In This Section: |
Data is more accessible and transferable today than ever before, and the vast majority of data is sensitive at different levels. Some is confidential simply because it is part of an internal organization and is not meant to be available to the public. Some data is sensitive because of corporate requirements and legal regulations.
The Check Point Data Loss Prevention Software Blade (DLP) lets you use the Firewall to prevent users from sending sensitive data to external networks. DLP helps you implement an automated corporate policy that catches sensitive and protected data before it leaves your organization.
These are the features that the Data Loss Prevention Software Blade uses:
Note - See the R77 CPcode DLP Reference Guide. |
You can configure the Security Gateway to send email notifications to users and Data Owners. If you are using email notifications, it is necessary for the Security Gateway to access a mail server and a mail relay.
We recommend that you use different computers for a mail server and a mail relay. For more about other deployments, see the R80.10 DLP Administration Guide.
You can configure a DLP rule that sends users to the DLP portal when they send questionable data. This rule lets users decide if they will send data that can potentially violate the security policy.
The DLP portal is a web page that informs users that the specified data is possibly against company policy. If the users Send the data, then the action is logged.
Important - If you are using Data Owners, it is necessary to configure a mail server in the DLP Portal and Mail Server window. |
To enable DLP on an existing Security Gateway or cluster:
The General Properties window of the gateway opens.
The Data Loss Prevention Wizard opens.
The Email Domain and Active Directory page opens.
The Security Gateway accesses information in the definition of My Organization.
The My Organization Name page opens.
DLP uses these names to accurately detect incidents of data loss.
The DLP Portal and Mail Server page opens.
NOTE: It is not necessary to enable the DLP portal if UserCheck is enabled.
The Protocols page opens.
The Data Loss Prevention Blade Setup is Completed window opens.
When DLP incidents are logged, the DLP gateway can send automatic notifications to the Data Owners.
To add Data Owners to a Data Type:
SmartDashboard opens and shows the My Organization page in the Data Loss Prevention tab.
The data type properties window opens.
The Add Data Owners window opens.
If the data owner is not in the list, click New. In the Email Addresses window, enter the name and email address of the data owner (or name a list of email addresses).
DLP can send automatic messages to Data Owners for incidents that involve the applicable data types.
To configure Data Owner notification:
SmartDashboard opens and shows the My Organization page in the Data Loss Prevention tab.
The Email window opens.
Data Owners are added to the Email Notification list.
The default message is: The Check Point Data Loss Prevention system has found traffic which matches a rule
Internal emails between Microsoft Exchange clients use a proprietary protocol which is not supported by the Security Gateways. To scan internal emails between Microsoft Exchange clients, you must install an Exchange Security Agent on the Exchange Server. The agent sends emails to the Security Gateway for inspection using the SMTP protocol encrypted with TLS. To supply Data Loss Prevention for Microsoft exchange, it is necessary that the Exchange server can communicate with the Security Gateway.
An Exchange Security Agent must be installed on each Exchange Server that sends traffic to the Security Gateway with DLP. Each agent is centrally managed through SmartDashboard and can only send emails to one Security Gateway. If your organization uses Exchange servers for all of its emails, you can also use this setup for scanning all emails.
To use the Exchange Security Agent it is necessary to configure settings in SmartConsole and on the Exchange server. For more about configuring an Exchange Security Agent, see sk103166.
The rules in the DLP Rule Base are not applied sequentially, all the rules are applied to each data transmission. If the data matches multiple rules, the most restrictive rule is applied. The order from most restrictive to least is:
Use SmartDashboard to create and configure DLP rules.
To open the DLP Rule Base:
SmartDashboard opens and shows the My Organization page in the Data Loss Prevention tab.
These are the fields that manage the rules for the DLP Rule Base.
Field |
Description |
---|---|
Flag |
Mark a rule to Follow Up or Improve Accuracy. |
Name |
Name of the rule. |
Data |
Data type for this rule. |
Source |
Who or what starts the connection: Users and Administrators, network, or email domains. If Identity Awareness is enabled, you can use Access Roles. |
Destination |
Who or what completes the connection: Users and Administrators, network, or email domains. If Identity Awareness is enabled, you can use Access Roles. |
Protocol |
Type of network protocol for this rule. |
Exceptions |
Number of exceptions that allow traffic for this rule. |
Action |
DLP action that is done when traffic matches the rule. |
Track |
Tracking and logging action that is done when traffic matches the rule. |
Severity |
Set the severity level for this rule. Use Severity to help filter Data Loss Prevention incidents with SmartEvent. |
Install On |
Network objects that will get the rule of the security policy. The Policy Targets option installs the rule on all firewall gateways. |
Time |
Time period that DLP enforces this rule. |
Category |
DLP category for this rule. |
When a data transmission matches criteria of an exception to a DLP rule, the rule Action is not applied. If the data matches two DLP rules, and only one of the rules has an exception, the rule without exceptions is applied.
