Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Configuring Web attributes
Administrator Help | TRITON AP-DATA | Version 8.3.x
Related topics:
Select one or more Web attributes to include in the policy. For each, highlight the attribute and click Enabled in the right pane. Define properties for each attribute in the right pane as well.
When the system detects a match for an attribute, it triggers the policy.
If you want to send notifications when there is a violation of a particular attribute setting, select the Send the following notification check box. You can configure who receives the notifications by clicking the name of the notification, "Web policy violation." Click this option to define the mail server, email subject, and message body, as well as other required properties. Policy owners receive notifications by default. See Configuring the Web Data Loss Prevention Policy for instructions.
For each attribute, indicate how severe a breach would be (low, medium, or high severity), and what action should be taken if a breach is detected. The default severity levels and available actions are shown below for each attribute.
Available actions: block (default), permit.
*
Wide is highly sensitive and errs on the restrictive side; it detects more data than the other levels. It is more likely to produce a false positive (unintended match) than a false negative (content that is not detected).
*
Default balances the number of false positives and false negatives and is recommended for most customers.
*
Narrow is the least restrictive. It is more likely to let content through than to produce an unintended match. For best practice, use this level when you first start using the block action. You might also use it if the system is detecting too many false positives.
Available actions: block (default), permit.
*
Suspected malware communication - Identifies transactions that are suspected to be malicious, based on analysis of traffic of known infected machines. This includes traffic thought to be malware phoning home or attempting to steal data. To use this feature, you must have TRITON AP-WEB installed and the Linking Service enabled. Because Linking Service is required, malware is not detected on endpoints.
*
Encrypted files - unknown format - Searches for outbound files that were encrypted using unknown encryption formats, based on advanced pattern and statistical analysis of the data.
*
Encrypted files - known format - Searches for outbound transactions comprising common encrypted file formats, such as password-protected Microsoft Word files.
*
Password files - Searches for password files, such as a SAM database and UNIX/Linux password files.
*
Common password information - Searches for password information in plain text by looking for common password patterns and using various heuristics.
*
IT asset information - Searches for electronic data containing suspicious content, such as network data, software license keys, and database files.
*
Suspicious behavior over time - Searches for activity considered to be potentially malicious, such as numerous posts in a designated period or numerous transactions containing encrypted data.
*
Wide is highly sensitive and errs on the restrictive side; it detects more data than the other levels. It is more likely to produce a false positive (unintended match) than a false negative (content that is not detected).
*
Default balances the number of false positives and false negatives and is recommended for most customers.
*
Narrow is the least restrictive. It is more likely to let content through than to produce an unintended match. For best practice, use this level when you first start using the block action. You might also use it if the system is detecting too many false positives.
Available actions: block (default), permit.
For example, add the file named confidential.docx. When that file is being posted, the system will detect it and either permit or block the post.
Available actions: block (default), permit.
Click Add to specify the types of files that should be monitored when posted or uploaded to the Web, for example Microsoft Excel files.
Available actions: block (default), permit.
Click Add to define key phrases or regular expression (RegEx) patterns that should be monitored.
Available actions: block (default), permit.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2016 Forcepoint LLC. All rights reserved.