Capsule Docs

The Capsule DocsClosed A component on Endpoint Security Windows clients. This component provides security classifications and lets organizations protect and share documents safely with various groups - internal and external. component, managed by an on-premises Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server., lets organizations protect and share documents safely within the organization and with business partners, and manage the organizational Capsule Docs policy, monitoring, and deployment through SmartEndpointClosed A Check Point GUI application which connects to the Endpoint Security Management Server, to manage your Endpoint Security environment - to deploy, monitor and configure Endpoint Security clients and policies..

Overview of Capsule Docs

Check Point Capsule Docs provides these benefits:

Control the parties that can access the data

  • Restrict access to individuals, groups or entire organizations.

  • Use granular Classification model to assign different permissions for internal and external users.

  • Control data distribution (Forward, Copy/Paste, Print).

  • Choose contacts from your Outlook address book with whom you usually communicate.

  • Prevent unintentional data loss with the help of UserCheck.

  • Use Data Classification to classify documents without encryption.

  • Set a document expiration date to limit when documents can be accessed.

Protect data stored on untrusted servers and shared via untrusted channels

  • Each protected document remains protected even on untrusted servers.

  • Prevent forwarding to unauthorized parties.

  • Secure all created documents automatically.

  • Set a document expiration date

See full audit trail for data access

Access protected documents easily from your platform of choice

  • Seamless integration with Microsoft Office and Adobe Acrobat on Windows platforms.

  • Lightweight Windows Viewer that does not require administrative privileges or Microsoft Office or Adobe Acrobat clients installed.

  • Access protected documents from proprietary Apps on Android, and iOS mobile devices.

Full Integration with Organizational Active Directory

  • Users that are defined in the Active Directory are automatically provisioned to use Capsule Docs.

  • User's Active Directory account authentication is sufficient to access relevant protected documents.

  • Customize Capsule Docs policy for different Users, Organizational Units and Groups.

You must configure all prerequisites before you can work with Capsule Docs.

Prerequisites for Capsule Docs

This picture gives an overview of the different components required for a Capsule Docs deployment as part of an Endpoint Security environment:

Item

Description

 

Item

Description

A

Internal NetworkClosed Computers and resources protected by the Firewall and accessed by authenticated users.

 

B

DMZ

1

Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server.

 

6

Reverse ProxyClosed The Reverse Proxy makes sure that requests from mobile devices and Capsule Docs clients that do not have internal network access reach the Endpoint Security Management Server.

2

Active Directory Server

 

C

External Network

3

SMTP Server

 

7

Public-facing DNS Server

4

Internal users

 

8

Mobile users

5

Management Console

 

9

External users

Notes:

  • Management Server (1) - A Secondary Management Server and Endpoint Policy Servers can be used for redundancy and load balancing.

  • Active Directory Server (2) - Each user account in the Active Directory must have a valid email address. This is usually populated automatically if Microsoft Exchange is configured. User authentication fails if there are two AD accounts with the same email address.

  • SMTP Server (3) - Is only required if the organization shares data with external users

  • SMTP Server (3) with encryption protocols SSL and TLS are supported.

  • Reverse Proxy (6), and a Public-facing DNS Server (7) are only required if one or more of these conditions exist:

    • The organization shares data with external users.

    • Protected document are accessed from mobile devices that do not have access to internal resources.

    If these conditions do not exist, a DNS Server is still required but does not need to be accessible from external networks.

To share protected documents externally, you must have an SMTP server and configure a Reverse Proxy.

Configuring Capsule Docs

Before you configure Capsule Docs policy in SmartEndpoint:

Using Capsule Docs

When users create a new document in a supported application, the protection settings of their default Capsule Docs community are applied to the document. Users can change the settings through the Capsule Docs menu.

In some MS Office versions, the menu shows in the upper-right corner of documents. In others it shows in the Home tab.

Based on the Capsule Docs policy that you configure, users can:

  • Change document Classification

  • Change Community

  • Remove protection

  • Add or remove users and groups

  • Set a document expiration date (only document Authors can do this)

  • Create Favorites lists of users and groups.

    Note - The Favorites lists can be used across the supported applications, to share the documents with different sets of users.

To learn more, see the Capsule Docs User Guide for your client release in sk117536.

Configuring Capsule Docs Policy Rules

For each Action in a rule, select an option, which defines the Action behavior. You can select a predefined Action option or select New to define a custom Action option.

Right-click an Action and select Edit or Edit Shared Action to change the Action behavior.

Changes to policy rules are enforced only after you install the policy.

Actions with the icon apply to all of the organization.

Organization Settings

The Organization Settings define the name of the organization and the name of the Public or External Server. This is the domain name that leads to the reverse proxy server or Security Gateway.