To create an exception for a DLP rule:
SmartDashboard opens and shows the My Organization page in the Data Loss Prevention tab.
The Policy window opens and shows the DLP Rule Base.
The Exceptions for Rule window opens.
For each DLP rule that you create for a data type, you also define what action is to be taken if the rule matches a transmission.
Action |
Description |
---|---|
Detect |
The Firewall sends the data. The event is logged in the Logs & Monitor > Logs view and is available for your review and analysis in the Logs & Monitor Access Control views and SmartEvent. The data and the email itself, or the properties of the transmission if not email, are saved in storage for future reference. |
Inform User |
The Firewall sends the data, but the incident is logged and the user is notified. |
Ask User |
The Firewall blocks the data and DLP holds it until the user verifies that it should be sent. A notification, usually with a remediation link to the Self Incident Handling portal, is sent to the user. The user decides whether the transmission should be completed or not. The decision itself is logged in the Logs & Monitor Logs tab of SmartConsole. Look at the predefined query: DLP > User Actions. |
Prevent |
The Firewall blocks the data. Note: Check Point does not recommend using the Prevent action as a first choice. The action may prove disruptive. To improve the accuracy of rule matches, set rules to Prevent only when you have tested them with the less strict actions over a reasonable amount of time. |
Watermark |
Tracks Microsoft Office documents (Word, Excel, or PowerPoint files from Office 2007 and higher) and adds visible watermarks or invisible encrypted text.
|
This table shows a sample DLP Rule Base. These are the settings for the columns that are not shown:
Flag |
Name |
Data |
Exceptions |
Action |
Track |
Severity |
Category |
---|---|---|---|---|---|---|---|
Follow Up |
Salesforce Reports |
Salesforce Reports |
None |
Ask User Restricted |
Log |
High |
Business |
No Flag |
PCI - Credit Card Numbers |
PCI - Cardholder Data PCI - Credit Card Numbers |
None |
Prevent |
Log |
Critical |
Compliance |
No Flag |
SEC Filings - Draft or Recent |
SEC Filings - Draft or Recent |
None |
Detect |
Log |
High |
Financial |
No Flag |
Source Code |
Source Code |
1 |
Detect |
Alert |
High |
Intellectual Property |
Salesforce Reports - When users send data that matches the Salesforce Reports Data Type category, they are asked to confirm the data transmission. A watermark with the word Restricted is added to Microsoft Word, Excel and PowerPoint files. This incident is logged with High severity.
PCI - Credit Card Numbers - Users are blocked from sending data that matches the PCI - Cardholder Data, and PCI - Credit Card Numbers Data Type categories. These incidents are logged with Critical severity.
SEC Filings - Draft or Recent - Data transmissions that matches the SEC Filings - Draft or Recent Data Type category are logged with High severity. An email is sent to the Data Owners for each incident.
Source Code - Data transmissions that matches the Source Code Data Type category are logged with High severity. A pop-up window opens in SmartView Monitor for each incident.
To keep a strong Data Loss Prevention policy, it is necessary to do an analysis of DLP incidents. These clients can help with your DLP analysis:
You can use the Follow Up flag in SmartDashboard for the DLP rules. If you find one or more incidents that you want to change or fine-tune, set the Data Type or rule to Follow Up.
Note - To use a Windows 7 computer to view DLP incidents in the Logs & Monitor > Logs tab of SmartConsole, or SmartEvent, you must install Microsoft Office 2010. These SmartConsole clients do not show DLP incidents, if these EML files are associated with another application. |
You can open the log of an incident and see the actual data that caused the incident. It is not necessary to review most of the incidents manually, but the data transmission (for example, the email or attachment) is saved.
Important - The DLP logs can contain personal emails and web posts that were captured. You must let the users know that this can happen. Failure to do so may cause your organization to be in conflict with local privacy laws. |
To analyze DLP logs:
The Data Loss Prevention logs for the category are shown.
As of R80, the Event Analysis views of the SmartEvent GUI have been incorporated into the SmartConsole Logs & Monitor view. They provide advanced analysis tools with filtering, charts, and statistics of all events that pass through enabled Security Gateways.
To learn more about securing data, see these guides: