover for Mac advanced agent settings support” on page 1795.
To create a transient
connection between the
agent and Endpoint Server,
enter an interval greater
than the
EndpointCommunications.
IDLE_TIMEOUT_IN_SECONDS.int
value.
EndpointCommunications.HEARTBEAT_INTERVAL_IN_ 270
SECONDS.int
Working with agent configurations 1882
Adding and editing agent configurations
FileSystem.ENABLE_VEP_FILE_ELIMINATION.int 3
Working with agent configurations 1888
Adding and editing agent configurations
scanned files.
■ 5 runs detection on files
moving removable
storage channels. A
.vep file is created for
all other scanned files.
■ 6 runs detection on files
moving through
application file access
and cloud storage
channels. A .vep file is
created for all other
scanned files.
■ 7 runs detection on files
moving through
removable storage,
application file access,
and cloud storage
channels. A .vep file is
created for all other
scanned files.
Working with agent configurations 1890
Adding and editing agent configurations
■ USB
■ Secure Digital
■ FireWire
It is enabled by default.
Set to 1 if browser
performance is degraded.
Setting to 1 prevents the
agent from defining a full
path for each file that is
moved through a browser.
If you enable this setting, the
agent does not monitor
temporary file locations that
the browser uses,
predefined file paths, and
does not apply file type
filters.
Note: DLP Agents running on Mac endpoints support this feature when the Endpoint
Location is set to Automatic. If Manual is used for the Endpoint Location, all Mac
agents are identified as Off the Corporate Network.
Note: The setting you enter should be 5 minutes greater than the agent polling
interval (ServerCommunicator.CONNECT_POLLING_INTERVAL_SECONDS.int).
See “Advanced agent settings” on page 1869.
■ Changing groups
predefined attributes. You can create other user-defined attributes based on Active
Directory attributes. For example, you can create a group condition based on a
location attribute, such as all users (agents) located in New York, and a department
attribute, such all users who are part of the Human Resources department. For that
group you can deploy a configuration in which removable storage is monitored. In
this example, the Agent Group definition has two conditions: location(s) and
department name(s).
Agent groups simplify the management of agent configuration exceptions by allowing
a logical grouping of endpoint agents based on conditions. For example, if you have
Instant Messenger monitoring enabled for US employees, except for those US
employees in the state of Texas, you can have a group named "United States
Texas," and disable IM monitoring for that group. Every new agent that is added in
the "United States Texas" group automatically gets a configuration with IM monitoring
disabled.
You can roll out configuration changes in stages using Agent Groups. In addition,
you can create groups for exceptions to monitor particular computers or sets of
computers differently. For example, you can create an Executive Staff group for
cases when the executive staff is not subject to configurations that apply to the rest
of the organization
The ability to change an agent group action is useful when you need to troubleshoot
problems in Symantec Data Loss Prevention. For example, you can create a
temporary group that disables certain monitoring and configurations for employees
(printing with a specific application, for example) to get around a security issue,
then change the employees back to the old group when the printing problem is
resolved
See “Developing a strategy for deploying Agent Groups” on page 1913.
Step 5 Create the groups you want See “Creating a new agent
using the defined attributes. group” on page 1921.
Attribute Definition
Attribute Definition
User-defined attributes are created by the administrator for the purpose of creating
groups. You can create user-defined attributes based on Active Directory (AD)
attributes. User-defined attributes can be deleted or modified.
Note: User-defined attributes are not supported for computers running macOS.
■ User Domain - Attributes related to the logged-in user; for example, the
domain attribute "department."
■ Computer domain - Attributes related to the computer; for example, computer
attribute "location."
6. Add a search filter. You can select from existing applied attributes to define a
search filter.
See “Defining a search filter for creating user-defined attributes” on page 1917.
7. Specify an Active Directory attribute.
Only Active Directory attributes are supported for user-defined agent group
attributes.
8. Click Save. Clicking Save saves your attribute but does not apply it.
9. Test the attribute and fix any issues you find in testing.
To test, export the attribute(s) from the Attribute List screen and review the
attribute.
Then, use the Attribute Query Resolver test tool that runs on the Windows host
where the endpoint is installed, to test the attribute.
See “Verifying attribute queries with the Attribute Query Resolver tool”
on page 1918.
10. Apply the tested attributes. Agents start reporting attribute values as soon as
the agents resolves the attributes on Active Directory.
11. Verify that agents are reporting attribute values. Go to the System > Agents
> Overview > Agent List screen and verify that the agents are reporting
attribute values. You can select a particular agent entry and see the Preview
Pane. The Preview Pane lists all predefined and user-defined attributes and
their values, conflicts, and alerts.
See “Using the Agent List screen” on page 1929.
See “Defining a search filter for creating user-defined attributes” on page 1917.
(objectClass=User)(uid=$LoggedinUser$))
Working with Agent Groups 1918
Creating and managing agent attributes
The value embedded in dollar ($ $) signs represents the agent attribute that you
can choose when you click the Select from existing attributes drop down on the
Configure Agent Attribute screen.
See “Verifying attribute queries with the Attribute Query Resolver tool” on page 1918.
Note: Attribute Query Resolver tool only fetches the attributes of the currently logged
in user.
Next, use this XML file to test your attributes with the Attribute Query Resolver tool.
3. Attributes with errors display in the output with blank values. For example, if
the attribute User Email had an error, it displays as User Email= with no
value. Errors can occur if a user provides an incorrect search filter, if a specified
attribute does not exist in Active Directory, or if Active Directory is not reachable.
You can go to the AttributeQueryResolver.log log file to view details for
the attribute errors. In this attribute error log, files with no errors display an
Error code : 0 (no errors). Attributes with errors display an error code and
error description. For example, the User Email attribute with a blank attribute
in the output (indicating an error) displays an error message that reads:
2014-01-21 20:41:48 | AttributeQueryResolver | SEVERE | Attribute
: User Email Error code: -2147463161 Error description :
E_ADS_PROPERTY_INVALID
Working with Agent Groups 1919
Creating and managing agent attributes
If you provide an invalid XML file as a parameter to the Attribute Query Resolver
tool, or if you do not have appropriate rights to run the tool, the following SEVERE
error is logged:
AttributeQueryResolver | SEVERE | Query store is not open.
If the attribute definitions are correct, you can deploy the attributes to agents. If
there are errors, edit the attributes reporting errors, export the attributes, and run
them through the Attribute Query Resolver tool. Repeat this process until there are
no errors.
See “Applying a new attribute or changed attribute to agents” on page 1919.
Check agent group status and manage agent groups from the System > Agents
> Agent Groups screen. To view agent group conflicts, click View Agent Group
Conflicts on the right-hand side of the screen.
Information about agent groups is divided into several columns on this page. You
can click any column header to sort entries alphanumerically in that column. Click
the column header again to sort in reverse order.
Use these buttons to perform the following actions:
■ New - Create a new agent group.
■ Delete - Delete the selected agent groups.
■ Enable - Enable the selected agent groups.
■ Disable - Disable the selected agent groups.
■ Assign Configuration - Assign a configuration to created or updated agent
groups.
■ Update Configuration - Update a configuration for the selected agent groups.
■ Filters - Reorganize this list of agent groups for easier viewing.
See “About agent groups” on page 1912.
