In This Section: |
|
|
To set a rule to Prevent:
SmartDashboard opens and shows the DLP tab.
The optimal method for defining new data type representations is to use the Data Type Wizard.
To add a new data type:
SmartDashboard opens and shows the DLP tab.
The Data Type Wizard opens.
You can create a Data Type representation that is a group of existing Data Types.
To create a Data Type group:
SmartDashboard opens and shows the DLP tab.
The Group Data Type window opens.
You can add CPcode script files for more advanced match criteria to improve accuracy after a keyword, pattern, weighted keyword, or words from a dictionary are matched. If the CPcode script file has a corresponding value file (for constants values) or CSV file, add it here.
|
|
To add advanced matching Data Type CPcode script:
SmartDashboard opens and shows the DLP tab.
The Data Type window opens.
For all Data Type representations, you can add CPcode scripts that run after a data type is matched.
To add a post match Data Type CPcode script:
SmartDashboard opens and shows the DLP tab.
The Data Type window opens.
You can export to a file the Data Types that you have created or that are built-in. This allows you to share Data Types between DLP Gateways, when each is managed by a different Security Management Server.
To export a Data Type:
SmartDashboard opens and shows the DLP tab.
You can share Data Types with another Security Management Server or recover a Data Type that was deleted but previously exported. You can also obtain new Data Types from your value-added reseller or from Check Point and use this procedure to add the new Data Types to your local system.
|
|
To import Data Types:
SmartDashboard opens and shows the DLP tab.
SmartDashboard opens and shows the DLP tab.
The Data Type wizard opens with Fingerprint selected as the Data Type.
By default, The DLP Blades object shows. This object represents all gateways that have the DLP blade enabled. Only gateways selected here scan the repository and enforce the fingerprint data type.
This tests that DLP gateways defined in the gateways list (step 4a) can access the repository using the (optional) assigned authentication credentials.
This option matches similarity between the document in the repository and the document being examined by the DLP gateway. You can specify an exact match with a document in the repository, or a partial match based on:
Select Configure additional Data Type Properties after clicking Finish if you want to configure more properties.
The New data type wizard closes. The data type shows in the list of data types and also on the Repositories page.
SmartDashboard opens and shows the DLP tab.
The Whitelist Repository window opens.
Enter a name and informative comments for the repository type.
By default, The DLP Blades object shows. This object represents all gateways that have the DLP blade enabled. Only gateways selected here scan the repository.
This tests that DLP gateways defined in the gateways list can access the repository using the (optional) assigned authentication credentials.
The Whitelist shows in the list of repositories.
To manually start a scan of the whitelist repository, click Start in the Scan now area on the summary pane.
There are two ways to create a list of files that will never be matched by the DLP Rule Base:
Files in the list are uploaded to the Security Management Server and not matched against DLP rules. This option is recommended if you only have a small number of files.
Files in this repository are not included in the match.
To add files to the Whitelist:
SmartDashboard opens and shows the DLP tab.
The file is uploaded to a folder on the Security Management Server.
Note - For a file not to be included in the DLP match, it must exactly match a file in the whitelist.
In DLP administration you may need to define email addresses or domains that are outside of your network security management.
|
|
To define email addresses and domains for use in rules:
SmartDashboard opens and shows the DLP tab.
The Email Addresses window opens.
Add the necessary email addresses and domains for this object.
Watermarking works by introducing custom XML files that contain the watermarking data. Only documents in these Office Open XML formats can be watermarked:
|
Important - Older formats supported in Office 2007 and above for backward compatibility (such as DOC, PPT, and XLS, cannot be watermarked). Changing the file extension from doc to docx will not make the document eligible for watermarking.
If the Data Type scanned for by the DLP gateway occurs in the body of the email and not the document, the document will not be watermarked. For example if you are scanning for credit card numbers. If the credit card number shows in the body of an email with a document attached, the document will not be watermarked. The Data Type has to occur in the document. |
To watermark documents:
SmartDashboard opens and shows the DLP tab.
DLP has 3 built-in profiles:
Note - You can also modify a built-in profile.
To create a new watermark profile:
SmartDashboard opens and shows the DLP tab.
The Watermark Profiles window opens.
The Advanced Settings window opens.
Note - A watermark in Excel cannot exceed 255 characters. The 255 character limit includes the visible watermark text and formatting data. If you exceed the 255 character limit, the watermark feature makes a best effort to show as much text as possible.
The 255 limit is per document.
The actual placement of watermarks depends on:
Watermark option |
Section Break |
In Word 2007 |
In Word 2010 |
|---|---|---|---|
All pages
|
Yes |
All pages get watermark |
All pages get watermark |
No |
All pages get watermark |
All pages get watermark |
|
First page only
|
Yes |
All pages get watermark |
First page only gets watermark |
No |
All pages get watermark |
First page only gets watermark |
|
Even pages only
|
Yes |
All pages get watermark |
All pages get watermark |
No |
Only even pages get watermark |
Only even pages get watermark |
|
Odd pages only
|
Yes |
All pages get watermark |
All pages get watermark |
No |
Only odd pages get watermark |
Only odd pages get watermark |
To configure settings on the General Page:
The Select text location on page window opens.
To create a new watermark, click Add watermark text to another location.
The text formatting tools are shown.
Note - Watermark rotation is only available for:
To add a shadow behind Watermark text in Word and PowerPoint:
cpstop $DLPDIR/config/dlp.conf.watermark_add_shadow_text(0).Change the property from 30 (70% transparency) to the new value.watermark_text_opacity_percentage
cpstart Note - Before the changes to take effect, you must run dlp.conf and cpstop.cpstart
To configure settings on the Hidden Text page:
If Microsoft Office 2007 (or higher) is installed on the same computer as R80 SmartConsole, a preview of the watermark shows on a sample file in the preview pane.
Note - The preview pane is not available if you create or edit a watermark from the DLP policy rule base. To see a preview, create a watermark from Additional Settings > Advanced > Watermarks > New.
Note - Hidden encrypted text is not removed, only added to by each DLP gateway. Hidden text can later be used for forensic tracking.
To complete the watermark profile:
In the Rule Base, you can change the default Source (My Organization) and the default Destination (Outside My Org) to any network object, user, or group that is defined in R80 SmartConsole, and you can fine tune user definitions specifically for DLP.
|
|
|
|
|
|
To create a domain object:
The New Domain window opens.
To ensure that data transmissions to the DMZ are checked by Data Loss Prevention, define the DMZ as being outside of My Organization.
For example, the PCI DSS Requirement 1.4.1 requires that a DMZ be included in the environment to prevent direct Internet traffic to and from secured internal data access points.
To ensure traffic from My Organization to the DMZ is checked for Data Loss Prevention:
SmartDashboard opens and shows the DLP tab.
You may choose to define the strictest environment possible. Using these settings ensures that data transmissions are always checked for Data Loss Prevention, even if the transmission is from and within your secured environment.
|
Important - You must ensure that legitimate transmissions are not blocked and that Data Owners are not overwhelmed with numerous email notifications. If you do use the settings explained here, set the actions of rules to Detect until you are sure that you have included all legitimate destinations in this strict definition of what is the internal My Organization. |
To define a strict My Organization:
SmartDashboard opens and shows the DLP tab.
To scan transmissions on HTTP running on any port other the standard HTTP ports (80, 8080), you must define the non-standard ports to be included in the HTTP protocol.
To add ports to HTTP:
The New TCP window opens.