hdlp 910 product guide

118
McAfee Host Data Loss Prevention 9.1 Product Guide

Upload: gustavo-enrique-pina-beltran

Post on 03-Mar-2015

370 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Hdlp 910 Product Guide

McAfee Host Data Loss Prevention 9.1Product Guide

Page 2: Hdlp 910 Product Guide

COPYRIGHT

Copyright © 2010 McAfee, Inc. All Rights Reserved.

No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any formor by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.

TRADEMARK ATTRIBUTIONS

AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCEEXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN,WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red inconnection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole propertyof their respective owners.

LICENSE INFORMATION

License Agreement

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED,WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICHTYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTSTHAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET,A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOUDO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURNTHE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.

License Attributions

Refer to the product Release Notes.

McAfee Host Data Loss Prevention 9.12

Page 3: Hdlp 910 Product Guide

ContentsIntroducing McAfee Host Data Loss Prevention. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

What is McAfee Host Data Loss Prevention?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Product components and how they interact. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

How Data Loss Prevention works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Strategies for categorizing applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

The Host DLP Policy console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Audience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Finding documentation for McAfee enterprise products. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Controlling Removable Media With Device Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

Device classes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Device definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Importing device parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Device rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Defining device classes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Creating a new device class. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Changing the status of a device class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Creating device definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Creating a Plug and Play device definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Creating a whitelisted Plug and Play definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Creating a removable storage device definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Importing device definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

Creating a device definition group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Creating and defining device rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Creating and defining a Plug and Play device rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Creating and defining a removable storage device rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

Creating and defining a removable storage file access rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Device parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Classifying Content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

Dictionaries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Document properties and file extensions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

3McAfee Host Data Loss Prevention 9.1

Page 4: Hdlp 910 Product Guide

Registered document repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Registering documents on host computers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Using registered document repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Text pattern definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Whitelist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Creating a new dictionary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Classifying data with registered document repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Creating a new registered document repository definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Creating a registered document repository group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Indexing registered documents repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

Deploying a registered document package to the agents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

Classifying data with text patterns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Creating a new text pattern. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Testing a text pattern. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Creating a new text pattern group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Adding and removing whitelist content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Adding new whitelist content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Deleting whitelist files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Tracking Content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39

How tags and content categories are used to classify content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

How tagging rules link tags to content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

How classification rules link categories to content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Creating tags, categories, catalogs, and groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Creating a tag. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Creating a content category. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Creating a tag and category group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Creating and defining tagging rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Creating and defining an application-based tagging rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Creating and defining a location-based tagging rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Creating and defining classification rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Creating and defining a content classification rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Creating and defining a registered documents classification rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Creating manual tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Tagging files manually. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Removing manual tags from content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Rights management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48

Adobe rights management users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

McAfee Host Data Loss Prevention 9.14

Contents

Page 5: Hdlp 910 Product Guide

How Data Loss Prevention works with Rights Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Defining an Adobe RM server and synchronizing policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Defining a Microsoft RMS server and synchronizing templates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Locating Files With Sensitive Content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

How scanning works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Using the discovery crawler. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

How to restore quarantined files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Applications and how to use them. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

The Enterprise Application List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Application definitions and how they are categorized. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

File extension definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

Creating file extensions and file extension groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

File server list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Creating and adding to a file server list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Network definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Creating network definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

File Destinations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67

Email destination definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Web destination definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Creating email destinations and groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Creating email destinations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Creating an email group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

Creating a printer list and adding printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Creating a printer list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Adding a printer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Adding an unmanaged printer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Adding an existing printer to the printer whitelist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

Creating web destinations and groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

Creating a web destination. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

Creating a web destination group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Assignment Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74

User assignment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Computer assignment groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Creating user assignment groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Creating a user assignment group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

5McAfee Host Data Loss Prevention 9.1

Contents

Page 6: Hdlp 910 Product Guide

Creating a privileged users group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

Protection Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78

How protection rules work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Definitions and how they define rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Defining a protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Creating and defining an application file access protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Creating and defining a clipboard protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

Creating and defining an email protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Creating and defining a file system protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Creating and defining a network communication protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

Creating and defining a PDF/Image Writer protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Creating and defining a printing protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Creating and defining a removable storage protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Creating and defining a screen capture protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

Creating and defining a web post protection rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

Removing rules, definitions, device classes, or user groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

How templates work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Synchronizing templates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Policy Assignment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91

Assigning policies with ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

Applying the system policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

Assigning a policy or agent configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Importing policies and editing policy descriptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Importing a policy from ePolicy Orchestrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Editing a policy description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Agent bypass and related features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Administering the Host DLP Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Refreshing the Host DLP Agent policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

Requesting an override key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

Generating an agent override key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

Generating a quarantine release key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

The Host DLP Monitor and What It Does. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

Agent events and how they are tracked. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Agent override. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Evidence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Hit count. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

McAfee Host Data Loss Prevention 9.16

Contents

Page 7: Hdlp 910 Product Guide

Redaction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Viewing redacted monitor fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Monitoring system events and alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Filtering event information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Defining filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Defining date filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Adding predefined filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Filtering the events monitor list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Using labels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Searching Host DLP Monitor events by event ID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Exporting Host DLP Monitor events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Printing Host DLP Monitor events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Sending Host DLP Monitor events by email. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Database Administration and Reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107

Report options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

Setting up RSS feeds. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

Setting up Data Loss Prevention rolled up reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

Administering the database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

Viewing database statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

Configuring the Host DLP System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111

McAfee Device Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

Agent configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

System tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

System log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Managing agent configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Applying the global agent configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Importing the global agent configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Resetting the agent configuration values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Configuring Safe Mode operation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Viewing the system log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

7McAfee Host Data Loss Prevention 9.1

Contents

Page 8: Hdlp 910 Product Guide

IntroducingMcAfee Host Data Loss PreventionMcAfee Host Data Loss Prevention software protects enterprises from the risk associated withunauthorized transfer of data from within or outside the organization. Data loss is defined asconfidential or private information leaving the enterprise as a result of unauthorizedcommunication through channels such as applications, physical devices, or network protocols.

McAfee Host Data Loss Prevention software version 9.1 is available in two configurations: McAfeeDevice Control and full McAfee Host Data Loss Prevention. Each configuration is available withtwo licensing options, 90-day trial and unlimited. The default installation is a 90-day license forMcAfee Device Control.

Contents

What is McAfee Host Data Loss Prevention?

Product components and how they interact

How Data Loss Prevention works

Strategies for categorizing applications

Encryption

The Host DLP Policy console

Finding documentation for McAfee enterprise products

What is McAfee Host Data Loss Prevention?McAfee Host Data Loss Prevention is a content-based agent solution that inspects enterpriseusers’ actions concerning sensitive content in their own work environment, their computers. Ituses advanced discovery technology as well as predefined dictionaries to identify this content,and incorporates device management and encryption for additional layers of control.

McAfee Host Data Loss Prevention provides:

• Universal protection — Protects against data loss through the broadest set of data-losschannels.

• Persistent content-aware data protection — Protects against data loss regardless ofthe format in which data is stored or manipulated; enforces data loss prevention withoutdisrupting legitimate user activities.

• Protection on-the-go — Prevents transmission of sensitive data from desktops and laptops,whether or not they are connected to the enterprise’s network.

What is McAfee Device Control?

McAfee Device Control prevents unauthorized use of removable media devices, the mostwidespread and costly source of data loss in many companies today. It is the default configurationon installation.

McAfee Host Data Loss Prevention 9.18

Page 9: Hdlp 910 Product Guide

McAfee Device Control provides:

• Persistent content-aware data protection — Controls what data can be copied toremovable devices, or controls the devices themselves, blocking them completely or makingthem read-only; blocks applications run from removable drives.

• Protection on-the-go — For USB drives, iPods, Bluetooth devices, CDs, DVDs, and otherremovable media.

Product components and how they interactMcAfee Host Data Loss Prevention software consists of several components. Each componentplays a part in defending your network from data loss.

Figure 1: McAfee Host Data Loss Prevention

Host DLP Policy Console

The Host DLP Policy console is the interface where the administrator defines and enforces theenterprise information security policy. It is used to create the information security policy andadminister the McAfee Host Data Loss Prevention components.

The Host DLP Policy console is accessed from the ePolicy Orchestrator Menu.

Introducing McAfee Host Data Loss PreventionProduct components and how they interact

9McAfee Host Data Loss Prevention 9.1

Page 10: Hdlp 910 Product Guide

Host DLP Agent

The Host DLP Agents reside on enterprise computers, which are referred to as managedcomputers, and enforces the policies defined in the Host DLP Policy. The agents audit useractivities to monitor, control, and prevent unauthorized users from copying or transferringsensitive data. They also generate events recorded by the ePO Event Parser.

ePO Event Parser

Events that are generated by the Host DLP Agents are sent to the ePO Event Parser, andrecorded in tables in the ePO database. Events are stored in the database for further analysisand used by other system components.

Host DLP Monitor

Events that are sent to the DLP Event Parser are displayed in the Host DLP Monitor, an interfaceaccessed from the ePolicy Orchestrator Reporting console. All events can be filtered and sortedbased on criteria such as protection rules, severity, date, time, user, computer name, or policyversion. Events can be labeled by the administrator for tracking purposes.

How Data Loss Prevention worksMcAfee Host Data Loss Prevention safeguards sensitive enterprise information by deployingpolicies which are made up of classification rules, tagging rules, protection rules, device rules,and user and group assignments. The policies are monitored, and defined actions using contentidentified as sensitive are monitored or blocked, as required. In certain cases, sensitive content

Introducing McAfee Host Data Loss PreventionHow Data Loss Prevention works

McAfee Host Data Loss Prevention 9.110

Page 11: Hdlp 910 Product Guide

is encrypted before the action is allowed. Content is stored as evidence, and reports are createdfor review and control of the process.

Figure 2: McAfee Host Data Loss Prevention workflow

Tagging and classification rules

Tagging and classification rules, based on enterprise requirements, identify confidentialinformation and its sources. Data can be classified by:

• Application— Application-based tagging rules apply tags generically based on the applicationor applications that create a file, as specified in application definitions, or based on the filetype or file extension.

• Content — Classification rules apply content categories based on parsing the content andmatching it against predefined patterns or keywords. There are two types of classificationrules:

• Content Classification Rules — Match content against pre-defined strings and textpatterns or dictionaries.

• Registered Documents Classification Rules — Classify all specified content in adefined group of folders.

• Location — When files are copied or accessed by local processes, location-based taggingrules apply tags based on the location of the source file. For example, a file being copiedlocally from a share on a network server.

NOTE: You can add text patterns and dictionaries to a location- or application-based taggingrule, combining the two types of rules.