See “Overview of the agent group deployment process” on page 1914.
See “Agent group conditions” on page 1921.
5. Verify that each configuration for the group has been updated by assuring that
there is no longer a red exclamation mark following the names of the agent
configurations.
Note: If an agent is offline, it does not receive an updated configuration until the
agent comes online again.
your implementation. You should also periodically check to see if there are group
conflicts.
You can see conflicts on the View Conflicts screen by clicking View Agent Group
Conflicts link on the System > Agents > Agent Groups screen. On the View
Conflicts screen, under the Conflicting Groups heading, you see the names of
the conflicting groups.
If a particular agent can qualify to be a part of more than one group, a conflict arises.
For simple conflicts, where group 2 is a subset of group 1, Symantec Data Loss
Prevention automatically resolves the conflict in favor of the subset group 2. For
example, if you have these two groups:
1. Group US={Country=US}
2. Group Texas={Country=US & State=Texas}
the conflict between group "US" and group "Texas" is resolved to group "Texas"
because group "Texas" is a subset of group "US."
No automatic group conflict resolution mechanism exists for non-subset groups
that are in conflict. For example, if you have a group called US_HR in which the
Country=US and the Department=HR, and a Group US_VP in which the Country=US
and the Designation=VP, agents that belong to VPs in the HR department will result
in a conflict. Since Department=HR is not a subset of Designation=VP (or vice
versa), the conflict cannot be resolved and the agents with conflicts are placed in
a warning state and continue to belong to whatever group they belonged to before
the conflict arose. For these more complex conflicts, Symantec Data Loss Prevention
reports conflicts and you must edit the group definitions to resolve the group conflicts.
See “Changing groups” on page 1924.
Changing groups
You can change groups for agents to have a different configuration on the System
> Agents > Overview > View All Groups page. The ability to change an agent
configuration from one group to another is useful in many situations, especially
when you need to troubleshoot a problem with Symantec Data Loss Prevention.
For example, say that your employees in the group Trading Group Texas have
problems printing with the stock trading application. This issue causes a major
problem for your business, as traders are not able to work without the ability to print.
You can move the agents in Trading Group Texas to a temporary group, called
Troubleshoot Trading Group, with print monitoring disabled, until you can
troubleshoot the agent endpoints and fix the issue. After the problem is solved, you
can change the group back to Trading Group Texas to enable print monitoring.
To change groups for agent configurations:
Working with Agent Groups 1925
Changing groups
1. Click the checkboxes for the agent entries that you want to move.
2. Click Change Group.
3. Choose a new group from the System > Agents > Agent List > Agent Group
menu.
4. Click OK.
See “About Symantec DLP Agent administration” on page 1926.
Chapter 79
Managing Symantec DLP
Agents
This chapter includes the following topics:
An OK status indicates that the DLP Agents in this state are operating under normal conditions. This
status indicates:
■ Services and the file-system drivers for the DLP Agent are running
OK ■ The DLP Agent cache is created and available
■ The DLP Agent is reporting to the Endpoint Server as expected
A Warning status indicates that the DLP Agents in this state have experienced conditions which
may require attention.
A Critical status indicates that the DLP Agents in this state have experienced conditions that require
immediate attention:
The Agent Overview screen lets you quickly access agent summary reports, agent
configurations, and agent groups.
Section Description
Agent Summary Reports Agent summary reports let you summarize agent information and create reports.
Section Description
Agent Configurations You can configure agent settings on the Agent Configurations screen.
See “About agent configurations” on page 1846.
Agent Groups You can view existing agent groups and resolve agent group conflicts.
Note: Use the Filters feature to execute or remove filters you select. See “Agent
filtering” on page 1935.
Managing Symantec DLP Agents 1930
About Symantec DLP Agent administration
■ Enable
Enables the disabled agents.
Enabled agents automatically reconnect with the
Endpoint Server and obtain the most current policies.
Enabling an agent enables monitoring on that endpoint.
Enabled agents can log events on the Endpoint Server.
■ Disable
Stops monitoring and any active scans on agents.
■ Set Log Level
Sets the logging level for the specified agent. Symantec
Technical Support uses agent logs for troubleshooting
purposes.
Note: It is recommended to contact Symantec
Technical Support before you change the log level for
an agent.
See “About DLP Agent logs” on page 1957.
■ Reset Log Level
Resets the logging level for the specified agent to the
default INFO level. Symantec Technical Support uses
agent logs for troubleshooting purposes.
See “About DLP Agent logs” on page 1957.
■ Set Under Investigation
Set if you believe there is some sort of issue with the
agent. You can set this status regardless of whether
the agent is running, disabled, or shut down. An
additional icon, a flag, appears next to the main status
icon of the agent.
■ Remove Under Investigation
Removes the Set Under Investigation status from the
selected agents.
When you delete an agent, you remove that agent and all
associated events from the Endpoint Server. It is no longer
visible in the Enforce Server administration console.
Deleting an agent from the Endpoint Server does not mean
that it has been uninstalled from the endpoint.
Managing Symantec DLP Agents 1931
About Symantec DLP Agent administration
Change Server Lets you change the Endpoint Server to which the agent
connects.
Change Group Lets you assign the selected agent to an agent group that
you select.
Pull Logs Lets you pull agent logs and operational logs for the agent.
You can pull either the agent logs, or the operational logs,
or both sets of logs.
When the logs are pulled from the endpoint, they are stored
on the Endpoint Server in an unencrypted format. After
you collect the logs from the Endpoint Server, the logs are
deleted from the Endpoint Server and are stored only on
the Enforce Server. You can only collect logs from one
endpoint at a time.
Enable Uninstall Password Prevents the agent running on Windows endpoints from
being uninstalled unless you enter the agent uninstall
password during the uninstall process.
Section Description
■ OK
Indicates the agent service and file-system driver are running, that the
cache is created and available, and that the connection functions as
expected.
■ Warning
Indicates the agent may need attention. For example, Symantec Data
Loss Prevention assigns this status when the endpoint data share nears
its storage limit.
■ Critical
Indicates that the agent is experiencing transitory connection problems.
The agent may have been down for a period of time. Policy and
configuration may be out of date. The agent may not be compatible with
the Enforce Server.
■ Investigating
Indicates that the agent in question is under investigation. Agents may
be under investigation for a number of reasons. These reasons include
sending too many false positive incidents, and being unable to connect
to the Endpoint Server.
■ Not Investigating
You select this item to remove an agent from investigation.
■ Log Level Changed
Indicates that the log level for the agent has been changed or reset.
See “About DLP Agent logs” on page 1957.
■ Default Log Level
You select this item to change the log level.
See “About DLP Agent logs” on page 1957.
Alerts Displays the number of Warning and Critical alerts that occur on an agent.
To see a list of alerts for a particular agent, click on the relevant agent entry
to display the Events screen.
User Name Displays the user name of the logged in endpoint user. If multiple users are
logged in to the endpoint, multiple displays.
Section Description
■ Unknown
Agents with unknown status.
■ Reporting
DLP Agents that are currently connected to the corporate network.
■ Not Reporting
DLP Agents that are not currently connected to the corporate network.
Last Update Displays the date and time on the Enforce Server when the agent was last
Time updated.
Agent filtering
You can filter what agents display on the Agent List screen by clicking Filters.
