0% found this document useful (0 votes)
33 views5 pages

DLP Use Cases

The document outlines comprehensive monitoring and blocking capabilities for Windows, Linux, and MacOS, including browser activity, application network activity, email activity, file access, and device activity. It emphasizes features such as content filtering, strong analytics, incident reporting, and administration controls to enhance security and productivity. Additional functionalities include shadow logging, real-time alerts, and customizable policies for user activities across various platforms.

Uploaded by

Ranjitha G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views5 pages

DLP Use Cases

The document outlines comprehensive monitoring and blocking capabilities for Windows, Linux, and MacOS, including browser activity, application network activity, email activity, file access, and device activity. It emphasizes features such as content filtering, strong analytics, incident reporting, and administration controls to enhance security and productivity. Additional functionalities include shadow logging, real-time alerts, and customizable policies for user activities across various platforms.

Uploaded by

Ranjitha G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Windows (Monitoring & Blocking)

Browser Activity
 Monitoring browser activities i.e. access to Social Networking sites, Jobs & Career, Shopping portals, personal emails etc.
 Monitor usage or time spent on different websites/URL like Social Networking sites, Jobs & Career, Shopping portals,
personal emails.
 Blocking browser activities i.e. access to Social Networking sites, Jobs & Career, Shopping portals, personal emails etc.
 Blocking sensitive browser form submissions based on content
Web Blocking Web Logging

Application Network Activity


 Monitoring of applications and network activities i.e. download accelerators, Gaming applications, FTP, P2P applications
etc.
 Selectively allow or block any kind of internet applications
 Bypass network applications
 Monitor usage or time spent on different applications like proxy & tunneling applications, download accelerators,
torrents, Gaming applications, FTP, P2P applications etc.
Application Monitoring Whitelisting Sandboxing

Email Activity
 Monitor all SMTP based emails that are sent through email clients like Outlook, Thunderbird, Outlook express, etc.
 Shadow logging of the entire content of the SMTP email along with attachments.
 Control all SMTP based emails that are sent through email clients like Outlook, Thunderbird, Outlook express, etc.
 Monitor all Gmail webmail activity along with complete shadow log of the outbound and draft emails.
 Control all the outbound Gmail webmail-based email activity.
 Control outbound OWA webmail-based file attachment activity.

Monitor SMTP Attachments Shadow Logging Gmail OWA

File Access Monitoring


 Monitor file access logs by file extension type i.e. doc., docx., pdf., jpg etc.
 File access monitoring report in csv format- agent wise & user wise
 Monitor file upload activity, file sharing activity & file transfer activity.
 Shadow logging of file access activity.
 capability to monitor any file transfer activity performed during RDP session
 Capability to add or modify list of applications for which file access activity needs to be monitored.
Shadow Logging Extension Specific Customize App Lists RDP

File Upload Activity


 Monitor file uploads to any domain through browser i.e. file uploads to Dropbox, personal emails like yahoo etc.
 Shadow log of files uploaded to any domain through browser i.e. file uploads to Dropbox, personal emails like yahoo etc.
 Control file uploads completely by limiting them on the basis of the file types or the destination where they are being
uploaded etc.
 Control file transfer over Skype and Windows Live Messenger
 Track the destination server to which the files have been uploaded through browser.
Web Uploads Shadow Logging Extension Filtering Domain Filtering

Device Activity
 Control removable storage device media usage
 Access-based policies on each Registered USB device for different endpoints
 Set specific policies on CD/DVD access. Blocking of MTP/Local and Network Printers
 Blocking Bluetooth activity
 Monitoring of all files being copied from computer to USB drive
 Shadow log of files transferred from endpoint to external USB storage device using enforced encryption.
 USB control and restriction based on file content
 Internal access restriction on USB storage devices
USB Printer Bluetooth Shadow Logging

Search Engine Activity


 Monitoring and logging of the web search engine activity

Content Filtering
 Content filter-based alerts for email based on defined sensitive keywords, phrases, patterns (visa
card, Pan card, contact numbers, etc.) and file type
 Content filter-based alerts for file upload based on defined sensitive keywords, phrases, patterns (visa
card, Pan card, contact numbers, etc.) and file type
 Content filter-based blocking for email and file upload based on defined sensitive keywords, phrases,
patterns (visa card, Pan card, contact numbers, etc.) and file type Filtering
Email Attachment File Upload Printer

Strong Analytics & Incident Reporting


 Graphical representation of activities via Ranking graphs and pie charts.
 Augmentation of analytics section to show incident counts
 Advanced Reporting and Analytics Framework for all kinds of device and network activities
 Graphical representation of productivity of the users.
 Analytics for top trending applications and websites being accessed in the organization
 Real-time incident alert notification on dashboard
 Near Real-time incident alert notification on Email
 Detailed incident forensics report
Graphs Productivity Trends Email Alert Forensic Report

Administration Controls
 Stealth mode to silently monitor activities
 Audit Logs for admin activity
 Admin activity Monitoring and Group Based Administration
 Central management of agent version upgrades via server dashboard
 Offline monitoring & controlling of end user activities
 Temporary Policies for uplifting the user privileges for a defined duration
 Active-directory based installation and user synchronisation
 IP based user activity tracking
 Restrict dashboard access based on IP addresses
 Restriction on concurrent dashboard admin login.
 Support for 2 factor authentication(2FA) to login into dashboard.
 Password expiry for better protection
 LDAP based admin authentication (Simple LDAP)

