Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Configuring the Web DLP Policy > Configuring web DLP policy attributes
Configuring web DLP policy attributes
Administrator Help | Forcepoint DLP | Version 8.4.x
Related topics:
Use the Attributes tab of the Policy Management > Web DLP Policy page in the Data Security module of the Forcepoint Security Manager to select one or more web attributes to include in the policy.
To include an attribute:
1.
2.
Mark the Enabled check box in the right pane.
Properties that apply to the attribute are listed under the check box.
3.
*
*
The available properties for each attribute are described in the table below.
Repeat this procedure for each attribute that you want to include.
When the system detects a match for an attribute, it triggers the policy.
To send notifications when there is a violation related to a specific attribute, mark the Send the following notification check box.
*
*
Available actions: block (default), permit.
*
Wide is highly sensitive and errs on the restrictive side; it detects more data than the other levels. It is more likely to produce a false positive (unintended match) than a false negative (content that is not detected).
*
Default balances the number of false positives and false negatives and is recommended for most customers.
*
Narrow is the least restrictive. It is more likely to let content through than to produce an unintended match. For best practice, use this level when you first start using the block action. You might also use it if the system is detecting too many false positives.
Available actions: block (default), permit.
*
Suspected malware communication identifies transactions that are suspected to be malicious, based on analysis of traffic from known infected machines. This includes phone home and data theft traffic. This feature Forcepoint Web Security with Linking Service enabled. Because Linking Service is required, malware is not detected on endpoints.
*
Encrypted files - unknown format searches for outbound files that were encrypted using unknown encryption formats, based on advanced pattern and statistical analysis of the data.
*
Encrypted files - known format searches for outbound transactions comprising common encrypted file formats, such as password-protected Microsoft Word files.
*
Password files searches for password files, such as a SAM database and UNIX/Linux password files.
*
Common password information searches for password information in plain text by looking for common password patterns and using various heuristics.
*
IT asset information searches for electronic data containing suspicious content, such as network data, software license keys, and database files.
*
Suspicious behavior over time searches for activity considered to be potentially malicious, such as numerous posts in a designated period or numerous transactions containing encrypted data.
Available actions: block (default), permit.
For example, after adding a file named confidential.docx, when a user attempts to post a file with that name, the system detects it and takes the configured action.
Available actions: block (default), permit.
Click Add to specify the types of files that should be monitored when posted or uploaded to the Web, for example Microsoft Excel files.
Available actions: block (default), permit.
Click Add to define key phrases or regular expression (regex) patterns that should be monitored.
Available actions: block (default), permit.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Configuring the Web DLP Policy > Configuring web DLP policy attributes
Copyright 2017 Forcepoint. All rights reserved.