After you are done selecting filter criteria, click the check box.
Click a column header to sort entries alpha-numerically. Click the column header
a second time to sort in reverse order. By default, Symantec Data Loss Prevention
lists agents by the endpoint name. Select items in the column headers to only
display agents containing the selected data.
You can filter the agents that display by a number of criteria including agent
configuration, server name, and agent IP address. Additionally, you can filter the
agent events by specific sets of criteria relating to the Symantec DLP Agent.
Summarizing and filtering the agents lets you view agents by specific criteria, and
in the order that you want. For example, you can display the agents that have the
Default Configuration associated and then display the agents that were updated
in the last 7 days. You can click a column to the agents by the date they were last
updated.
Note: Click Select all to select all agents that meet the filter criteria regardless of
what agents currently display on the grid. This selection is useful when agents flow
across more than one page. Click the box at the top left of the grid to select all
agents that display on the grid.
You can filter the agents that display in the grid by using the following items:
Alert Category Lets you filter on each of the agent alert categories.
Machine Name Enter the name of an endpoint you want to display. The
alphanumeric value you enter displays all endpoints that
contain the value string. For example, to display endpoints
with 123 anywhere in the name, enter 123.
User Name Enter the user name of a user that is associated with an
endpoint you want to display.
Agent Group Select an agent group to display all the agents that are
contained in the group.
Last Update Time Select an update time. This value represents the last time the
Enforce Server received data from agent.
Endpoint Server Click the Endpoint Server name to display the agent associated
with that server. You can also select Deleted to display agents
currently reporting to deleted Endpoint Servers.
Note: You complete agent management tasks on the Agent List screen. See “Using
the Agent List screen” on page 1929.
You can select which DLP Agents display in a report by filtering the agent events
by specific sets of criteria. For example, you can summarize the agents by the
associated agent configuration and then filter those configurations by the most
recently updated agents.
You can generate a filtered report by specifying a number of criteria, including agent
configuration, server name, and agent IP address. Summary reports take their
name from the summary criterion. If you rerun a report with new criteria, the report
name changes accordingly.
To create a DLP Agent summary report:
1 Select an item in the Date list to display agents by last connection time.
2 Click Advanced Filters and Summarization.
Managing Symantec DLP Agents 1937
About Symantec DLP Agent administration
3 Select an item in the Summarize By list to select on which criteria you want
to summarize.
See Table 79-6 on page 1937.
You can summarize by the following items:
■ Agent Configuration
■ Agent Group
■ Agent IP
■ Agent Status
■ Agent Version
■ Alerts
■ Connection Status
■ Endpoint Server
■ Investigating State
■ Log Level
■ OS
■ Platform
■ State Category
■ State Sub Category
■ Uninstall Password
4 Click Add filter if you want to add additional filters. Table 79-6 lists advanced
filters.
5 Click Apply to generate the report using the specified filters.
6 Click Save > Save As to save the report you created.
7 Click Send to email the report.
8 Click Export > All: CSV to download a CSV file of the report.
Agent IP ■ Contains Ignore Case Agent IP: Enter the IP address you
■ Does Not Contain want to filter.
Ignore Case
■ Matches Exactly
■ Does Not Match
Exactly
■ Matches Exactly
Ignore Case
■ Starts With
■ Ends with
Agent Version ■ Contains Ignore Case Agent Version: Enter the DLP Agent
■ Does Not Contain version number which you want
Ignore Case filtered.
■ Matches Exactly
■ Does Not Match
Exactly
■ Matches Exactly
Ignore Case
■ Starts With
■ Ends With
Machine Name ■ Contains Ignore Case Machine name: Enter the computer
■ Does Not Contain name that you want to use as a filter.
Ignore Case
■ Matches Exactly
■ Does Not Match
Exactly
■ Matches Exactly
Ignore Case
■ Starts with
■ End with
User Name ■ Contains Ignore Case Enter the user name or search term
■ Does Not Contain that you want to use as a filter.
Ignore Case
■ Matches Exactly
■ Does Not Match
Exactly
■ Matches Exactly
Ignore Case
■ Starts with
■ End with
Summary reports take their name from the summary criterion. If you rerun a report
with new criteria, the report name changes accordingly.
Table 79-7describes the columns that display in the summary report you create.
Item Description
Change Endpoint Server Enter the IP address or host name and port
number to change the Endpoint Servers your
DLP Agents report to.
Pull Logs Select the type of agent logs that you want,
then click OK. You can select one of the
following types of logs:
■ Service Logs
■ Operational Logs
Click OK to confirm.
Note: After you disable an agent,
configuration updates and Endpoint Discover
requests from the Endpoint Server are not
received.
Managing Symantec DLP Agents 1945
About Symantec DLP Agent administration
Click OK to confirm.
Note: After you enable the agent, restart it.
Restarting the agent ensures that you have
the latest policy, configuration updates, and
Endpoint Discover requests.
Reset Log Level Reset the logging level for a Symantec Data
Loss Prevention agent to the default INFO
level. Symantec Technical Support uses
agent logs for troubleshooting purposes.
Set Log Level Set the logging level for a Symantec Data
Loss Prevention agent. Symantec Technical
Support uses agent logs for troubleshooting
purposes.
Note: It is recommended to contact
Symantec Technical Support before you
change the log level for an agent.
Enable Uninstall Password Confirm that you want to enable the uninstall
password for the selected agent or agents.
Disable Uninstall Password Confirm that you want to disable the uninstall
password for the selected agent or agents.
When selected, the agent or agents status
turns to Warning.
■ DLP Agents to connect to other Endpoint Prevent Servers when the endpoint
is located in another geographic location or is moved to another policy group.
■ DLP Agents to connect to alternate Endpoint Prevent Servers if the maximum
number of DLP Agents are already connected to the primary Endpoint Prevent
Server.
To change the Endpoint Prevent Servers that the DLP Agent reports to:
1 Enter the IP address or host name for the primary Endpoint Prevent Server.
2 Enter the port number for the primary Endpoint Prevent Server.
3 If you want to add an alternate Endpoint Prevent Server, click the plus sign (+)
to add another entry.
4 Enter the IP address or the host name for the alternate Endpoint Prevent Server.
5 Enter the port number for the alternate Endpoint Prevent Server.
6 If you want to add an additional alternate Endpoint Prevent Server, repeat step
3.
7 If you have added too many Endpoint Prevent Server entries, you can delete
an entry by clicking the minus sign (-) next to the entry.
8 If you are finished adding or changing the Endpoint Prevent Servers, click OK
to submit your changes.
Entry Description
Type Displays the event type, which includes the following possible values:
■ Severe
■ Agent Information
■ OK
Category Lists the event category, such as Agent Service Status, Connection
Status, File-System Driver, or data store.
You can click any event to display the agent event detail screen for that event.
See “Agent Event Detail screen” on page 1948.
You can summarize how items display on the Events screen based on the items
listed in Table 79-9. You can also filter the information that displays on the Events
screen using a number of criteria, including computer name, agent sub categories,
information from the event summary, and event type. Summarizing and filtering the
events lets you view the agent data in the order that you want. For example, you
can summarize the agents by computer name and then filter by the most recently
updated agents.
You can delete agent events by selecting an event and clicking Delete.