Other Valued Added Features


 Print activity monitoring
 Data at rest scanning for files stored on endpoint will act as audit tool in identifying sensitive documents
 Customized reports download as per admin requirement
 Password-protected uninstallation
 Tamper Proof
 Bulk installation on end user computers using Remote Deployment
 Easy extraction of analytics and logs via PDF, CSV Reports feature where applicable
 Capability to detect sensitive content in images using OCR
 Custom block notification alert to user
 Blocking of file copy to clipboard
 Blocking of Print Screen functionality
 Integration to third party SIEM consoles
Print Monitor SIEM Integration Data at Rest scan Tamper-Proof Image Analysis

Used cases covered by API Integration


 API integration supported for productivity analytics
 API integration supported for incident reporting

Linux (Blocking)
Browser Activity
• Monitoring browser activities i.e. access to Social Networking sites, Jobs & Career, Shopping portals, personal emails, etc.
• Monitor usage or time spent on different websites/URLs like Social Networking sites, Jobs & careers, Shopping portals, and
personal emails.

Application Network Activity


• Monitoring of applications and network activities i.e. download accelerators, Gaming applications, FTP, P2P applications,
etc.
• Monitor usage or time spent on different applications like proxy & tunneling applications, download accelerators,
torrents, Gaming applications, FTP, P2P applications, etc.

File Upload Activity


• Monitor file uploads to any domain through browser i.e. file uploads to Dropbox, personal emails like yahoo, etc. to
Dropbox, personal emails like yahoo, etc.
• Shadow log of files uploaded to any domain through browser i.e. file uploads to Dropbox, personal emails like yahoo, etc.
• Track the destination server to which the files have been uploaded through the browser.

Device Activity
• Control removable storage device media usage
• Access-based policies on each Registered USB device for different endpoints
• Monitoring of all files being copied from computer to USB drive
• Shadow log of files transferred from endpoint to external USB storage device using enforced encryption.

Email Activity
• Support for monitoring file attachments and SMTP emails via the Thunderbird application
• Support for monitoring file attachments and emails via G-Suit and O365 using a web browser.

Content Filtering
• Content filter-based alerts for file upload on the basis of defined sensitive keywords, phrases, patterns (visa card, Pan
card, contact numbers, etc), and file type
• Graphical representation of activities via Ranking graphs and pie charts.

Strong Analytics & Incident Reporting


• Augmentation of analytics section to show incident counts
• Advanced Reporting and Analytics Framework for all kinds of device and network activities
• Analytics for top trending applications and websites being accessed in the organization
• Real-time incident alert notification on the dashboard
• Detailed incident forensics report

Other Valued Added Features


• Periodic screenshot to monitor detailed employee activity.
• Print activity monitoring
• Audit Logs for admin activity
• Stealth mode to silently monitor activities
• Offline monitoring & Controlling of end-user activities
• Easy extraction of analytics and logs via PDF Reports Feature
• Role-based access management, to allow multiple administrators to access the administration console, with granular
control of privileges
• Admin activity Monitoring and Group-Based Administration
• Data at rest scanning for files stored on the endpoint will act as an audit tool in identifying sensitive documents •
• Restrict dashboard access based on IP addresses
• Easy extraction of analytics and logs via PDF Reports feature
• Admin activity Monitoring and Group Based Administration

MacOS (Blocking)
Browser Activity
 Monitoring browser activities i.e., access to Social Networking sites, Jobs & Career, Shopping portals, personal emails, etc.

Application Network Activity


 Monitoring of applications and network activities i.e., download accelerators, Gaming applications, FTP, P2P applications,
etc.

File Upload Activity


 Monitor file uploads to any domain through browser i.e., file uploads to Dropbox, personal emails like yahoo, etc. to
Dropbox, personal emails like yahoo, etc.
 Shadow log of files uploaded to any domain through browser i.e., file uploads to Dropbox, personal emails like yahoo, etc.

Device Activity
 Control removable storage device media usage
 Monitoring of all files being copied from computer to USB drive
 Monitor all files being printed from the machine with content based alerts

Email Activity
 Support for monitoring file attachments and SMTP emails via the Mozilla Thunderbird, Apple Mail application
 Support for monitoring file attachments and emails via G-Suit and O365 using a web browser.

Content Filtering
 Content filter-based alerts for file upload on the basis of defined sensitive keywords, phrases, patterns (visa card, Pan
card, contact numbers, etc), and file type
 Graphical representation of activities via Ranking graphs and pie charts.

Strong Analytics & Incident Reporting


 Augmentation of analytics section to show incident counts
 Advanced Reporting and Analytics Framework for all kinds of device and network activities
 Analytics for top trending applications and websites being accessed in the organization
 Real-time incident alert notification on the dashboard
 Detailed incident forensics report

Other Valued Added Features


 Periodic screenshot to monitor detailed employee activity.
 Audit Logs for admin activity
 Stealth mode to silently monitor activities
 Offline monitoring & controlling of end-user activities
 Easy extraction of analytics and logs via PDF Reports Feature
 Role-based access management, to allow multiple administrators to access the administration console, with granular
control of privileges
 Admin activity Monitoring and Group-Based Administration
 Data at rest scanning for files stored on the endpoint will act as an audit tool in identifying sensitive documents
 Restrict dashboard access based on IP addresses
 Easy extraction of analytics and logs via PDF Reports feature
 Admin activity Monitoring and Group Based Administration

You might also like