Note - The Public Server Name should be configured one time and not changed.

Active Classifications

Define the Capsule Docs classifications in use and the permissions associated with them.

Also define the permissions of document Authors. By default the permissions are set to be based on the classifications assigned to individual documents or higher. However, you can change them as necessary. A document can have multiple authors. Classification based means that the setting for the Author is the same as what is defined for the Classification.

To create a new classification:

  • Click Create Classification.

To delete a classification:

  • Click Revoke Classification.

To change the order of the classifications that end-users see in the Capsule Docs menu:

  • Select a classification from the table and click the up and down arrows

For each Classification, define its properties and permissions in the table. For more details about the options see sk105076.

Column

Description

Icon

Select the icon that users see in protected documents.

Classification Name

Give the classification a descriptive name.

Applied On

  • All Users - The same definitions of the classification apply to All Users.

  • Separate Internal and External Users - There are different permissions for each classification, one for Internal and one for External users. When you select this, a second row opens for the classification.

Encrypted

  • Yes - Documents with this classification are encrypted and marked with a pink lock.

  • No - Documents are classified but not encrypted. There is no user list and all users can access the document. All permissions except Unprotect and Change Classification are changed to Yes automatically.

Edit

Can users edit the document: Yes or No.

Modify Users

Can users add or remove users and groups: Yes or No.

Change Classification

Can users change the classification of a document: Yes or No.

Unprotect

Can users make a document unprotected: Ask, Yes, or No. If Ask is selected, users must give a reason if they choose to unprotect a document.

Mobile Access

Can the document be accessed through Capsule Docs on mobile devices: Yes or No.

Print

Can users print the document: Yes or No.

Screen Capture

Can users take screenshots of the document: Ask, Yes, or No. If Ask is selected, users must give a reason that they require screenshots.

Copy Paste

Can users copy from the document and paste in their device: Yes or No.

Markings

Double-click to change the selection. Select a header, footer, or watermark with the Classification Name to include in the document. Different markings are supported for different document types.

Email Domains for Sharing Documents

Email Domains for sharing documents Defines permissions for new user registration, based on email domains. Each domain can be defined as either Internal or External. There are two default domains that cannot be edited or deleted:

  • AD Scanned Domains - Defined as Internal and contains users added by the Active Directory scanner.

  • Non AD Scanned Domains - Defined as External and contains users that are not configured in the Domain Configuration window.

You can add more Internal or External Non AD Scanned Domains, and set the permissions to add New Users from them:

  • Can register after explicitly added to a document

  • Can register without being explicitly added to a document

  • Not allowed

Automatic Protection

Define the default encryption behavior for new documents:

  • Enforce automatic protection for new documents

  • Do not enforce automatic protection

  • Suggest document protection when saving document

You can also manually select or clear these options in the Properties of the Action:

  • Protect new documents created by internal users

  • Suggest to protect when user saves document

  • Suggest to protect when user performs Save As

Initial Protection Configuration

Define the default protection settings that are assigned to newly protected documents. Users with the required permissions can edit these settings from the document.

The settings are:

  • Select the classification, for example, Restricted or Highly Restricted.

    The classifications and permissions shown are those configured in the Classifications and Permissions Action. You cannot edit them from this Action.

  • Add and remove user groups that show in newly protected documents.

  • Configure which users or groups have Author permissions. The Document Protector is the person who first protects the document. This person can have Author permissions but it is not required. One or more entities must have Author permissions.

To add and remove user groups that show in newly protected documents:

  1. Click the arrow and select Manage Groups to open the organizational tree and select one or more groups to add to the list.

  2. Select one or more groups from the list. These groups are added to the initial protection list that is automatically assigned to a document.

    All groups that show in the Protection Setting window are assigned to the document.

  3. To remove a group or user, select it from the list and click the X.

To configure which users or groups have Author permissions:

  • Right-click the Document Protector or a different user or group and select an option:

    • Remove as Document Author

    • Mark as Document Author

If the default classification does not have encryption:

All users can access it and the users and groups selected here only apply if the classification is changed to one with encryption.

Inviting Users

Set permissions for the ability to add new users to a document if they are not yet invited or registered. By default, all users in the internal domains have permission to the documents and do not require invitations.

The options are:

  • Allow inviting users from any domain

  • Do not allow inviting users

If you select Allow inviting users from any domains, you can also limit the users who can be invited to those from specified domains.

To limit the users who can be invited to a document:

  1. In a Capsule Docs rule, right-click the Inviting Users Action and select Edit Shared Action.

  2. In the bottom part of the Properties window, in the Permission to invite new users list, select Allow only from the following domains.

  3. Click Add to add domains to the list. Only users in domains on the list can be invited.

Client Access Settings

Configure Client access to protected documents.

Set the period of downtime, after which if the client does not get updated, the access to protected documents becomes blocked. You can also configure how often the client checks for updates.

Single Sign-On with Active Directory

This Action defines permissions for Single Sign-On with Active Directory. The default is Do not allow Single Sign-On with Active Directory.

Working with External Users

You can add external users who can access Capsule Docs protected documents in these ways:

  • A user adds an external user to a document.

  • An external user downloads the Capsule Docs client and registers.

  • An administrator adds a user or domain in SmartEndpoint. The administrator can add individual users or import users from a .csv file.

    • Right-click the External Users folder in the Users and Computers tree and select Capsule Docs > Add External Users.

    • In the Global Actions pane, select Add External Users.

The first time that an external user from a new domain is added to the system, a new folder is created for the domain in the Users and Computers tree under External Users.

External users are in one of these states, shown in the User Details:

  • Invited - A user added the external user to a document but the new user did not register yet.

  • Registered - The user downloaded the Capsule Docs client and registered with an email address.

  • Revoked - The administrator revoked the user and the user cannot log in to Capsule Docs or see documents. Revoked users are in the Revoked Users folder. Administrators can Restore or Delete users from there.

An administrator can give an external user or domain internal permissions.

To give an external user the same permissions as an internal user:

Right-click on a user or domain from the Users and Computers tree and select Grant internal permission (for document use).

External users who have internal permissions are shown in the Capsule Docs internal users Virtual Group.

To revoke an external user:

Right-click on a user or domain from the Users and Computers tree and select Revoke user. The user is moved to the Revoked Users folder. You cannot delete external users.

Troubleshooting Capsule Docs Reverse Proxy

Traffic Logs

You can configure the Reverse Proxy to send traffic logs, which then can be reviewed in SmartLog, under Mobile Access logs.

To configure the Reverse Proxy to send traffic logs:

  1. In SmartConsole, click Security Policies.

  2. Click Shared Policies > Mobile Access.

  3. Click Open Mobile Access Policy in SmartDashboard.

  4. In SmartDashboard Mobile Access tab, go to Additional Settings > Logging.

  5. In the Tracking section of the configuration screen, select Log Access for Web Applications, and select events to log:

    • Unsuccessful access events

    • All access events

  6. Install Policy.

Identify Reverse Proxy logs by these criteria:

  • Category: Mobile Access

  • Application: Reverse Proxy

The Access section of the log can show:

  • Allowed - Authorized URL - The Reverse Proxy allowed the URL request (only shows if the All access events logging option is configured)

  • Denied - Unauthorized URL -The Reverse Proxy blocked the URL request. If this is a mistake, you can allow the URL.

    To allow a blocked URL:

    • On the command line, run:

      ReverseProxyCLI show applications

    • Under capsule_docs app in the Paths column, find the path that is unauthorized in the log.

  • Failed - The Reverse Proxy failed to forward the request for the EPS with one of these messages:

    • Internal Server Error - The Endpoint Security Management Server aborted the connection with the Security Gateway. Make sure the Endpoint Security Management Server is working.

    • Proxy not found -The given proxy host could not be resolved.

    • Can't resolve host name - The <capsule_docs_server> is the internal_host you configured in your capsule_docs application, you can see it under ReverseProxyCLI show applications in the Internal Server Name column.

      Your Endpoint Security Management Server is configured as a DNS name. Make sure that this hostname can be resolved from the Security Gateway. To do this run nslookup on the host to see that the Security Gateway can resolve it.

    • Internal host connection failed - Failed to connect to the internal server, make sure the server is up and running.

    • Invalid URL - The URL from the Security Gateway to the Endpoint Security Management Server was not properly formatted.

    • SSL handshake failed -A problem occurred somewhere in the SSL/TLS handshake between the Security Gateway and the Endpoint Security Management Server.

    • Server response was too slow - Operation timeout.

    • Page not found

  • Action that the Reverse Proxy took in relationship to this URL - Allowed, Denied, or Failed

Capsule Docs Recovery

The Capsule Docs Recovery Tool generates a master key that can open all documents in a situation of disaster recovery.

A new master key is valid for one year. Therefore we recommend that you generate a new master key every year. A notification shows in the SmartEndpoint Overview page when the master key is close to its expiration date. A new master key can open all documents that were created before its creation and up to one year afterwards.

To get the Capsule Docs Recovery Tool:

  1. In the SmartEndpoint, select Tools > Capsule Docs Recovery Tool.

  2. In the window that opens, create a Recovery Key Password and enter it twice.

  3. Click Save As and select a location where the Tool is saved in a zip file.

  4. If necessary, extract the tool and use the included instructions.