See “About filters and summary options for reports” on page 1441.
See “Troubleshooting agent alerts” on page 1949.
Column Description
Info Lists the number of events associated with the agent. Click this
number to display more information about the event or events.
General Type Indicates the general type of event that has occurred. The
types possible events include:
■ Severe
Indicates an error that requires immediate attention.
■ Warning
Indicates a problem that is not severe enough to generate
an error.
■ Info
Lists agent information.
■ Time
Provides the time the event occurred.
■ Machine Name
Provides the endpoint name.
Managing Symantec DLP Agents 1949
About Symantec DLP Agent administration
DLP Outlook The Outlook plug-in was modified, To fix the issue:
plug-in disabled, or deleted.
■ Restart Outlook.
tampered with
■ Verify that the Outlook plug-in Outlook2k3 Addin is
enabled in Outlook.
■ Run Outlook for at least 15 seconds, then restart
Outlook.
■ Confirm that the Outlook plug-in Outlook2k3 Addin
is enabled.
DLP Outlook The Outlook plug-in installation failed. Run the AgentInstaller.msi manually to repair
plug-in the agent installation.
installation
failed
DLP Lotus The Lotus Notes plug-in was modified. To fix the issue:
Notes plug-in
■ Restart Lotus Notes.
tampered with
■ Uninstall the agent.
■ Restart the endpoint and install the agent.
DLP Lotus The Lotus Notes plug-in installation failed. Run the AgentInstaller.msi manually to repair
Notes plug-in the agent installation.
installation
failed
DLP AIM plug-in The AIM plug-in was modified or the plug-in To fix the issue:
tampered with installation failed.
■ Restart AIM.
■ Uninstall the agent.
■ Restart the endpoint and install the agent.
DLP AIM plug-in The AIM plug-in installation failed. Run the AgentInstaller.msi manually to repair
installation the agent installation.
failed
Active Directory Active Directory permissions conflict with Verify that the credentials that are passed to the agent
user group Symantec Data Loss Prevention have necessary permissions to extract logged-in user
resolution failed permissions. Also, Active Directory may information from Active Directory.
be missing attributes.
Managing Symantec DLP Agents 1951
About Symantec DLP Agent administration
Agent is The agent was disabled by the Start the Windows agent using the Agent List screen.
disabled by administrator who executed the Disable You can also start the agent by using the sc command.
enforce user troubleshooting task on the Agent List
See “Using the Agent List screen” on page 1929.
screen.
For Mac agents, you must use the agent_start tool to
start the agent.
Agent requires The administrator can either disable or Restart the agent on the Agent List screen.
restart enable data loss monitoring on endpoints
See “Using the Agent List screen” on page 1929.
by executing the Disable or Enable
troubleshooting task on the Agent List
screen. Monitoring is enabled by default
after the agent installation. However, when
the administrator executes the Enable or
Disable tasks and the agent is busy, the
agent status may not update, so the agent
remains in a Warning state.
Agent crash If the agent crashes, the Enforce Server To fix the issue:
dump available displays the Warning agent alert type. In
■ Shut down the agent on the Agent List screen.
on endpoint for this scenario, a log file is created that
See “Using the Agent List screen” on page 1929.
analysis Symantec Support can use to troubleshoot
■ Collect the crash dump files (*.dmp) from the path
why the agent crashed.
/AgentInstallDirectory/_MemDumpFiles/
Agent crashes can be caused by the on the respective endpoint.
following: ■ Delete the crash dump files.
■ Temporary environment issues ■ Restart the agent on the Agent List screen.
■ Unknown agent issues
Agent version is The agent is one or more versions older Upgrade the agent to the latest version.
older than than the Endpoint Server version to which
Enforce Server it connects. For example, if the Endpoint
version Server is version 15.0 and the agent is
version 14.6.x, that agent displays a
Warning agent alert. If the Endpoint Server
is version 14.6 and the agent is version
14.x, the agent displays an OK agent
status.
Agent group This alert occurs if the agent cannot collect To fix the issue:
attribute required data from Active Directory, which
■ Verify Active Directory attribute query syntax.
discovery failure prevents the Enforce Server from moving
■ Use AttributeQueryResolver.exe to test
the agent into an agent group. The agent
Active Directory queries that are defined in the
cannot collect data if there is an issue with
Enforce Server.
Active Directory permissions or if required
attributes are missing from Active See “About agent groups” on page 1912.
Directory.
Agent group The Endpoint Server automatically assigns To fix the issue:
conflicts the agent to an Agent Group depending
■ Review Agent Group settings.
on the endpoint attributes set during the
See “About agent groups” on page 1912.
Agent Group setup. If the endpoint meets
■ Re-create the agent group and use attributes that
multiple Agent Group conditions, the
satisfy the conditions of the agent.
Warning alert is thrown.
Agent Uninstall This alert occurs when the administrator To fix the issue, enable the agent uninstall password
Password is disables the agent uninstall password by by running the Enable Uninstall Password task on
Disabled running the Disable Uninstall Password the Agent List screen.
task the Agent List screen.
See “Using the Agent List screen” on page 1929.
Managing Symantec DLP Agents 1953
About Symantec DLP Agent administration
Agent is not The agent has not reported to an Endpoint To fix the issue:
reporting Server within the specified period of time.
■ Verify that the endpoint where the agent is installed
If the agent does not report after 18 hours,
exists. If it does not exist, you can delete the agent
then Symantec Data Loss Prevention
from the Enforce Server.
identifies the agent as not-reporting.
See “Using the Agent List screen” on page 1929.
Not-reporting agents do not receive the
■ Verify that the agent is running on the endpoint.
latest policies and configuration
information, so they are marked with a ■ Verify the network connection between the Endpoint
Critical agent alert. Server and the endpoint.
Agent version is The agent is two versions older than the Upgrade the agent to the latest version.
not supported Endpoint Server version to which it
connects. For example, if the Endpoint
Server is version 15.0 and the agent is
12.0.x, a Critical agent alert displays. The
features available in Enforce and Endpoint
Server are not available for these agents.
Symantec Data Loss Prevention identifies
these agents with a Critical alert because
these agents do not provide current
Symantec Data Loss Prevention features
and may not operate as designed.
File system The agent service cannot communicate To fix the issue:
driver is down with the Symantec Data Loss Prevention
■ Restart the endpoint.
driver installed on the endpoint.
■ Reinstall the agent.
Communication may not occur for the
following reasons:
Removing DLP Agents from Windows endpoints using system management software
Removing DLP Agents from Mac endpoints using system management software
msiexec /x AgentInstall_15_0.msi
msiexec /x {guid}
msiexec /x AgentInstall_15_0.msi
4 Click OK.
You can add options to the uninstall command such as SilentMode or Logname.
SilentMode allows the Symantec DLP Agent to uninstall without displaying a
user interface on the desktop. The installation takes place in the background
of the workstation and is not visible to the user. Logname Lets you set any log
file you want. However, this option is only available if you have the original
installer present. If you do not have the original installer, you must use the
product code.
The code for a silent install is:
/QN:silentmode
/L*V _logname
msi.exe has several other options. For further options, see your MSI guide.
Note: You uninstall Windows 7/8/8.1 agents in Elevated Command Prompt mode.
/rm -f /tmp/uninstall_agent
Note: You can review uninstall logs on the Terminal application by running this
command: sudo ./uninstall_agent -prompt=no -log=console. By default, logs
are saved to the uninstall_agent.log file
Note: Symantec recommends that you contact Support before changing a log level
for an agent.
3 Select an agent.
4 Select Troubleshoot > Reset Log Level.
The Agents Overview screen displays an icon next to the agent to indicate
the updated the log level.
Note: Only administrators with the Server Administrator role can use the Agent
Password Management screen. See “Manage and add roles” on page 113.
When you create or change a password, the password is applied to the agents
when they connect to the Endpoint Server. Likewise, uninstall passwords or Endpoint
tools passwords that are created during the agent packaging process are retained
until the agents connect to the Endpoint Server.
You can disable the uninstall password for select agents on the Agent List screen.
See “Using the Agent List screen” on page 1929.
You can use the Agent Password Management screen to complete the following
agent password-related tasks:
■ Create a new uninstall or Endpoint tools password if one was not created during
the agent packaging process.
See “Create a new agent uninstall or Endpoint tools password” on page 1960.
■ Change an existing uninstall password or Endpoint tools password.
See “Change an existing agent uninstall or Endpoint tools password” on page 1960.
■ Retain a password created during the agent packaging process. You can choose
whether or not to publish an uninstall password or Endpoint tools password to
newly added agents by de-selecting the checkbox for each password.
See “Retain existing agent uninstall or Endpoint tools passwords” on page 1960.
See “About agent password management”on page 1990 on page 1990.
Managing Symantec DLP Agents 1960
About agent password management
3. Click Save.
See “About agent password management” on page 1959.
See “About agent password management”on page 1990 on page 1990.
Chapter 80
Using application
monitoring
This chapter includes the following topics:
Note: You can remove any application that you add, but you cannot remove a
system-provided application.
4 Select Provide this application encrypted content when reading ICE files
in the Information Centric Encryption section to allow the application to read
encrypted files copied to a removable storage device.
Table 80-1 Brand names and binary names of CD/DVD burning software
BsCLIP BsCLiP.exe
BurnAware burnaware_data.exe
CheetahBurner CheetahBurner.exe
CommandBurner CmdBurn.exe
Using application monitoring 1967
About adding applications
Table 80-1 Brand names and binary names of CD/DVD burning software
(continued)
CopyToDVD c2cman.exe
Creator 10 Creator10.exe
DeepBurner DeepBurner.exe
Mkisofs mkisofs.exe
Nero nero.exe
NeroStartSmart NeroStartSmart.exe
RecordNow RecordNow.exe
Roxio Creator.exe
Roxio_Central Roxio_Central.exe
Roxio5 Creatr50.exe
StarBurn StarBurn.exe
Note: When you use a CD/DVD writer, small text files of less than 64 bytes are not
detected during a burn to ISO. Text files over 64 bytes in size are detected normally.
CD/DVD InfraRecorder
IM Viber
3 Enter information.
In addition to the Name field, you must enter information in at least one of
either the Binary Name, Internal Name, or Original Filename fields.
Note: If you plan to add a Windows 10 (Windows apps) application, you enter
the application package ID in the Internal Name and leave the Binary Name,
Original Filename, and Publisher Name fields blank. Entering details in these
fields may cause the DLP Agent to stop monitoring the application after a
system upgrade.
Name Enter the application name. You must enter information in this field.
Binary Enter the binary file name. Include an escape character (\) between the
Name application name and the file extension. For example, if you want to add
Firefox, you enter firefox\.exe.
Original Enter the application file name. Include an escape character (\) between
Filename the application name and the file extension. For example, if you plan to
add Firefox, you enter firefox\.exe.
Additionally, you can add details about the publisher name for the
application. The publisher name details the maker of the software. Adding
the publisher name lets Symantec Data Loss Prevention verify the
application even if the binary name has been changed. Primarily, the
publisher name is used for identifying Symantec processes. However,
you can add the publisher name for any of your applications. Adding the
publisher name is optional.
4 Retain the application information the tool displays. You use the application
information when you add an application on the Application Monitoring screen.
See “Adding a Windows application” on page 1968.
See “About Application File Access monitoring” on page 1976.
In addition to the Name field, you must enter information in the Binary Name
field. You do not enter information in the Internal Name or Original Filename
fields for macOS applications.
■ Name
■ Binary Name
See “Defining macOS application binary names” on page 1975.
Note: Only the items listed in the table are supported for application monitoring
on Mac endpoints.
Note: The DLP Agent only monitors Clipboard Paste operations for 64-bit
macOS applications. Confirm that the application you plan to add displays 64
bit in the Kind column if you plan to monitor the Clipboard Paste channel.
4. Double click the application in the Process Name column to display a dialog.
The dialog provides memory, statistics, and open files and ports information
for the application.
5. Click the Open Files and Ports tab to display details about the application.
6. Locate the line that display the complete path for the application. For example,
the path for Safari is /Applications/Safari.app/Contents/MacOS/Safari.
7. Locate and note the binary name following /MacOS/.
8. Enter the binary name in the Binary Name field on the System > Agents >
Application Monitoring screen.
See “Adding a macOS application” on page 1972.
Using application monitoring 1976
Ignoring macOS applications
Note: You cannot use the Application File Access feature to monitor inline data
transfers using browsers (HTTPS) or instant messenger.
You can enable default applications on the Application Monitoring screen. You
can also set Symantec Data Loss Prevention to monitor the applications not found
on the Application Monitoring screen by adding them.
Using application monitoring 1977
Implementing Application File Access monitoring
1 Create a new policy or update an existing policy. You enable the Protocol or Endpoint
Monitoring protocol, then select
options to configure Application File
Access.
2 Set response rules for the policy. See “Manage response rules”
on page 1264.
3 Create a policy group that is deployed to an Endpoint Server. See “Policy groups” on page 344.
Using application monitoring 1978
Implementing Application File Access monitoring
4 Enable the Application File Access feature in the endpoint Use environment, file, and folder filters
configuration. to optimize file monitoring
performance. The Application File
Access feature monitors every file that
an application opens or reads, which
can reduce application performance
and create false positives. You can
use environment variables to specify
locations where sensitive data is
potentially located.
5 Add an application to the Application Monitoring screen. Many applications are listed in the
Application Monitoring screen. If you
add an application, you must enable
the Monitor Application File Access
feature and select an activity to
monitor, either Read or Open.
You can use Endpoint FlexResponse rules on the following types of endpoint
destinations and protocols:
■ Endpoint Discover
Step 3 Deploy the plug-in to your endpoints See “About deploying Endpoint
using the Endpoint FlexResponse FlexResponse plug-ins on endpoints”
utility and third-party systems on page 1982.
management software (SMS).
Step 5 Add Endpoint FlexResponse actions See “Adding a new response rule”
to your response rules. on page 1265.
Working with Endpoint FlexResponse 1982
About deploying Endpoint FlexResponse plug-ins on endpoints
Step 2 Copy any third-party Python modules that your plug-in requires to your
endpoints.
Step 5 Create response rules that use Endpoint: FlexResponse actions that
reference the plug-in, and add these rules to an active policy.
Action Description
See a list of deployed plug-ins Use the list option to retrieve a list of all
plug-ins that are deployed on a specific
endpoint. The list contains the names of the
deployed plug-ins.
The Endpoint FlexResponse utility must be run from the folder where the Symantec
DLP Agent is deployed. The location of this folder is configurable. By default, the
directory is located at:
c:\Program Files\Manufacturer\Endpoint Agent\
The name of the utility is flrinst.exe. The utility uses the following syntax:
flrinst.exe -op=install|uninstall|retrieve|list
-package=<package_name> -p=<Tools_password>
Option Description
■ install—deploys a plug-in
■ uninstall—removes a plug-in
■ list—displays a list of deployed plug-ins
■ retrieve—retrieves a plug-in and saves
it as an editable text file. The text file is
contained in a ZIP file that is saved in the
directory where the utility was run.
Working with Endpoint FlexResponse 1985
Deploying an Endpoint FlexResponse plug-in using the Endpoint FlexResponse utility
Option Description
If you have created a Tools password for your Symantec Data Loss Prevention
deployment, pass this password to the Endpoint FlexResponse utility with the -p
option. This password is required to install and uninstall a plug-in. You configure a
Tools password during Symantec Data Loss Prevention installation. For more
information, see the Symantec Data Loss Prevention Installation Guide.
If you have not configured a Tools password, an end user can retrieve and modify
previously-installed plug-ins using the default password, VontuStop. Symantec
recommends that you configure a Tools password to prevent such tampering.
Alternately, you can set your SMS application to remove the Endpoint FlexResponse
Utility after you have used it. Removing the utility prevents any unauthorized
modification or uninstallation of your plug-ins.
flrinst.exe -op=install
-package=<path_to_plug-in>
-p=<myToolsPassword>
Where:
■ <myToolsPassword> is the Tools password for your Symantec Data Loss
Prevention deployment. If you have not specified a Tools password, use
the default password: VontuStop.
■ <path_to_plug-in name> is the full path to the plug-in .zip file.
For example:
flrinst -op=install -package=c:\installs\myFlexResponse_plugin.zip
-p=myToolsPassword
flrinst.exe -op=uninstall
-package=<Plug-in name>
-p=<myToolsPassword>
Where:
■ <Plug-in name> is the name of the plug-in package .zip file.
You can edit the plug-in by editing the .py file. If you make edits, you must
re-package the ZIP file and re-deploy the plug-in to the endpoint before the edits
take effect. Modified plug-ins only affect the individual endpoints where they were
modified.
To retrieve an Endpoint FlexResponse plug-in from a specific endpoint
1 On the endpoint, open a command prompt window and navigate to the
Symantec DLP Agent installation directory:
The default location of this directory is c:\Program
Files\Manufacturer\Endpoint Agent\
Where:
■ <myToolsPassword> is the tools password for your Symantec Data Loss
Prevention deployment. If you have not specified a Tools password, use
the default password: VontuStop.
■ <plug-in name> is the name of the plug-in .zip file.
For example:
flrinst -op=retrieve -package=myFlexResponse_plugin.zip
-p=myToolsPassword
Note: Before you copy Endpoint tools to the Agent Install directory on Mac endpoints,
change the permissions for each tool to be executable. See “Using Endpoint tools
with macOS” on page 1993.
Each tool requires a password to operate. You enter the Endpoint tools password
during the agent packaging process. You can manage the Endpoint tools password
using the Agent Password Management screen.
See “About agent password management” on page 1959.
Table 82-1 lists some of the tasks that you can complete using endpoint tools:
Using Endpoint tools 1991
About Endpoint tools
Shut down the agent and the service_shutdown See “Shutting down the agent and the
watchdog services watchdog services on Windows
Available for Windows agents in the
endpoints” on page 1993.
Symantec_DLP_15.0_Agent_Win-IN.zip
file. See “Shutting down the agent service
on Mac endpoints” on page 1994.
Available for Mac agents in the
Symantec_DLP_15.0_Agent_Mac-IN.zip
file.
Inspect database files that are vontu_sqlite3 See “Inspecting the database files
accessed by the agent accessed by the agent” on page 1994.
Available for Windows agents in the
Symantec_DLP_15.0_Agent_Win-IN.zip
file.
View extended log files logdump See “Viewing extended log files”
on page 1996.
Available for Windows agents in the
.Symantec_DLP_15.0_Agent_Win-IN.zip
file.
Generate device information DeviceID.exe for Windows See “About the Device ID utilities”
removable devices. on page 1997.
Start DLP Agents that are installed on start_agent See “Starting DLP Agents that run on
Mac endpoints Mac endpoints” on page 2001.
Available for Mac agents in the
AgentInstaller_Mac64.zip file.
This file is created after you complete
the agent installation package process.
Note: You must unzip this file to a
Mac endpoint. You cannot use the tool
if it is unzipped to a Windows endpoint.
2 Hold the Shift key and right-click Command Prompt in the results list.
3 Select Run as Administrator.
Using Endpoint tools 1993
About Endpoint tools
service_shutdown [-p=password]
where the installation directory is the directory where you installed Symantec
Data Loss Prevention and [-p=password] is the password you previously
specified. If you do not enter a password, you are prompted to input a password.
The default password is VontuStop.
You must run the Service_Shutdown.exe tool from the same directory as the
DLP Agent keystore file.
See “About agent password management”on page 1990 on page 1990.
#sudo ./service_shutdown
-p=<tools_password>
Note: You must have administrator rights to use the tool on Windows endpoints.
You must have root or sudo access to make changes to the agent database on
Mac endpoints.
Using Endpoint tools 1995
About Endpoint tools
where database_file is your database file and password is your specified tools
password.
The Symantec Data Loss Prevention database files for Windows agents are
located in the DLP Agent installation directory and end in the *.ead extension.
After you run the command, you are prompted for your password.
2 Enter the default password VontuStop unless you have already created a
unique password.
You are provided with a shell to enter SQL statements to view or update the
database.
Refer to http://www.sqlite.org/sqlite.html for complete documentation about
what commands are available in this shell.
To run the vontu_sqlite3 tool on Mac endpoints
1 Set the vontu_sqlite3 tool permissions to be executable. See “Using Endpoint
tools with macOS” on page 1993.
2 Run the following script from the Symantec Data Loss Prevention Agent
installation directory:
where database_file is your database file and password is your specified tools
password.
You run this command using the Terminal application. The vontu_sqlite3
tool is located at /Library/Manufacturer/Endpoint Agent/.
3 Enter the default password VontuStop unless you have already created a
unique password.
You are provided with a shell to enter SQL statements to view or update the
database.
Refer to http://www.sqlite.org/sqlite.html for complete documentation about
what commands are available in this shell.
See “About agent password management”on page 1990 on page 1990.
Using Endpoint tools 1996
About Endpoint tools
Note: You must have administrator rights to use the tool on Windows endpoints.
You must have root or sudo access to make changes to the agent database on
Mac endpoints.
where log_file is the log file you want to view and password is the specified
tools password. All Symantec Data Loss Prevention extended log files are
present in the Symantec Data Loss Prevention Agent installation directory.
The files have names of the form edpa_extfile_number.log. After you run this
command, you can see the de-obfuscated log.
All Symantec Data Loss Prevention extended log files are present in the
Symantec Data Loss Prevention Agent installation directory. The files have
names of the form edpa_extfile_number.log. After you run this command, you
can see the de-obfuscated log.
2 (Optional) Print the contents of another log from this view.
Using Endpoint tools 1997
About Endpoint tools
where log_file is the log file you want to view and password is the specified
tools password.
All Symantec Data Loss Prevention extended log files are present in the
Symantec Data Loss Prevention Agent installation directory. The files have
names of the form edpa_extfile_number.log. After you run this command, you
can see the de-obfuscated log.
3 (Optional) Print the contents of another log from this view.
To print the contents of another log
1 From the command window, run:
Result Description
Volume The volume or mount point that the DeviceID.exe tool found.
For example:
Volume: E:\
For example:
USBSTOR\DISK&VEN_UFD&PROD_USB_FLASH_DRIVE&REV_1100\5F73HF00Y9DBOG0DXJ
For example:
USBSTOR\\DISK&VEN_UFD&PROD_USB_FLASH_DRIVE&REV_1100\\5F73HF00Y9DBOG0DXJ
Result Description
For example:
SanDisk&.*
For example:
SanDisk&Cruzer Blade&.*
For example:
SanDisk&Cruzer Blade&DER45TG5444
The file appears in the C:\temp directory and contains the output from the
DeviceID process.
5 View the results of the DeviceID process.
The command prompt displays the results for each volume or mount point.
See Table 82-2 on page 1998.
6 Use the DeviceID utility to evaluate the proposed regex string against a device
that is currently connected.
See Table 82-4 on page 1999.
7 Use the regular expression patterns to configure endpoint devices for detection.
See “Creating and modifying endpoint device configurations” on page 761.
Command Example
parameters
Command Example
parameters
The output results display information for each volume or mount point in the
Terminal application dialog.
5 Review the DeviceID process results.
6 Use the regex information to configure endpoint devices for detection.
See “Creating and modifying endpoint device configurations” on page 761.
Using Endpoint tools 2001
About Endpoint tools
Table 82-5
Command parameter Example
■ Volume: /Volumes/FAT_USB/
■ Type (BUS): USB
■ Device ID Regex by Vendor: JetFlash&.*
■ Device ID Regex by Model:
JetFlash&Mass Storage Device&.*
■ Device ID Regex by Serial No:
JetFlash&Mass Storage
Device&79HCSMJ0RYOHT2FE
Note: You must unzip this file to a Mac endpoint. You cannot use the tool if it is
unzipped to a Windows endpoint.
sudo ./start_agent
where the installation directory is the directory where you installed Symantec
Data Loss Prevention.
3 Go to the Agent List screen and confirm that the agent is running.
See “Using the Agent List screen” on page 1929.
See “About agent password management”on page 1990 on page 1990.
Section 10
Monitoring data loss in cloud
applications
You can configure cloud application detection on the Manage > Application
Detection page.
See “Managing Application Detection” on page 2004.
Action Description
Configure cloud application detection You can assign policy groups and targeting rules to CloudSOC Gatelets
and Securlets, WSS Cloud Web Proxies, and third-party cloud
applications accessed through the Cloud Detection API Service:
See “To configure Application Detection for the Cloud Detection API
Service” on page 2008.
Modify an existing cloud application detection To modify an existing application configuration, click the edit icon for
configuration that application, edit the configuration, then click Save.
Delete a cloud application detection To delete an application configuration, click the delete icon for that
configuration application.
Synchronize Application Detection The Sync to CloudSOC button on the Application Configuration list
configurations with Symantec CloudSOC toolbar deletes and replaces all Application Detection configurations
on the CloudSOC side. The best practice for updating an individual
configuration is to edit the configuration and click Save.
6 In the Policy Groups field, select the policy group or groups you want to apply
to this configuration.
7 In the Rules section, specify the Transfer Type to specify the direction of
network traffic you want to inspect. You must select at least one option, Upload
or Download. You can select both options to inspect all network traffic.
8 In the Device Properties section, specify one of the following options:
■ Any: Select this option to inspect all devices.
■ Managed: Select this option to inspect only devices managed by your
organization. If you select this option, you can select additional options for
Device Ownership Status (any device, corporate-only devices, or
personal-only devices) and Device Posture Status (any device, policy
compliant devices, or policy non-compliant devices).
■ Unmanaged: Select this option to inspect only devices that are not managed
by your organization.
9 In the Users and Groups section, select one of the following options:
■ Any: Select this option to inspect traffic associated with any user.
If you select this option, you can also specify exceptions for specific users
or groups by clicking Add Exceptions.
■ Selective: Select this option to target specific users or user groups for
inspection.
■ Any: Select this option to inspect traffic associated with any geographical
region.
If you select this option, you can also specify exceptions for specific
geographical regions by clicking Add Exceptions.
■ Selective: Select this option to target specific geographical regions for
inspection.
11 In the File Properties section, select one of the following File Extensions
options:
■ Any: Select this option to target all file types for inspection.
If you select this option, you can also specify exceptions for specific file
types by clicking Add Exceptions.
■ Selective: Select this option to target specific file types for inspection.
12 Optional: In the File Size section, specify one or both of the following include
filters:
■ Smaller Than: Enter a file size in bytes less than which files will be included
for inspection.
■ Larger Than: Enter a file size in bytes more than which files will be included
for inspection.
13 Click Save.
To configure Application Detection for CloudSOC Securlets
1 Navigate to the Manage > Application Detection > Configuration page.
2 Click New Configuration.
The New Configuration page appears.
3 In the Name field, enter a name for your cloud application detection
configuration.
4 In the Type drop-down list, select Securlet.
5 In the Applications field, select one of the following options:
■ Built In: Selecting Built In lets you select from a list of available CloudSOC
Securlets for specific applications.
■ Custom: Selecting Custom lets you target custom cloud application
Securlets. You can enter the application name in the Enter application
name field.
6 In the Policy Groups field, select the policy group or groups you want to apply
to this configuration.
Working with Cloud Connectors 2007
Managing Application Detection
7 In the Rules section, specify the Exposure Type for the files you want to
inspect:
■ Internal: Select this option to inspect files that are available to people within
your organization.
■ External: Select this option to inspect files that are available to people
outside of your organization.
■ Public: Select this option to inspect files that are available to anyone on
the Internet.
■ Unexposed: Select this option to inspect files that are not available to
anyone.
If you have selected some combination of Internal, External, or Public
exposures, you can additionally specify whether you want to find any file that
matches one of the exposure types, or files that match all specified exposure
types. For example, if you selected both the Internal and Public exposure
types, selecting Match Any would match files that are either internal or public.
Selecting Match All would match only files that are both internally and publically
exposed.
8 In the Users and Groups section, select one of the following options:
■ Any: Select this option to inspect traffic associated with any user.
If you select this option, you can also specify exceptions for specific users
or groups by clicking Add Exceptions.
■ Selective: Select this option to target specific geographical regions for
inspection.
10 In the File Properties section, select one of the following File Extensions
options:
■ Any: Select this option to target all file types for inspection.
If you select this option, you can also specify exceptions for specific file
types by clicking Add Exceptions.
■ Selective: Select this option to target specific file types for inspection.
Working with Cloud Connectors 2008
Managing Application Detection
11 Optional: In the File Size section, specify one or both of the following include
filters:
■ Smaller Than: Enter a file size in bytes less than which files will be included
for inspection.
■ Larger Than: Enter a file size in bytes more than which files will be included
for inspection.
12 Click Save.
To configure Application Detection for Cloud Web Proxies
1 Navigate to the Manage > Application Detection > Configuration page.
2 Click New Configuration.
The New Configuration page appears.
3 In the Name field, enter a name for your cloud application detection
configuration.
4 In the Type drop-down list, select Cloud Web Proxy.
5 In the Policy Groups field, select the policy group or groups you want to apply
to this configuration.
6 Click Save.
To configure Application Detection for the Cloud Detection API Service
1 Navigate to the Manage > Application Detection > Configuration page.
2 Click New Configuration.
The New Configuration page appears.
3 In the Name field, enter a name for your cloud application detection
configuration.
4 In the Type drop-down list, select Cloud Detection API Service.
5 In the Application field, enter the name of the cloud application you are
accessing through the Cloud Detection API Service.
6 In the Policy Groups field, select the policy group or groups you want to apply
to this configuration.
7 Click Save.
■ Adding an appliance
■ Configuring an appliance
Step 3 Deploy the virtual machine See “To download and deploy
image, which includes both the appliance virtual machine
the operating system and image” on page 2015.
data disk, at the command
line in VMware ESXi.
Step 4 Enter the (10-digit) serial See “To download and deploy
number from your activation the appliance virtual machine
file. Save this number; you image” on page 2015.
need to enter this number
again when you register this
appliance with the Enforce
Server.
Step 8 Apply the .bcl activation file See “To apply the .bcl
for the appliance. activation file for the
appliance” on page 2015.
Note: Only one detection type (for example, Network Prevent for Email) can be run
on one appliance at one time. Symantec doesn't support multiple detection types
on the same appliance.
You must have the following information on hand to perform initial configuration:
■ IP address
■ Subnet mask
■ Gateway address
■ serial number
■ Console password to log on to the CLI through the Secure Shell (SSH) protocol
and access the advanced commands in the CL.
Implementing and working with DLP Appliances 2015
Setting up the virtual appliance
Note: Ignore the message that says you can go to port 8082 for administration.
This port is currently not available for managing the virtual appliance.
5 To apply the activation file that you received from Symantec and previously
saved to an HTTP server URL, enter:
localhost# licensing load url [your url here].
Alternately, use the licensing inline command and copy and paste the
license.
6 Enter the pass phrase for the private key and certificate that you received from
Symantec.
7 To confirm that the license has been installed, enter:
localhost# licensing view
Step 6 Apply the .bcl activation file See “To apply the .bcl
for the appliance. activation file for the hardware
appliance” on page 2019.
See “Configuring an
appliance” on page 2020.
The DLP-S500 comes preinstalled with the DLP software. Currently, only Network
Prevent for Web is offered for the hardware appliance. After you set up the hardware,
you configure the detection appliance at the Enforce Server administration console.
You must have the following information on hand to perform initial configuration:
■ DLP-S500 IP address
■ Subnet mask
■ Console password to log on to the CLI through the Secure Shell (SSH) protocol
and access the advanced commands in the CLI.
■ Enable password for administrative access to the appliance.
■ Default gateway IP address
■ Primary DNS server IP address
To perform the initial configuration for the DLP-S500
1 Confirm that a null-modem serial cable is connected from the appliance to a
workstation's serial port.
2 Open a terminal emulation program such as Microsoft HyperTerminal, PuTTY,
Tera Term, or Procomm.
3 Configure the terminal emulation software to the following settings:
■ Bud rate: 9600
■ Parity: None
■ Flow control: None
■ Data bits: 1
■ Stop bits: 8
Note: Ignore the message that says you can go to port 8082 for administration. This
port is currently not available for managing the DLP-S500.
5 To apply the hardware license you received from Symantec and previously
saved to an HTTP server URL, enter:
localhost# licensing load url [your url here]
Alternately, use the licensing inline command and copy and paste the
license.
6 To confirm that the license has been installed, enter:
localhost# licensing view
Adding an appliance
After you have set up the appliance, you can register your detection appliance at
the Enforce Server administration console.
To add a detection appliance
1 Log on to the Enforce Server administration console as administrator.
2 Go to System > Servers and Detectors.
3 Click Add Server...Appliance.
4 The Add an Appliance screen appears.
5 Choose a detection appliance type to add, then click Next.
Configuring an appliance
After you add an appliance and choose a detection appliance type, you can configure
the appliance detection type.
Some of the configuration steps vary, depending on the server license you have
purchased.
To configure the appliance identity, network information, and administrator
credentials
1 Add a name for this appliance in the Appliance Name field.
2 Enter the 10-digit serial number that you received from Symantec in the Serial
Number field.
3 Enter the host name or the IP address in the Hostname or IP Address field.
4 Enter admin in the User Name field.
5 Enter your administration password in the Password field.
6 Re-enter your password in the Re-enter Password field.
Note: This is your console login password that you configured previously. This
is not your enable password.
Implementing and working with DLP Appliances 2021
Unbinding or resetting a DLP appliance
After you have set up the identity, network information, and administrator credentials,
you can move on to enter information specific to your detection appliance type.
You can find more information about the command line interface (CLI) commands
in the Symantec Data Loss Prevention Command Line Interface Reference at
www.symantec.com/DOCS/DOC10599.html.
Note: When running actions for Appliances Software Update, it may take some
time for images to deploy, update, and restart. You may also see what appears to
be a disconnect. This is normal behavior; the action completes and complete and
you see a new status in the Version or Update Readiness columns, and new
information on the Servers and Detectors > Server Detail page.
In general, for each action you perform, you need to locate an image (if one is
necessary for that action), select the appliance you want to update, then select the
action.
To update an appliance
1 Find the .bcsi upgrade image that you have downloaded from FileConnect.
Upload the image to a local HTTP server.
2 Go to System > Servers and Detectors > Overview > System Readiness
and Appliance Update.
3 Under Appliances Software Update, select Deploy Appliance Image
4 Select the appliance that you want to update.
5 Select the image you uploaded in Step 1 from the Installer Image URL menu.
6 Click Run Action for Selected Appliances. It takes some time for the image
to deploy. After the image is deployed, you see Ready to update in the Update
Readiness column for the selected appliance.
7 Select Update Appliances and select the appliance you want to update.
8 Click Run Action for Selected Appliances.
Note: The DLP appliance version number on the Servers and Detectors page
does not match the DLP appliance version number that is displayed on the
Appliances Software Update page. The Appliances Software Update page
presents a version number with an extra ".0" in it. Also, while DLP version numbers
match, the build number for appliances may be different from the build number for
servers.
To collect logs
◆ Go to System > Servers and Detectors > Logs and select your appliance
from the list.
See "Managing log files" in the Symantec Data Loss Prevention Administration
Guide for more information.
Note: The Log Configuration file section is grayed out for appliances and cannot
be used.
W
Web archives 1468
Web Services 103
WinPcap software 1543
installing 1544
X
X-CFilter-Loop: Reflected header 1557
X-DLP-Max-Severity header 1562
X-DLP-Policy-Count header 1562
X-DLP-Score header 1562