Introducing McAfee Host Data Loss PreventionHow Data Loss Prevention works

11McAfee Host Data Loss Prevention 9.1

Page 12: Hdlp 910 Product Guide

Tags and content categories identify files as containing sensitive information. Whenever suchfiles are accessed, McAfee Host Data Loss Prevention software tracks data transformations andmaintains the classification of the sensitive content persistently, regardless of how it is beingused. For example, if a user opens a tagged Word document, copies a few paragraphs of it intoa text file, and attaches the text file to an email message, the outgoing message has the sametag as the original document.

Protection rules

Protection rules prevent unauthorized distribution of tagged data. When a user attempts tocopy or attach tagged data, protection rules determine whether this should be allowed,monitored, or blocked. In addition to tags and content categories, protection rules are definedwith applications or application groups, user assignments, and definitions such as emaildestinations, document properties, or text patterns.

Device rules

Device rules monitor and potentially block the system from loading physical devices such asremovable storage devices, Bluetooth, Wi-Fi, and other Plug and Play devices. Device classesand device definitions are used to define device rules.

Removable storage device rules offer additional functionality to set the device as read-only andprevent writing data to the device.

Discovery rules

Host DLP Discovery is a crawler that runs on client computers. Discovery rules define the contentbeing searched for and whether it is to be monitored, quarantined, encrypted, or deleted.Settings in the Global Agent Configuration determine where and when the search is performed.

Assignment groups

Assignment groups apply specific protection rules to different groups, users and computers inthe enterprise.

Policies and policy deployment

A policy is the combination of tagging rules, protection rules, definitions, and assignment groups.Policies are deployed by ePolicy Orchestrator to the enterprise’s managed computers (computerswith a Host DLP Agent installed).

Monitoring

• Event monitoring — The Host DLP Monitor allows administrators to view agent events asthey are received.

• Evidence collection — If protection rules are defined to collect evidence, a copy of thetagged data is saved and linked to the specific event. This information can help determinethe severity or exposure of the event. Evidence is encrypted using the AES algorithm beforebeing saved.

• Hit highlighting — Evidence can be saved with highlighting of the text that caused theevent. Highlighted evidence is stored as a separate encrypted HTML file.

Whitelists

Whitelists are collections of items that you want the system to ignore. McAfee Host Data LossPrevention uses four types of whitelists:

Introducing McAfee Host Data Loss PreventionHow Data Loss Prevention works

McAfee Host Data Loss Prevention 9.112

Page 13: Hdlp 910 Product Guide

• Application

Device rules can block applications run from removable devices. To allow necessaryapplications such as encryption software, whitelisted application definitions can be createdto exempt such applications from the blocking rule. The definitions apply to removablestorage devices only.

• Content — The whitelist folder contains text files defining content (typically boilerplate)that is not tagged and restricted. The main purpose of this is to improve the efficiency ofthe tagging process by skipping standard content that does not need to be protected.

• Plug and Play devices — Some Plug and Play devices do not handle device managementwell. Attempting to manage them might cause the system to stop responding or cause otherserious problems. Whitelisted Plug and Play devices are automatically excluded when a policyis applied.

• Printers — To prevent printing of confidential data, the Host DLP Agent replaces the originalprinter driver with a proxy driver that intercepts printing operations and passes them throughto the original driver. In some cases printer drivers cannot work in this architecture, causingthe printer to stop responding. Whitelisted printers are excluded from the proxy driverinstallation process.

Strategies for categorizing applicationsMcAfee Host Data Loss Prevention divides applications into four categories or “strategies”. Astrategy is assigned to each application definition. You can change the strategy to achieve abalance between security and the computer’s operating efficiency. The strategies, in order ofdecreasing security, are:

• Editor — Any application that can modify file content. This includes “classic” editors likeMicrosoft Word and Microsoft Excel, as well as browsers, graphics software, accountingsoftware, and so forth. Most applications are editors.

• Explorer — An application that copies or moves files without changing them, such asWindows Explorer or certain shell applications.

• Trusted — An application that needs unrestricted access to files for scanning purposes.Examples are McAfee VirusScan®, backup software, and desktop search software (Google,Copernic, and so forth.).

• Archiver — An application that reprocesses files. Examples are compression software suchas WinZip, and encryption software such as McAfee Endpoint Encryption or PGP.

Change the strategy as necessary to optimize performance. For example, the high level ofobservation that an editor application receives is not consistent with the constant indexing ofa desktop search program. The performance penalty is high, and the risk of a data leak fromsuch an application is low. Therefore, you should use the trusted strategy with these programs.

EncryptionEncryption of critical documents is an important part of a strong security policy. McAfee HostData Loss Prevention software version 9.1 supports encryption in the following ways:

• Built-in device definitions to recognize McAfee Endpoint Encryption for Removable Mediadevices and content encrypted with McAfee Endpoint Encryption for Files and Folders.

Introducing McAfee Host Data Loss PreventionStrategies for categorizing applications

13McAfee Host Data Loss Prevention 9.1

Page 14: Hdlp 910 Product Guide

• Support in discovery rules for Adobe® LiveCycle® and Microsoft Rights Managementprotection.

• Filtering in rules by document property (encrypted/not encrypted.)

• Filtering in discovery and most protection rules by Adobe LiveCycle or Microsoft RightsManagement protection.

• Encryption on demand.

• Encryption keys definitions.

Device definitions

Built-in device definitions for McAfee Endpoint Encryption for Removable Media and McAfeeEndpoint Encryption for Files and Folders allow the creation of device rules that permit onlyencrypted content to be saved to devices. All other content is blocked.

Encryption filters

Email protection, file system, removable storage, web post protection, and discovery rules allowencrypted content to be defined in the rule. Using this feature, you can block unencrypted emailor web post attachments, but permit encrypted ones. Two precautions must be observed:

• Email programs treat the body of the email as an attachment. If you create a rule to blockunencrypted content and do not use an additional parameter to define the attached file,such as a tag, a file type, or a file extension, all emails will be blocked.

• If you have McAfee Endpoint Encryption installed and you drag an encrypted file to an email,McAfee Endpoint Encryption strips the encryption because you are "opening" the file on yourcomputer, which is allowed. To send an encrypted attachment, attach a self-extractor filerather than one with standard encryption.

You can also use file types in rules to point to encrypted files. The XML file type is also associatedwith McAfee Endpoint Encryption *.sba files, and the file type Executable program files is alsoassociated with self-extractors.

Encrypt on demand

File system protection, removable storage protection, and discovery rules have an option toencrypt on demand. This means that in addition to the usual actions of Block, Monitor, and soforth, the option Encrypt is present on the rule wizard actions page. To use this option, McAfeeEndpoint Encryption must also be installed, and you must define an encryption key in McAfeeHost Data Loss Prevention with a name that matches a defined key in McAfee EndpointEncryption. If these conditions are not met, the action defaults to Block.

The Host DLP Policy consoleThe Host DLP Policy console is the interface for McAfee Host Data Loss Prevention softwareand is accessed from the ePolicy Orchestrator console. You use this interface to create and

Introducing McAfee Host Data Loss PreventionThe Host DLP Policy console

McAfee Host Data Loss Prevention 9.114

Page 15: Hdlp 910 Product Guide

enforce policies that protect your enterprise’s sensitive information. This is where you create,modify and control system rules and objects to prevent information loss.

Figure 3: Host DLP Policy console in ePolicy Orchestrator 4.5

The Host DLP Policy console is divided into these areas:

1 Navigation pane — Where the system administrator selects a rule or definition. The mainpanel displays information about the selected object.

• Applications — Access the Enterprise Application List to import applications.

• Content Based Definitions — Create dictionaries, text patterns, and registereddocument repositories to identify sensitive content.

• Content Protection — Access Tagging Rules or Classification Rules to classify content,Protection Rules to enforce the defined policies, and Discovery Rules to search forsensitive content in your network.

• Database Administration — Monitor and maintain the system’s database.

• Definitions — Create new objects for system rules.

• Device Management — Monitor and control the use of physical devices.

• Policy Assignment — Create and maintain user groups for deploying policies, andgroups of privileged users that can bypass policy enforcement.

• RMand Encryption— Set up communication with rights management servers, managepolicies/templates, and create encryption keys.

2 Main Panel— Where the system administrator edits and reviews rules or definitions,depending on which object is currently selected in the navigation pane.

3 Details pane — Displays a detailed description of a single object selected in the mainpanel.

AudienceThe information in this guide is intended primarily for two audiences:

Introducing McAfee Host Data Loss PreventionAudience

15McAfee Host Data Loss Prevention 9.1

Page 16: Hdlp 910 Product Guide

• Security officers who are responsible for determining sensitive and confidential data anddefining the enterprise policy for protecting the company’s intellectual property.

• Network administrators who are responsible for implementing and enforcing the enterprisepolicy for protecting the company’s intellectual property.

Finding documentation for McAfee enterpriseproducts

To access the documentation for your McAfee products, use the McAfee Technical SupportServicePortal.

1 Go to the McAfee ServicePortal (https://mysupport.mcafee.com) and select Self Service| Product Documentation.

2 Select a Product.

3 Select a Version.

4 Select a product document

Product documentation by phase

McAfee documentation provides the information you need during each phase of productimplementation, from installing a new product to maintaining existing ones. Depending on theproduct, additional documents might also be available. After a product is released, informationregarding the product is entered into the online KnowledgeBase, available through the McAfeeServicePortal.

Installation phase — Before, during, and after installation

• Release Notes

• Installation Guide

Setup phase — Using the product

• Product Guide

• Online Help

Maintenance phase — Maintaining the software

• KnowledgeBase (http://mysupport.mcafee.com)

Introducing McAfee Host Data Loss PreventionFinding documentation for McAfee enterprise products

McAfee Host Data Loss Prevention 9.116

Page 17: Hdlp 910 Product Guide

Controlling Removable Media With DeviceRules

Devices attached to enterprise managed computers — such as smartphones, removable storagedevices, Bluetooth devices, MP3 players, or Plug and Play devices — can be monitored or blockedusing device rules, allowing you to monitor and control their use in the distribution of sensitiveinformation. For many organizations, this level of data loss prevention is the primary goal. Thisis the level of protection provided by McAfee Device Control.

A device rule consists of a list of the device definitions included or excluded from the rule,and the action taken when the rule is triggered by content being sent to or from the nameddevice or devices.

In addition, you can create different sets of rules for the enterprise workforce based on rolesand needs. For example, while the majority of workers are not allowed to copy enterprise datato removable storage devices, the IT and sales force can use these devices, and are onlymonitored by the system. This kind of scenario can be implemented by using the properties ofthe specific device with a suitable device rule.

Contents

Device classes

Device definitions

Device rules

Defining device classes

Creating device definitions

Creating and defining device rules

Device parameters

Device classesDevice classes name and identify the devices used by the system. Each class of devices isidentified by a name, an (optional) description, and one or more Globally Unique Identifiers(GUIDs). When you install McAfee Host Data Loss Prevention, you find built-in device classeslisted under Device Management | Device Classes. The devices are categorized by status:

• Managed — Specific Plug and Play or removable storage devices, defined by device class,that can be managed by McAfee Host Data Loss Prevention.

• Unmanaged — Device classes not managed by McAfee Host Data Loss Prevention, butwhose status can be changed to Managed by the system administrator.

• Unmanageable — Device classes not managed by McAfee Host Data Loss Preventionbecause attempts to manage them can affect the managed computer, system health, orefficiency. New classes of devices cannot be added to this list.

17McAfee Host Data Loss Prevention 9.1

Page 18: Hdlp 910 Product Guide

In day-to-day tasks, the system administrator should not tamper with the device classes listbecause improper use (for example, blocking the managed computer’s hard disk controller) cancause a system or operating system malfunction. Instead of editing an existing item to suit theneeds of a device protection rule, add a new, user-defined, class to the list.

Device definitionsDevice definitions control specific devices by fine-tuning the device properties such as the deviceclass, device Product ID/Vendor ID (PID/VID), or USB class code. Device properties serve asfilter criteria for controlling devices, providing the advantage of using portable devices whilemaintaining the company policy for sensitive information. Built-in definitions for McAfee EndpointEncryption and McAfee Endpoint Encryption for Removable Media facilitate the use of thoseproducts.

Device definition groups can be created for a flexible and accurate way to maintain the requiredlevel of security. They combine a different set of properties for each device needing to beblocked or monitored by the system. The device definitions and groups are available for twotypes:

• Plug and Play device — A device that can be added to the managed computer withoutany configuration or manual installation of dlls and drivers. Plug and Play devices includemost Windows devices. Plug and Play device definitions allow you to manage and controlmost available devices, for example, Bluetooth, Wi-Fi, and PCMCIA, and prevent such devicesfrom being loaded by the system.

• Removable Storage device — An external device containing a file system that appearson the managed computer as a drive.

TIP: While the Plug and Play device definitions and rules include general device properties, theremovable storage device definitions and rules are more flexible and include additional propertiesrelated to the removable storage devices. McAfee recommends using the removable storagedevice definitions and rules to control devices, such as a USB mass storage device, that can beclassified as either.

Whitelisted Plug and Play devices

The purpose of whitelisted Plug and Play devices is to deal with those devices that do not handledevice management well, and might cause the system to stop responding or cause other seriousproblems. McAfee recommends adding such devices to the whitelisted device list to avoidcompatibility problems.

Whitelisted Plug and Play device definitions are added automatically to the excluded list in everyPlug and Play device rule. They are never managed, even if their parent device class is managed.

NOTE: If you inspect the device rules, you do not see the whitelist definition. The definition isadded to the rule when the policy is applied. You do not have to rewrite existing rules to includenew whitelisted devices.

Importing device parametersDevice parameters can be entered from lists saved in CSV format. The list can be made byselecting multiple events inside the DLP Monitor and exporting the device parameters (usingthe context menu) to a CSV file, one comma separated row per event. Lists can also be createdmanually. See the online Help for information on formatting the CSV file.

Controlling Removable Media With Device RulesDevice definitions

McAfee Host Data Loss Prevention 9.118

Page 19: Hdlp 910 Product Guide

Device rulesDevice rules define the action taken when particular devices are used. There are three typesof device rules: Plug and Play, removable storage and removable storage file access. Plug andplay and removable storage rules allow the device to be blocked or monitored, and for the userto be notified of the action taken. Removable storage file access rules block executables onplug-in devices from running.

Removable storage device rules can also define a device as read only. A typical use of thisfeature is to allow users to listen to MP3 players, but block their potential use as storage devices.

Device file access rules block removable storage devices from running applications. Becausesome executables, such as encryption applications on encrypted devices, must be allowed torun, Whitelisted Application definitions can be included in the rule to exempt specifically namedfiles from the blocking rule.

File access rules determine if a file is an executable by its extension. The following extensionsare blocked: .bat, .cgi, .cmd, .com, .cpl, .dll, .exe, .jar, .msi, .py, .pyc, .scr, .vb, .vbs, .ws, and.wsf. In addition, to block files that might be executed from within archives, .cab, .rar, and .zipfiles are also blocked.

NOTE: File access rules also block executable files from being copied to removable storagedevices. The file filter driver cannot differentiate between opening and creating an executable.

Defining device classesUse these tasks to create and modify device classes.

Tasks

Creating a new device class

Changing the status of a device class

Creating a new device classUse this task to create a device class.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under DeviceManagement, select DeviceClasses. The available devices appear in the main panel.

2 Right-click in the Device Classes pane and select Add New | Device Class. A newDevice Class icon appears (default name Device Class) in the unmanaged device classsection.

3 Double-click the icon. The edit dialog box appears.

4 Type a name, a description (optional), and the device's Globally Unique Identifier (GUID)in the appropriate text boxes.

NOTE: A GUID in the correct format is required. The OK button remains unavailable untilyou type it.

5 To move the device to Managed status, select the checkbox.

Controlling Removable Media With Device RulesDevice rules

19McAfee Host Data Loss Prevention 9.1

Page 20: Hdlp 910 Product Guide

6 Click OK.

Changing the status of a device classUse this task to change the status of a device class.

Task

1 In the Host DLP Policy console navigation pane under DeviceManagement, select DeviceClasses. The available devices appear in the main panel.

2 Right-click a specific device class and select Change Device Status to Managed orChange Device Status to Unmanaged, as appropriate.

NOTE: Details for "Unknown" device classes (classes with no name) can appear in the DLPMonitor. These events should be handled by the system administrator, and added to themanaged or unmanaged device lists as is appropriate.

Creating device definitionsUse these tasks to create device definitions.

NOTE:

When you create a device definition with multiple parameters, the parameters defined in eachParameter Name are added to the definition as logical ORs, and multiple Parameter Names areadded as logical ANDs.

For example, the following parameter selection creates the device definition shown below:

Selected parameterDevice definition

FirewireBus Type

USB

Memory DevicesDevice Class

Windows Portable Devices

• Bus Type is one of: Firewire (IEEE 1394) OR USB

• AND Device Class is one of Memory Devices OR Windows Portable Devices.

Tasks

Creating a Plug and Play device definition

Creating a whitelisted Plug and Play definition

Creating a removable storage device definition

Importing device definitions

Creating a device definition group

Creating a Plug and Play device definitionUse this task to define Plug and Play devices.

Controlling Removable Media With Device RulesCreating device definitions

McAfee Host Data Loss Prevention 9.120

Page 21: Hdlp 910 Product Guide

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under DeviceManagement, select DeviceDefinitions. The available device definitions and device definition groups appear in themain panel.

2 In the Device Definitions pane, right-click and select Add New | Plug and Play DeviceDefinition. The new Plug and Play Device Definition icon appears.

3 Name the new device definition and double-click the icon. The edit dialog box appears.

4 Type a description (optional).

5 Select the device parameters from the available list.

6 Click OK.

Creating a whitelisted Plug and Play definitionThe purpose of whitelisted Plug and Play devices is to deal with those devices that do not handledevice management well, and might cause the system to stop responding or cause other seriousproblems. McAfee recommends adding such devices to the whitelisted device list to avoidcompatibility problems.

Whitelisted Plug and Play devices are added automatically to the “excluded” list in all Plug andPlay device rules when the policy is applied. They are never managed, even if their parentdevice class is managed.

Use this task to define Plug and Play devices as whitelisted.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under DeviceManagement, select DeviceDefinitions. The available device definitions and device definition groups appear in themain panel.

2 In the Device Definitions pane, right-click and select Add New | Whitelisted Plugand Play Device Definition. The new Whitelisted Plug and Play Device Definition iconappears.

3 Name the new device definition and double-click the icon. The edit dialog box appears.

4 Type a description (optional).

5 Select the Parameter Name from the available list. The Edit the device definitionparameter dialog box opens.

6 Click Add New and type in the parameter information.

7 Click OK twice.

Creating a removable storage device definitionUse this task to define removable storage devices.

Task

For option definitions, press the F1 key.

Controlling Removable Media With Device RulesCreating device definitions

21McAfee Host Data Loss Prevention 9.1

Page 22: Hdlp 910 Product Guide

1 In the Host DLP Policy console navigation pane under DeviceManagement, select DeviceDefinitions. The available device definitions and device definition groups appear in themain panel.

2 In the Device Definitions pane, right-click and select Add New | Removable StorageDevice Definition. The new Removable Storage Device Definition icon appears.

3 Name the new device definition and double-click the icon. The edit dialog box appears.

4 Type a description (optional).

5 Select the device parameters from the available list.

6 Click OK.

Importing device definitionsUse this task to import a device definition from a file.

Device parameters can be imported from lists saved in CSV format. You can import a newdefinition from a file, or import a parameter to an existing definition.

Before you begin

Create a device parameter list, one comma-separated row per parameter, and save in CSVformat. The list can be made by selecting multiple events inside the DLP Monitor and selectingExport Device Event Parameters on the context menu. You can also use open-source/thirdparty CSV libraries to create the file.

Task

1 In the Host DLP Policy console navigation pane under DeviceManagement, select DeviceDefinitions. The available device definitions and device definition groups appear in themain panel.

2 In the Device Definitions pane, right-click and select Import from file, then select thetype of definition (Plug and Play or removable storage.)

3 In the Import From dialog box, navigate to the CSV file and click Open. The parametersare imported to the new device definition.If the file contains parameters that do not match the type of device definition selected, forexample a File Volume Serial Number imported into a Plug and Play definition, the definitionis ignored and the import continues. If the format is not correct, the import fails.

4 Name the new device definition and click OK to create it.

Importing a parameter to an existing device definitionUse this task to import a parameter from a file.

Before you begin

Create a file containing the device definition parameter to import.

Task

1 Open an existing device definition by double-clicking on it.

2 Select a parameter to edit. In the parameter definition edit dialog box, click Import.

Controlling Removable Media With Device RulesCreating device definitions

McAfee Host Data Loss Prevention 9.122

Page 23: Hdlp 910 Product Guide

3 In the Import From dialog box, navigate to a file and click Open. The parameter valuesare imported to the parameter definition.

4 Click OK to accept the changes to the device definition.

Creating a device definition groupUse this task to create a device definition group.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under DeviceManagement, select DeviceDefinitions. The available device definitions and device definition groups appear in themain panel.

2 In the Device Definitions pane, right-click and select Add New | Plug and Play DeviceDefinition Group or Add New | Removable Storage Device Definition Group. Thenew Device Definition Group icon appears.

3 Name the new device definition group and double-click the icon. The edit dialog box appears.

4 Type a description (optional).

5 Select the relevant Plug and Play device or removable storage device definition entriesfrom the available list.

6 Click OK.

Creating and defining device rulesDevice rules assign actions to device definitions. Use these tasks to create and define devicerules.

Tasks

Creating and defining a Plug and Play device rule

Creating and defining a removable storage device rule

Creating and defining a removable storage file access rule

Creating and defining a Plug and Play device ruleUse this task to define a Plug and Play device rule.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under DeviceManagement, select DeviceRules. The available device management rules appear in the main panel.

2 In the Device Rules pane, right-click and select Add New | Plug and Play DeviceRule.

TIP: You can use the Plug and Play Device Blocking Rule to block USB devices, but McAfeerecommends using the Removable Storage Device Blocking Rule instead. Using the Plugand Play Device Blocking Rule can result in blocking the entire USB Hub/Controller. The

Controlling Removable Media With Device RulesCreating and defining device rules

23McAfee Host Data Loss Prevention 9.1

Page 24: Hdlp 910 Product Guide

Removable Storage Device Blocking Rule allows the device to initialize and register withWindows. It also allows you to define the device as read-only.

3 Rename the new device rule and double-click the icon. Follow these steps in the wizard.

ActionStep

Select a Plug and Play device definition or definitions or group from the available list. Youcan include or exclude definitions. Click Add item to create a new Plug and Play definition.Click Add group to create a new Plug and Play group. When you have finished, click Next.

1 of 3

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. If you select Monitor, click Severity to modify the

2 of 3

value. If you select Notify User, click Edit alert popup to modify the alert message, URL,or link text.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.3 of 3 (optional)

4 To activate the rule, right-click the rule icon and click Enable.

Creating and defining a removable storage device ruleUse this task to define a removable storage device rule.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under DeviceManagement, select DeviceRules. The available device management rules appear in the main panel.

2 In the Device Rules pane, right-click and select Add New |Removable Storage DeviceRule.

TIP: McAfee recommends using the Removable Storage Device Blocking Rule to block USBdevices. While it is possible to use a Plug and Play Device Blocking Rule, this can result inblocking the entire USB Hub/Controller. The Removable Storage Device Blocking Rule allowsthe device to initialize and register with Windows. It also allows you to define the deviceas read-only.

3 Rename the new device rule and double-click the icon. Follow these steps in the wizard.

ActionStep

Select a removable storage device definition or definitions or group from the available list.You may include or exclude definitions. Click Add item to create a new removable storage

1 of 3

device definition. Click Add group to create a new removable storage device group. Whenyou have finished, click Next.

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. If you select Monitor, click Severity to modify the

2 of 3

value. If you select Notify User, click Edit alert popup to modify the alert message, URL,or link text. Click Next.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.3 of 3 (optional)

4 To activate the rule, right-click the rule icon and click Enable.

Controlling Removable Media With Device RulesCreating and defining device rules

McAfee Host Data Loss Prevention 9.124

Page 25: Hdlp 910 Product Guide

Creating and defining a removable storage file access ruleUse this task to define a removable storage file access rule.

File access rules block removable storage media from running applications. Whitelisted applicationdefinitions specified in step 2 provide lists of specific files that are exempt from the blockingrule.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under DeviceManagement, select DeviceRules. The available device management rules appear in the main panel.

2 In the Device Rules pane, right-click and select Add New Removable Storage FileAccess Rule.

3 Rename the new device rule and double-click the icon. Follow these steps in the wizard.

ActionStep

Select a removable storage device definition or definitions or group from the available list.You may include or exclude definitions. Click Add item to create a new removable storage

1 of 3

device definition. Click Add group to create a new removable storage device group. Whenyou have finished, click Next.

Select a whitelisted application or applications from the available list. Click Add to create anew whitelisted application definition or Edit to modify an existing definition. When you havefinished, click Next.

2 of 3

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.3 of 3 (optional)

4 To activate the rule, right-click the rule icon and click Enable.

Creating a whitelisted application definitionUse this task to create a whitelisted application definition.

Whitelisted application definitions are used in removable storage file access rules to exemptspecifically named files from being blocked.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Device Management, selectWhitelisted Applications. The available whitelisted applications appear in the main panel.

2 Right-click in the Whitelisted Applications pane and select Add New | WhitelistedApplication. A new whitelisted application icon appears.

3 Double-click the icon. The edit dialog box appears.

4 Type a name, a description (optional), and the file name of the executable you want toallow to run in the appropriate text boxes.

5 Click Add to add the file name to the list. Repeat typing and adding file names as required.

6 When you have finished adding file names, click OK.

Controlling Removable Media With Device RulesCreating and defining device rules

25McAfee Host Data Loss Prevention 9.1

Page 26: Hdlp 910 Product Guide

Device parametersThe following table provides definitions for all parameters used in device definitions. It indicateswhich type of device the parameter is found in and whether it can be imported as a list from afile (see Device definition parameter management.)

Table 1: Device definitions for Plug and Play and removable storage devicesDescriptionImport

parametersFound in...Parameter name

Selects the device BUS type from the available list (IDE,PCI, and so forth.)

yesbothBus Type

A generic category for any CD or DVD drive.noRS onlyCD/DVD Drives

Select to indicate a device protected with McAfee EndpointEncryption.

noRS onlyContent encrypted byMcAfee EndpointEncryption

Selects the device class from the available managed list.noPnP onlyDevice Class

A list of physical device descriptions. Effective especiallywith device types other than USB and PCI, which are

yesbothDevice Compatible IDs

more easily identified using PCI VendorID/DeviceID orUSB PID/VID.

A Windows-generated string that uniquely identifies thedevice in the system. For example,USB\VID_0930&PID_6533\5&26450FC&0&6.

yesbothDevice Instance ID(Windows XP /Windows 2000)

Device Instance Path(Windows Vista /Windows 7)

The name attached to a hardware device, representingits physical address.

yesbothDevice Name

The type of file system, for example NTSF, FAT32, andso forth.

noRS onlyFile System Type

The access to the file system: read only or read-write.noRS onlyFile System Access

The user-defined volume label, viewable in WindowsExplorer. Partial matching is allowed.

yesRS onlyFile System VolumeLabel

A 32-bit number generated automatically when a filesystem is created on the device. It can be viewed by

yesRS onlyFile System VolumeSerial Number

running the command line command dir x:, where x: isthe drive letter.

The PCI VendorID and DeviceID are embedded in thePCI device. These parameters can be obtained from the

yesbothPCI VendorID /DeviceID

Hardware ID string of physical devices, for example,PCI\VEN_8086&DEV_2580&SUBSYS_00000000&REV_04.

Identifies a physical USB device by its general function.Select the class code from the available list.

noPnP onlyUSB Class Code

A unique alphanumeric string assigned by the USB devicemanufacturer, typically for removable storage devices.

yesbothUSB Device SerialNumber

The serial number is the last part of the instance ID; forexample,USB\VID_3538&PID_0042\00000000002CD8.A validserial number must have a minimum of 5 alphanumericcharacters and must not contain ampersands (&). If thelast part of the instance ID does not follow theserequirements, it is not a serial number.

Controlling Removable Media With Device RulesDevice parameters

McAfee Host Data Loss Prevention 9.126

Page 27: Hdlp 910 Product Guide

DescriptionImportparameters

Found in...Parameter name

The USB VendorID and ProductID are embedded in theUSB device. These parameters can be obtained from the

yesbothUSB Vendor ID /Product ID

Hardware ID string of physical devices, for example:USB\Vid_3538&Pid_0042.

Controlling Removable Media With Device RulesDevice parameters

27McAfee Host Data Loss Prevention 9.1

Page 28: Hdlp 910 Product Guide

Classifying ContentMcAfee Host Data Loss Prevention gives you several ways of classifying sensitive content. Thedifferent classifications help you create granular tagging and protection rules to control differentcontent in different ways.

Contents

Dictionaries

Registered document repositories

Text pattern definitions

Whitelist

Creating a new dictionary

Classifying data with registered document repositories

Classifying data with text patterns

Adding and removing whitelist content

DictionariesA dictionary is a collection of keywords or key phrases where each entry is assigned a weight.Content classification rules use specified dictionaries to classify a document if a defined threshold(total weight) is exceeded, that is, if enough words from the dictionary appear in the document.

The difference between a dictionary entry and a string in a text pattern definition is the assignedweight. A string text pattern tagging rule always tags the document if the phrase is present. Adictionary tagging rule gives you more flexibility because you can set a threshold, which makesthe rule relative. The assigned weights can be negative or positive, which allows you to lookfor words or phrases in the presence of other words or phrases.

In addition to the ability to create your own dictionaries, McAfee Host Data Loss Preventioncomes with several built-in dictionaries with terms commonly used in health, banking, finance,and other industries.

Dictionaries can be created (and edited) manually or by cut and paste from other documents.

Limitations

This section describes the design of the dictionary feature and some limitations this designentails. Dictionaries are saved in Unicode (UTF-8), and therefore can be written in any language.The following descriptions are specifically for dictionaries written in English. Other languagesshould behave in a similar manner, but there may be unforeseen problems in certain languages.

Dictionary matching has the following characteristics:

• It is not case-sensitive.

• It matches substrings, not whole words.

McAfee Host Data Loss Prevention 9.128

Page 29: Hdlp 910 Product Guide

• It matches phrases including spaces.

Because the matches are substring, McAfee recommends using caution when entering shortwords, because of the potential of false positives. For example, a dictionary entry of "cat" wouldflag both "cataracts" and "duplicate." To prevent false positives of this type, statisticallyimprobable phrases, or SIPs, give the best results. Another source of false positives is similarentries. For example, in some HIPAA disease lists, both "celiac" and "celiac disease" appear asseparate entries. If the second term appears in a document, it gets two hits — one for eachentry — skewing the total score.

Document properties and file extensionsDocument property and file extension definitions classify content by predefined metadata valuesor filename extension.

Document properties

Document properties definitions were expanded in McAfee Host Data Loss Prevention version9.0. They are used in protection rules as well as discovery rules. The Date Created propertynow has a relative date option (document is stored more than X days.) Document propertiescan be retrieved from any Microsoft Office document.

For most properties, partial matching is permitted. The feature now appears in the McAfeeDevice Control version of the software as well as the full McAfee Host Data Loss Preventionversion, due to its inclusion in removable storage protection rules. It is also included as a tabin the template synchronization wizard. There are three types of document properties:

• Predefined properties — Standard properties shared by most document types, such asauthor and title.

• User defined properties — Custom properties added to the document metadata, allowedby some applications such as Microsoft Word. A user defined property can also reference astandard document property that is not on the predefined properties list, but cannot duplicatea property that is on the list.

• Any property — Allows defining a property by value alone. The feature is useful in caseswhere the keyword has been entered in the wrong property parameter or when the propertyname is unknown. For example, adding the value Secret to the Any property parameterclassifies all documents that have the word Secret in at least one property.

File extensions

File extension definitions are used in protection, discovery, and tagging rules to increasegranularity. A predefined list of extensions is included, and new definitions can be added. Fileextension groups can be used to simplify rules by defining, for example, all graphic file formatsas a single definition.

Registered document repositoriesThe registered documents feature is an extension of location-based tagging. It givesadministrators another way to define the location of sensitive information, to protect it frombeing distributed in unauthorized ways.

Classifying ContentDocument properties and file extensions

29McAfee Host Data Loss Prevention 9.1

Page 30: Hdlp 910 Product Guide

To use registered document repositories, the administrator selects a list of shared folders to beregistered. The definition can be limited to specified file extensions within those folders, andto a maximum file size. The content of these folders is categorized, fingerprinted and distributedto all endpoint workstations. The DLP Agent on the endpoint blocks distribution of documentscontaining registered content fragments outside of the host system.

Registering documents on host computers

Using registered document repositories

Registering documents on host computersTwo advantages of registering documents over traditional location-based tagging are:

• Documents that existed before the location-based tag was defined are not detected bylocation-based tagging rules unless the user opens or copies the original file from its networklocation. Registered documents classification rules detect all files in the defined folders.

• If the same confidential content exists in several documents, you need to categorize it onlyonce using a registered document repository. when you use location-based tagging youhave to identify every network share where the confidential content is located, and tag eachone.

Using registered document repositoriesRegistered document repositories are indexed periodically using ePolicy Orchestrator ServerTasks. The indexing process creates a package (reg_docs9000_x.zip) that is added to the ePolicyOrchestrator repository and deployed to the managed computers.

A new type of rule in a new category, the Registered Documents Classification Rule, has beencreated for protecting files in registered document folders. The classification rule associates aspecified content category with the files in the registered document repository. The separationof definitions, groups, and categories increases modularity, and allows the creation of newclassification rules, or modification of existing ones, without the need to re-index and re-deploy.

When you have defined a registered documents classification rule, add the associated categoriesto a protection rule that accepts content categories.

When an index, a registered documents classification rule, and a protection rule specifying thecategory have been deployed to a managed computer, all content leaving the managed computeris checked against all registered document fingerprints, and the content is blocked or monitoredaccording to the protection rule.

NOTE: Whitelisted content is removed from the registered document repository database.Registered document classification rules apply only to content in the repository that is notwhitelisted.

Text pattern definitionsTagging rules and content classification rules use text patterns to classify data according tospecific words or patterns. They can identify known strings, such as “Company Classified” or“Internal Use Only,” or regular expressions (Regex), which allow complex pattern matching,such as in social security numbers or credit card numbers.

Text patterns can include a validator — an algorithm used to test regular expressions. Use ofthe proper validator can significantly reduce false positives.

Classifying ContentText pattern definitions

McAfee Host Data Loss Prevention 9.130

Page 31: Hdlp 910 Product Guide

Text patterns can be marked as sensitive. Sensitive patterns are encrypted when displayed inhit highlighted evidence.

If multiple text patterns are used for matching similar content, text pattern groups can be usedto associate multiple patterns to a single group. This simplifies the creation of content categoriesif you defined many text patterns.

NOTE: If both an included pattern and an excluded pattern are specified, the excluded patternhas priority. This allows you to specify a general rule and add exceptions to it without rewritingthe general rule.

WhitelistThe whitelist is a shared folder containing files that agents reference when tagging or categorizingdata. The files define text that is ignored by the Data Loss Prevention tracking mechanism. Thisallows users to distribute standard content that would otherwise be tagged or categorized andrestricted by the system.

A typical use for the whitelist is to define text that is often added to documents, such as adisclaimer, license and trademark attributions, or copyright notes.

To use the whitelist, a file share must be created with read-only access by the Windows groupdomain computers. See the Installation Guide for instructions. The file share must be definedin the agent configuration options.

NOTE: Each file in the whitelist folder must contain at least 400 characters for it to be ignoredby the system.

If a file contains both tagged or categorized data and whitelisted data, it is not ignored by thesystem. However, all relevant tags and content categories associated with the content remainin effect.

Some files in the whitelist folder might not be added to the policy distribution because ofconfiguration. These files are listed in the Warning tab when running the Policy Analyzer.

Creating a new dictionaryUse this task to create a new dictionary. Dictionary definitions can be used to define ContentClassification rules.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Content Based Definitions, selectDictionaries. The available dictionaries appear in the main panel.

2 In the Dictionaries window, right-click and select AddNew | Dictionary. A new Dictionaryicon appears.

3 Name the new dictionary and double-click the icon.

4 Type a description (optional). Click Add to create a new text box. Type the new word orphrase in the text box.

5 To change the default weight, select the text and edit.

6 Repeat steps 4 and 5 as necessary.

Classifying ContentWhitelist

31McAfee Host Data Loss Prevention 9.1

Page 32: Hdlp 910 Product Guide

7 To import entries from another document click Import Entries. A text window opens thatallows you to copy and paste entries. To copy and paste multiple entries, set up a sourcedocument with one entry per line, lines separated by a single carriage return. The textwindow is limited to 10,000 lines of 50 characters per line.

8 Default behavior is for a term to be counted only once, no matter how many times it appearsin the document. To have each appearance of a term contribute to the total score, selectthe Count multiple entries checkbox.

Classifying data with registered documentrepositories

Use these tasks to classify data with registered document repositories.

Tasks

Creating a new registered document repository definition

Creating a registered document repository group

Indexing registered documents repositories

Deploying a registered document package to the agents

Creating a new registered document repository definitionUse this task to create a registered document repository definition. Registered documentrepositories are used to defined Registered Documents Classification rules.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Content Based Definitions, selectRegistered Documents Repositories. The available registered documents appear inthe main panel.

2 In the Registered Documents Repositories window, right-click and select Add New| Registered Document Repository. A new Registered Documents Repository iconappears.

3 Name the new registered document repository and double-click the icon.

4 Add a description (optional).

5 Type the UNC path to the folder you are defining, or click Browse to locate the folder.

6 Type a user name to access the folder, and a password if required.

7 Specify document extensions to include or exclude (optional). You can Add a new extension,or Edit an existing one, if required.

8 Specify the maximum file size (optional) and click OK.

Creating a registered document repository groupUse this task to create a registered document repository group. Registered document repositorygroups can be used to defined Registered Documents Classification rules.

Classifying ContentClassifying data with registered document repositories

McAfee Host Data Loss Prevention 9.132

Page 33: Hdlp 910 Product Guide

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Content Based Definitions, selectRegistered Documents Repositories. The available registered documents repositoriesand groups appear in the main panel.

2 In the Registered Documents Repositories window, right-click and select Add New| Registered Document Repository Group. The new Registered Document RepositoryGroup icon appears.

3 Double-click the icon. The edit window appears.

4 Name the new registered document group.

5 Type a description (optional).

6 Select the registered document definitions from the available list.

7 Click OK.

Indexing registered documents repositoriesUse this task to schedule indexing of registered document repositories in ePolicy Orchestrator.

Before you begin

Create a registered documents repository definition, then create and enable a registereddocuments classification rule and a protection rule using the content category specified in theclassification rule. Apply the policy to ePolicy Orchestrator.

Task

For option definitions, click ? in the interface.

1 From the ePolicy Orchestrator Menu, select Server Tasks.

2 Click New Task.

3 In the Server Task Builder, name the new task and click Next.

4 On the Actions page, select DLP Register Documents Scanner from the pull-downmenu. Click Next to schedule the scan, review your task, and click Save.

5 The task now appears in the Server Tasks list. Select it and click Run to run the scanimmediately.

Deploying a registered document package to the agentsUse this task to deploy a registered document package when working in ePolicy Orchestrator.

Before you begin

The registered document package must be indexed in ePolicy Orchestrator.

Task

1 In ePolicy Orchestrator click System Tree.

2 In the System Tree, select the level at which to deploy the registered document package.

TIP: Leaving the level at MyOrganization deploys to all workstations managed by ePolicyOrchestrator.

Classifying ContentClassifying data with registered document repositories

33McAfee Host Data Loss Prevention 9.1

Page 34: Hdlp 910 Product Guide

If you select a level under My Organization, the right-hand pane displays the availableworkstations. You can also deploy the registered document package to individualworkstations.

3 Click the Client Tasks tab. Under Actions click New Task. The Client Task Builder wizardopens.

4 In the Name field, type a suitable name, for example, Deploy registered document package.

5 In the Type field, select Product Deployment. Click Next.

6 In the Products and Components field, select DLP Registered Documents 9.1.0.0.Leave the Action on Install.

7 Click Next.

8 Select a suitable Schedule type and set the Options, date, and Schedule parameters.Click Next.

9 Review the task summary. When you are satisfied that it is correct, click Save.

Classifying data with text patternsUse these tasks to classify data with text patterns.

Tasks

Creating a new text pattern

Testing a text pattern

Creating a new text pattern group

Creating a new text patternUse this task to create a text pattern definition. Text patterns can be used to define ContentClassification rules.

NOTE: Many, but not all, text patterns are defined using regular expressions (regex). A discussionof regex is beyond the scope of this document. There are a number of regex tutorials on theinternet where you can learn more about this subject.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Content Based Definitions, selectText Patterns. The available text patterns appear in the main panel.

2 In the Text Patterns window, right-click and select Add New |Text Pattern. A newtext patterns icon appears.

Classifying ContentClassifying data with text patterns

McAfee Host Data Loss Prevention 9.134

Page 35: Hdlp 910 Product Guide

3 Name the new text pattern and double-click the icon.

Figure 4: Text Pattern dialog box

4 Add a description (optional).

5 Under Included Patterns, do the following:

a Select the pattern recognition method (All or Any patterns).

b Click Add to define the new pattern, then type the text string.

c Select Is Regex if the string is a regular expression.

d If you select Is Regex, select an appropriate validator (optional). The default is NoValidation.

e Under Threshold, type the number of times the pattern must be found in the data forit to be considered a match. For example, finding one credit card in an email may beacceptable, but adding a threshold of 5 requires five or more matches of the credit cardpattern.

6 Under Excluded Patterns, do the following:

a Click Add to add an exclusion pattern, then type the text strings that, when found, areignored by the system.

b Select Is Regex if the string is a regular expression.

c If you select Is Regex, select an appropriate validator (optional). The default is NoValidation.

d Under Threshold, add the number of times the pattern must be found to be considereda match.

Classifying ContentClassifying data with text patterns

35McAfee Host Data Loss Prevention 9.1

Page 36: Hdlp 910 Product Guide

e Click OK.

Testing a text patternUse this task to test a text pattern before submitting the pattern to ePolicy Orchestrator.

Before you begin

Create a new text pattern definition, or add a new item to an existing definition. You do nothave to save the definition before testing.

Task

For option definitions, press the F1 key.

1In the text pattern definition, click the Edit button ( ) of the item to be tested. Thetest dialog box appears with the search text or regular expression in the Pattern: textbox.

2 If applicable, select the Regular expression checkbox and select a validation methodfrom the pull-down list.

3 Type some test patterns in the Test text box and click Check. The matches and validatedmatches are displayed.

Figure 5: Testing a credit card pattern

NOTE: If you make any changes or additions to the text in the Test box, you must clickCheck again to retest.

4 If results are unacceptable, modify the text pattern and retest. When you click OK the textpattern in the definition is modified to match the last pattern you tested.

Classifying ContentClassifying data with text patterns

McAfee Host Data Loss Prevention 9.136

Page 37: Hdlp 910 Product Guide

Creating a new text pattern groupUse this task to create a text pattern group definition.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Content Based Definitions, selectText Pattern. The available text patterns and groups appear in the main panel.

2 In the Text Patterns window, right-click and select Add New | Text Pattern Group.The new Text Pattern Group icon appears.

3 Double-click the icon. The edit window appears.

4 Name the new text pattern group.

5 Type a description (optional).

6 Select the text patterns from the available list.

7 Click OK.

Adding and removing whitelist contentUse these tasks to add or remove content from the Whitelist folder.

Tasks

Adding new whitelist content

Deleting whitelist files

Adding new whitelist contentUse this task to add content to the Whitelist folder.

Task

For option definitions, click ? in the interface.

1 Create a file containing only the text you want to add to the whitelist, and copy it to theWhitelist folder.

2 In the Host DLP Policy console navigation pane under Definitions, select Whitelist. Theavailable whitelist files appear in the main panel.

3 Right-click in the Whitelist window and click Refresh. The window is updated with thelatest list of files.

Deleting whitelist filesUse this task to remove content from the Whitelist folder.

Task

1 In the Host DLP Policy console navigation pane under Definitions, select Whitelist. Theavailable whitelist files appear in the main panel.

Classifying ContentAdding and removing whitelist content

37McAfee Host Data Loss Prevention 9.1

Page 38: Hdlp 910 Product Guide

2 Select the file to remove from the Whitelist folder, right-click, and select Delete.

3 Click Yes to confirm the deletion.

4 Click OK.

Classifying ContentAdding and removing whitelist content

McAfee Host Data Loss Prevention 9.138

Page 39: Hdlp 910 Product Guide

Tracking ContentMcAfee Host Data Loss Prevention software tracks and controls sensitive information using twosimilar mechanisms: tags and content categories. Tagging rules associate files and data withthe appropriate tags. Classification rules associate files and data with content categories. Inboth cases, the sensitive information is labeled, and the label stays with the content even if itis copied into another document or saved to a different format.

Contents

How tags and content categories are used to classify content

How tagging rules link tags to content

How classification rules link categories to content

Creating tags, categories, catalogs, and groups

Creating and defining tagging rules

Creating and defining classification rules

Creating manual tags

How tags and content categories are used to classifycontent

Tags give you a method for classifying content and reusing that classification. Tagging rulesassign tags to content from specific applications or locations. Once assigned, the tag stays withthe content as it is moved or copied, or included in or attached to other files or file types.

Content categories

Content categories, known as content tags in earlier versions of McAfee Host Data LossPrevention, are another way of classifying content. Content categories are used with classificationrules to classify content and registered document groups. They can also be specified directlyin most protection rules.

NOTE: In McAfee Device Control only content categories are available, not tags.

To protect data, follow this high-level process:

1 Classify the information that needs to be protected.

2 Create tags or content categories for each classification of data.

3 Create tagging rules and classification rules that associate sensitive data with the appropriatetags and content categories.

4 Define protection rules incorporating the tags and content categories that block, monitor,or encrypt the sensitive data when users send it to portable devices or specified networklocations.

39McAfee Host Data Loss Prevention 9.1

Page 40: Hdlp 910 Product Guide

Category catalogs

Category catalogs are sets of content categories and associated predefined classification rulesthat can be used as an out-of-the-box building block for policies. When you select a contentcategory from a catalog, it automatically adds both the content category and the relatedclassification rules to the policy. If you have already created a category with that name, onlythe rules are added.

How tagging rules link tags to contentTagging rules associate files and data with the appropriate tags.

Tags

Tag definitions are created in the Tags and Categories definition panel. Tags can be groupedto simplify rule making. A tag definition consists of a suitable name, an optional description,and a Globally Unique Identifier (GUID) assigned by the system.

Tagging rules

Simple application-based tagging rules monitor or block all files created by the application orapplications designated in an application definition. Simple location-based tagging rules monitoror block all files in the specified location. Adding conditions to a simple rule restricts it by addinga logical AND.

File types and extensions are predefined in the system and cannot be modified by theadministrator. Adding a specific file type or extension to an application-based or location-basedtagging rule attaches a tag only on files created by a specific application or in a specific location,AND with the selected file type or extension.

Using the text pattern or dictionary restriction in application-based or location-based taggingrules attaches tags only to files in a specific location, or created by a specific application, ANDcontaining the specific pattern or dictionary threshold. This option allows you to combine featuresof content categories with tagging. Multiple text patterns or dictionaries can be selected, specifiedas ANY of the following or ALL of the following. For the Microsoft Word file type, you can alsospecify where in the document (header/body/footer) the specified content is found.

Once a tag is attached to a file, the tag stays with the content, even when that content is copiedto a file of different type or location.

A specific tag can be used by more than one tagging rule. For example, an application-basedtagging rule can attach a tag called “Finance” to specific file types, irrespective of location. Alocation-based tagging rule can attach the same “Finance” tag to files in a specific location,irrespective of file type.

How classification rules link categories to contentClassification rules associate files and data with the appropriate content categories.

Content categories

Content category definitions are created in the Tags and Categories definition panel. Categoriescan be grouped to simplify rule making. A content category definition consists of a suitablename, an optional description, and a Globally Unique Identifier (GUID) assigned by the system.

Tracking ContentHow tagging rules link tags to content

McAfee Host Data Loss Prevention 9.140

Page 41: Hdlp 910 Product Guide

Content classification rules

Content classification rules associate specified text pattern and dictionary definitions with contentcategories. When those categories are added to protection rules, content containing the specifiedtext is monitored or blocked. Rules can contain any combination of text patterns and dictionaries.For Microsoft Word files, you can also specify where in the document (header/body/footer) thespecified content is found.

Registered documents classification rules

Registered documents classification rules associate all content matching a specified registereddocuments repository definition to a content category. As with content classification rules, whencategories are added to protection rules, content containing the specified text is monitored orblocked.

Creating tags, categories, catalogs, and groupsUse these tasks to create tags, content categories, and tag and category groups, which arethen attached to files with tagging or classification rules. Or create content catalogs, which adda content category and the related classification rule simultaneously. Consider the distinctionsyou need to make between different types of content, and make a tag or content category foreach type.

Tasks

Creating a tag

Creating a content category

Using category catalogs

Creating a tag and category group

Creating a tagUse this task to create a general purpose tag or a content-based tag.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Tags andCategories. The available tags, content categories, and groups appear in the main panel.

2 In the Tags and Categories window, right-click and select Add New | Tag. The newtag icon appears with the name selected.

3 Type a name, then double-click the icon.

4 Add a description (optional).

5 Click OK.

NOTE: You can also create a new tag while creating a tagging or protection rule.

Tracking ContentCreating tags, categories, catalogs, and groups

41McAfee Host Data Loss Prevention 9.1

Page 42: Hdlp 910 Product Guide

Creating a content categoryUse this task to create content categories.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Tags andCategories. The available tags, content categories, and groups appear in the main panel.

2 In the Tags and Categories window, right-click and select Add New | ContentCategory. The new content category icon appears with the name selected.

3 Type a name, then double-click the icon.

4 Add a description (optional).

5 Click OK.

NOTE: You can also create a new content category while creating a classification orprotection rule.

Using category catalogsCategory catalogs are sets of content categories and associated predefined classification rules.Once a category catalog is imported into the policy, the classification rules can be used as is ormodified as required. If a content category with the same name already exists, only theclassification rules are imported.

Use this task to import a category catalog.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Tags andCategories. The available tags, content categories, and groups appear in the main panel.

2 In the Tags and Categories window, right-click and select Import Categories. After afew seconds, the Category Catalog window opens.

3 Select the categories you want to import, then click OK. The categories and relatedclassification rules are imported.

Creating a tag and category groupUse this task to create a tag and category group. Tag and category groups are used to placemultiple tags and content categories on files more efficiently.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Tags andCategories. The available tags, content categories, and groups appear in the main panel.

2 In the Tags and Categories window, right-click and select Add New | Tag and CategoryGroup. The new tag and category group icon appears.

3 Name the new group and double-click the icon. The edit window appears.

Tracking ContentCreating tags, categories, catalogs, and groups

McAfee Host Data Loss Prevention 9.142

Page 43: Hdlp 910 Product Guide

4 Add a description (optional).

5 Select the tags and content categories for the group.

6 Click OK.

NOTE: When using a tag group in protection rules, all tags in the selected group must beavailable in the specific content for the protection rule to be triggered.

Creating and defining tagging rulesCreating tagging rules is a three step process. A tagging rule must first be created, then defined,then enabled before it can be used.

Use these tasks to create and define tagging rules.

Tasks

Creating and defining an application-based tagging rule

Creating and defining a location-based tagging rule

Creating and defining an application-based tagging ruleUse this task to associate a tag with an application.

Connect multiple text patterns and dictionaries with either logical AND or logical OR.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Tagging Rules. The availabletagging rules appear in the main panel.

2 In the Tagging Rules pane, right-click and select Add New | Application Based TaggingRule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

ActionStep

Select an application definition or definitions from the available list. You can include or excludedefinitions. Click Add item to create a new application definition. Click Next.

1 of 7

Select the Select from list option, then select file types from the available list. Use theOther File Types option to select unlisted (unknown) file types. Click Next.

2 of 7 (optional)

Select the Select from list option, then select file extensions from the available list. ClickNext.

3 of 7 (optional)

Select one of the text pattern options, ANY (logical OR) or ALL (logical AND), then selectone or more text patterns or text pattern groups from the available list. Click Add item to

4 of 7 (optional)

create a new text pattern, or click Add group to create a new text pattern group. Click Editto modify an existing text pattern or group. Click Next.

Select one of the dictionary options, ANY (logical OR) or ALL (logical AND), then select oneor more dictionaries. Click Add to create a new dictionary or Edit to modify an existingdictionary. Click Next.

5 of 7 (optional)

Tracking ContentCreating and defining tagging rules

43McAfee Host Data Loss Prevention 9.1

Page 44: Hdlp 910 Product Guide

ActionStep

Select the part of the document where the text pattern or dictionary matching takes place.This option is intended to be used with Microsoft Word files.

6 of 7 (optional)

Select an available tag for this rule, or create a new one by clicking Add New. Click Finish.7 of 7

5 To activate the rule, right-click the protection rule icon and select Enable.

NOTE: When you create an application definition tagging rule with multiple applications,all included applications are added in one line of the rule with logical OR and all excludedapplications are added to a second line with logical OR. The two lines are a logical AND.For example:

...definition is 'Email Client Applications' OR 'Microsoft Office Applications' AND the definitionis not 'Media Burner Applications''

CAUTION: If you do not include at least one application definition, the rule applies to allapplications not specifically excluded.

Creating and defining a location-based tagging ruleUse this task to define a location-based tagging rule.

Connect multiple text patterns and dictionaries with either logical AND or logical OR.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Tagging Rules. The availabletagging rules appear in the main panel.

2 In the Tagging Rules pane, right-click and select Add New | Location Based TaggingRule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

ActionStep

Select one or more locations from the available list. If you select a Network File Server,a Configure Selection dialog box opens. Type a network location, or click Browse and locate

1 of 7

the server. Alternately, you can select Any Network File Severs. Click OK. When you havecompleted all selections, click Next.

Select the Select from list option, then select file types from the available list. Use theOther File Types option to select unlisted (unknown) file types. Click Next.

2 of 7 (optional)

Select the Select from list option, then select file extensions from the available list. ClickNext.

3 of 7 (optional)

Select one of the text pattern options, ANY (logical OR) or ALL (logical AND), then selectthe text patterns from the available list. Click Add item to create a new text pattern, or click

4 of 7 (optional)

Add group to create a new text pattern group. Click Edit to modify an existing text patternor group. Click Next.

Select one of the dictionary options, ANY (logical OR) or ALL (logical AND), then select oneor more dictionaries. Click Add to create a new dictionary or Edit to modify an existingdictionary. Click Next.

5 of 7 (optional)

Select the part of the document where the text pattern or dictionary matching takes place.This option is intended to be used with Microsoft Word files.

6 of 7 (optional)

Tracking ContentCreating and defining tagging rules

McAfee Host Data Loss Prevention 9.144

Page 45: Hdlp 910 Product Guide

ActionStep

Select an available tag for this rule, or create a new one by clicking Add New. Click Finish.7 of 7

5 To activate the rule, right-click the protection rule icon and select Enable.

Creating and defining classification rulesUse these tasks to create and define classification rules.

Tasks

Creating and defining a content classification rule

Creating and defining a registered documents classification rule

Creating and defining a content classification ruleContent classification rules link text patterns or dictionaries to content classifications. In previousversions of McAfee Host Data Loss Prevention, they were known as content-based taggingrules.

Connect multiple text patterns and dictionaries with either logical AND or logical OR.

Use this task to define a content classification rule.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Classification Rules. Theavailable classification rules appear in the main panel.

2 In the Classification Rules pane, right-click and select Add New | Content ClassificationRule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

ActionStep

Select one of the text pattern options, ANY (logical OR) or ALL (logical AND), then select oneor more text patterns or text pattern groups from the available list. Click Add item to create a

1 of 4

new text pattern, or click Add group to create a new text pattern group. Click Edit to modifyan existing text pattern or group. Click Next.

Select one of the dictionary options, ANY (logical OR) or ALL (logical AND), then select one ormore dictionaries from the available list. Click Add to create a new dictionary or Edit to modifyan existing dictionary. Click Next.

2 of 4

Select the part of the document where the text pattern or dictionary matching takes place. Thisoption is primarily intended to be used with Microsoft Word files, but applies to any file type thathas a header / footer.

3 of 4(optional)

Select a content category, or create a new one by clicking Add New. Click Finish.4 of 4

5 To activate the rule, right-click the classification rule icon and select Enable.

Tracking ContentCreating and defining classification rules

45McAfee Host Data Loss Prevention 9.1

Page 46: Hdlp 910 Product Guide

Creating and defining a registered documents classification ruleUse this task to create a new registered documents classification rule.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Classification Rules. Theavailable classification rules appear in the main panel.

2 In the Classification Rules pane, right-click and select Add New | Registered DocumentsClassification Rule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

ActionStep

Select one or more registered documents repository definitions or groups from the availablelist. Click Add item to create a new registered documents repository definition, or AddGroup to create a new registered documents repository group. Click Next.

1 of 2

Select a content category, or create a new one by clicking Add New. Click Finish.2 of 2

5 To activate the rule, right-click the classification rule icon and select Enable.

Creating manual tagsThe Manual Tagging option allows authorized users to add or remove tags from files withoutusing tagging rules. This option is accessed from the managed computer.

Manual tagging provides the ability to maintain your organization’s classification policy even inspecial cases of sensitive or unique information that is not being tagged by the systemautomatically.

Tags that are applied to files manually affect the transmission options of the content immediately,based on the relevant protection rules.

Use these tasks to work with manual tags.

Tasks

Tagging files manually

Removing manual tags from content

Tagging files manuallyUse this task to tag a file manually.

NOTE: A user must be authorized to use manual tagging. Permission for manual tagging isdefined in the Host DLP Policy console on the Agent Configuration | Edit Global AgentConfiguration | Security tab.

Task

1 On a managed computer, open Windows Explorer.

Tracking ContentCreating manual tags

McAfee Host Data Loss Prevention 9.146

Page 47: Hdlp 910 Product Guide

2 Right-click the file, then select Manual Tagging. The Manual Tags window with theavailable tags appears.

3 Select the tags that are appropriate for the file.

4 Click OK.

Removing manual tags from contentUse this task to remove tags that were created manually.

Task

1 On a managed computer, open Windows Explorer.

2 Right-click the file with tags you want to remove, and select Manual Tagging. The ManualTags window with all the assigned tags appears.

3 Select the tags that need to be removed from these files.

4 Click OK.

NOTE: When selecting multiple files with several assigned tags, only those tags assignedto all selected files are removed.

Tracking ContentCreating manual tags

47McAfee Host Data Loss Prevention 9.1

Page 48: Hdlp 910 Product Guide

Rights managementMcAfee Host Data Loss Prevention software version 9.1 supports both Adobe LiveCycle RightsManagement and Microsoft Windows Rights Management Services (RMS). For more informationon Adobe LiveCycle Rights Management, go to http://www.adobe.com/go/rm/. For moreinformation on Microsoft RMS, go tohttp://www.microsoft.com/windowsserver2003/technologIEs/rightsmgmt/default.mspx

Two use cases are currently supported:

• DLP Discovery can apply RM policies to files detected in discovery scans.

• Email, removable storage, file system, and web post protection rules can recognize RMprotected files. These files can be included or excluded from the rule.

Adobe RM

McAfee Host Data Loss Prevention supports Adobe LiveCycle Rights Management ES2 and theExtension for Microsoft Office. You can apply RM protection to:

• PDF documents

• Microsoft Word 2003/2007 documents

• Microsoft Excel 2003/2007 documents

• Microsoft PowerPoint 2003/2007 documents

Microsoft Windows RMS

McAfee Host Data Loss Prevention supports RMS on Windows Server 2003 and Active DirectoryRMS (AD-RMS) on Windows Server 2008. You can apply Windows RMS protection to:

• Microsoft Word 2003/2007 documents

• Microsoft Excel 2003/2007 documents

• Microsoft PowerPoint 2003/2007 documents

• SharePoint 2007 documents

• Exchange Server 2007 documents

Contents

Adobe rights management users

How Data Loss Prevention works with Rights Management

Defining an Adobe RM server and synchronizing policies

Defining a Microsoft RMS server and synchronizing templates

McAfee Host Data Loss Prevention 9.148

Page 49: Hdlp 910 Product Guide

Adobe rights management usersMcAfee Host Data Loss Prevention requires two types of Adobe RM users. These users arenamed in the Rights Management Server definition. Before they can be used in McAfee HostData Loss Prevention, they must be created, and their roles defined, in the Settings | UserManagement section of the Adobe LiveCycle Rights Management ES2 server. In all cases,McAfee Host Data Loss Prevention users must be on the Document Publisher list for the DLPPolicy Set and must have the role of Services User. These are set on the RM server by theAdobe LiveCycle Rights Management administrator.

• DLP Policy User — Logs into the Adobe server and synchronizes policies.

• DLP Agent User — Applies RM policies to files on the client computer. There are two waysto set up this user:

• Using Windows authentication — The user must have Kerberos credentials (ServicePrincipal Name – SPN) defined on the Adobe LiveCycle server. See the Adobe LiveCycleHelp for details.

• Using Adobe LiveCycle authentication — The user must be on the Document Publisherlistfor the DLP Policy Set and must have the role of Services User.

How Data Loss Prevention works with RightsManagement

Rights Management in McAfee Host Data Loss Prevention is managed from the RM andEncryption section of the navigation pane. In this section, you define the Rights Managementserver and manage the Rights Management policies used by discovery rules and email, removablestorage, and web post protection rules.

When you select the Apply RM Policy action in a discovery rule, you must specify the RMserver and policy as properties.

Adobe RM workflow

When the Host DLP Agent applying the discovery rule finds a file to protect, it sends the file tothe RM server. The protection is applied according to the selected policy and the file is sentback to the client computer. If the operation fails on the RM server side (because you cannotconnect to the server for any reason) the file is monitored and an event (RM Failed) is sent tothe DLP Monitor. If the operation fails on the Host DLP Agent side (for example, you try to

Rights managementAdobe rights management users

49McAfee Host Data Loss Prevention 9.1

Page 50: Hdlp 910 Product Guide

protect an unsupported file type) the file is monitored, but no error event appears in the DLPMonitor.

NOTE: You must enable the Apply RM Policy Failed event in Agent Configuraton | Eventsand Logging for the event to be logged.

Figure 6: Adobe RM protection flow diagram

McAfee recommends creating a Policy Set on the Adobe LiveCycle Rights Management serverexclusively for policies used with McAfee Host Data Loss Prevention. At least one policy in thepolicy set must be enabled for the policy set to appear in the policy synchronization dialog box.If you disable a policy on the RM server, the policy is deleted from the RM policies page whenyou re-synchronize. If the disabled policy is used in a discovery rule, it is not deleted but becomesNot Active (with a different icon) and creates an error in the DLP Policy Analyzer.

If a policy is disabled on the RM server, but you do not re-synchronize, the policy remains active.When the Host DLP Agent attempts to apply the policy, an Administrative RM Protect Failedevent is sent to the DLP Monitor.

Limitations

McAfee Host Data Loss Prevention does not inspect RM protected files for content. When atagged file is RM protected, only static tags (location and application) are maintained. If a usermodifies the file, all tags are lost when the file is saved.

Rights managementHow Data Loss Prevention works with Rights Management

McAfee Host Data Loss Prevention 9.150

Page 51: Hdlp 910 Product Guide

Windows RMS workflow

When the Host DLP Agent applying the discovery rule finds a file to protect, it uses the templateGUID as a unique identifier to locate the template and apply protection.

Figure 7: Windows RMS protection flow diagram

With Windows RMS, McAfee Host Data Loss Prevention can inspect the content of protectedfiles if the current user has view permissions.

Defining an Adobe RM server and synchronizingpolicies

Use this task to set up an Adobe LiveCycle Rights Management server and import RM policies.

Before you begin

Set up users in the Adobe LiveCycle Rights Management server with appropriate roles andpermissions.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select RM and Encryption | Rights Management Servers.

2 In the Rights Management Servers pane, right-click and select Add New | AdobeLiveCycle Rights Management Server.

Rights managementDefining an Adobe RM server and synchronizing policies

51McAfee Host Data Loss Prevention 9.1

Page 52: Hdlp 910 Product Guide

3 Double-click the rule icon. The Adobe LiveCycle Rights Management Server dialog boxappears.

4 Enter the Adobe RM server URL path and Adobe RM user name and password, then testthe connection.McAfee recommends creating a single Policy Set for all DLP-related policies. The nameduser should be a Document Publisher for this policy set.

5 Enter the DLP Agent user credentials.

6 Select the Import RM Policies on OK checkbox to synchronize policies immediately, thenclick OK.If you don't select the checkbox, you can synchronize at any time from the context-sensitivemenu. You must synchronize policies to use RM policies in DLP discovery rules.

When you synchronize, the Adobe LiveCycle Rights Management Server dialog box appearslisting all policy sets available to the logged on user.

7 Select the policy sets to import. All enabled policies in the set are imported and can beviewed in the Rights Management Policies pane.

Defining a Microsoft RMS server and synchronizingtemplates

Use this task to set up a Microsoft RMS server and import templates.

Before you begin

Set up users in the server with appropriate roles and permissions.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select RM and Encryption | Rights Management Servers.

2 In the Rights Management Servers pane, right-click and select Add New | MicrosoftRMS Server.

3 Double-click the rule icon. The Microsoft RMS Server dialog box appears.

4 Click Edit to set up the RMS template source. You can retreive templates from either anetwork share or a web service. Enter the path and password, if required. Click OK.

5 Enter the URL of the RMS server, or select Using Auto service discovery to find theserver.

6 Enter a User ID to specify a specific user, or select the Use end point logged in useroption.

7 Select the Import RMS Templates on OK checkbox to synchronize policies immediately,then click OK.If you don't select the checkbox, you can synchronize at any time from the context-sensitivemenu. You must synchronize policies to use RMS templates in Host DLP discovery rules.

CAUTION: There is an option in the RMS template settings to allow trusted browsers, suchas Rights Management Update for Internet Explorer, to view the content of RMS protecteddocuments. This option is NOT supported the the Host DLP Agent. If such a template isapplied by a Host DLP discovery rule, the protected files cannot be viewed by trustedbrowsers.

Rights managementDefining a Microsoft RMS server and synchronizing templates

McAfee Host Data Loss Prevention 9.152

Page 53: Hdlp 910 Product Guide

8 Select Rights Management Policies in the navigation pane to view the importedtemplates.

Rights managementDefining a Microsoft RMS server and synchronizing templates

53McAfee Host Data Loss Prevention 9.1

Page 54: Hdlp 910 Product Guide

Locating Files With Sensitive ContentThis section describes different ways to locate and define the files that contain sensitive data.Data-at-rest is the term used to describe actual locations ("where is it in the network?" "whichfolder is it in?"). DLP Discovery finds your data-at-rest.

You can also define content by file extension, or by which application created it. This is knownas data-in-use. These definitions provide granularity to help you protect only those files thatneed to be protected.

Contents

How scanning works

Applications and how to use them

File extension definitions

File server list

Network definitions

How scanning worksDLP Discovery is a crawler that runs on client computers. When it finds predefined content, itcan monitor, quarantine, encrypt, or delete the files.

NOTE: To use DLP Discovery, you must activate the discovery module on the Miscellaneous tabof the Agent Configuration dialog box.

When can you search?

You can run a host scan at a specific time daily, or on specified days of the week or month.You can specify start and stop dates, or run a scan when the Host DLP Agent configuration isenforced. You can suspend a scan when the computer's CPU or RAM exceed a specified limit.

McAfee Host Data Loss Prevention 9.154

Page 55: Hdlp 910 Product Guide

If you change the discovery policy while a host scan is running, rules and schedule parameterswill change immediately. Changes to which parameters are enabled or disabled will take effectwith the next scan. If the computer is restarted while a scan is running, the scan continueswhere it left off.

What content can be discovered?

There are two ways to define sensitive content.

• Using tags or content categories. Categories match specific text patterns, dictionaries, orregistered documents repositories to the files. Tags define files in specified locations orproduced with specified applications.

• Using file context. You can specify file types, file extensions, document properties, encryptiontype, and user assignment in the discovery rule.

NOTE: In earlier versions of McAfee Host Data Loss Prevention, file context was optional. InVersion 9.1, document properties can be specified in place of tags or content categories. Thus,if no tag or category is defined, a document property is required. Tagging is now, optionally, aresult of a discovery scan.

What happens to discovered files with sensitive content?

For host discovery scans, you can apply RM protection, encrypt, monitor, quarantine, or tagthe files. RM protection, encryption, and quarantine are mutually exclusive. Monitoring andtagging can be added to other actions. When you monitor, you can also choose to store evidence.

For host scans, you need a release key to release files from quarantine. The user generates achallenge key, sends it to the administrator, and the administrator issues an Agent QuarantineRelease Key.

Using the discovery crawlerUse these tasks to set up and run the discovery crawler. There are three steps to running thediscovery crawler. They can be done in any order.

• Create and define a discovery rule.

• Set up the scan parameters.

• Set the scheduling.

Tasks

Creating and defining a discovery rule

Setting up a discovery scan

Scheduling a discovery scan

Creating and defining a discovery ruleDiscovery rules define the content the discovery crawler searches for, and what to do whenthis content is found. Changes to a discovery rule take effect as soon as the policy is deployed.Even if a scan is in progress, the new rule takes effect immediately.

Use this task to create and define a discovery rule.

You can specify a document property instead of a tag or content category. Either is valid. Anew action allows matched files to be tagged. Tagging is additive to other selected actions.

Locating Files With Sensitive ContentHow scanning works

55McAfee Host Data Loss Prevention 9.1

Page 56: Hdlp 910 Product Guide

Task

For option definitions, press the F1 key.

1 From the navigation pane select Content Protection | Discovery Rules. The availablediscovery rules appear in the main panel.

2 In the Discovery Rules pane, right-click and select Add New | Discovery Rule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

ActionStep

Select the Select from list option, then select file types from the available list. Use theOther File Types option to select unlisted (unknown) file types. Click Next.

1 of 7 (optional)

Select the Select from list option, then select file extensions from the available list. ClickNext.

2 of 7 (optional)

Select tags, content categories, and groups to be included or excluded from the rule. ClickAdd item to create a new tag or content category. Click Add group to create a new tagand content category group. Click Next.

3 of 7(required*)

Select an existing document property definition or group by selecting one of the checkboxesto indicate whether the definition is included or excluded. Click Add item to create a newdocument property definition, or Add group to create a new group. Click Next.

4 of 7(required*)

Select the Select from list option, then select an encryption type.5 of 7 (optional)

Select actions from the available list.6 of 7

• Apply RM Policy: Click Select RM Policy to select a RM Policy and the server whereit is located.

• Encrypt: Click Select an Encryption key to select an encryption key or add a newkey.

• Monitor: Click Severity to modify the value.

• Tag: Click Select a tag. The tag you use must be pre-defined. There is no option foradding a tag.

NOTE: Apply RM Policy, Quarantine, and Encrypt are mutually exclusive actions: selectingone deselects the others. Other actions are additive.

If you select Apply RM Policy and the specified RM policy cannot be applied, the contentis monitored. If you select Encrypt and McAfee Endpoint Encryption is not installed, thecontent is quarantined.

If you select the Support discovery delete option in Tools | Options, the Delete actionappears, and can be used instead of Encrypt or Quarantine. McAfee does not recommendactivating the discovery delete option.

Click Next.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.7 of 7 (optional)

5 To activate the rule, right-click the discovery rule icon and select Enable.

Setting up a discovery scanUse this task to set up a discovery scan. The discovery scan is setup on the AgentConfiguration | Discovery settings dialog box. Changes in discovery setting parameterstake effect on the next scan. They are not applied to scans already in progress.

Task

For option definitions, press the F1 key.

Locating Files With Sensitive ContentHow scanning works

McAfee Host Data Loss Prevention 9.156

Page 57: Hdlp 910 Product Guide

1 Set the performance parameters. Use the pause controls to minimize the impact of thescan on system performance. The options are:

• Suspend scan when the system's CPU is above (%)

• Suspend scan when the system's used RAM is above (%)

• Do not scan files larger than (MB) Most files of interest are small. Skipping largefiles can significantly shorten the scan time.

2 Set the notification details. When the Quarantine action is selected in a discovery rule,discovery removes files with sensitive content to the quarantine folder. If no notificationsare set, users might wonder why their files disappeared. The notification feature replacesfiles with stand-in files with the same name containing the notification text. If the discoveryrule is set to encrypt files, no notification is needed because the files remain in place.To get files out of quarantine, users must request a quarantine release key from theadministrator. This works in a similar manner to the agent override key. To unlock encryptedfiles, users must have the encryption key specified in the discovery rule.

NOTE: If you select the Encrypt action and McAfee Endpoint Encryption is not installed,the files are quarantined. If you select the Apply RM policy action and the RM provideris not available, the files are monitored.

3 Select the folders to scan and the folders to skip. Click the icon ( ) in the Folders section.Use Windows Explorer to browse to a folder, then cut and paste the address into the Enterfolder text box. Use the plus icon to the add the folder to the scan list. You can removefolders with the minus icon.

NOTE: If you don't specify any folders for either scan or skip, all folders on the computerare scanned. The only folder that is skipped by default is C:\Windows. The following filetypes will always be skipped, no matter which folder they are in:

• The specific files ntldr, boot.ini, and .cekey

• Executable files (*.com, *.exe, *.sys)

Scheduling a discovery scanUse this task to schedule a discovery scan. The discovery scan scheduler is in the AgentConfiguration | Discovery Settings dialog box

Task

For option definitions, press the F1 key.

1 On the Discovery Settings tab of the Agent Configuration menu, click the File system scanschedule icon ( ). A popup appears.

2 Set the time of day for the scan to start using the thumbwheel.

3 Set the scanning frequency using the option buttons and checkboxes.

4 If you want to run a discovery scan immediately, select Run now.

5 If you want to prevent runs being missed due to the user being logged off, select Resumediscovery missed runs after login.

6 Set the start and end dates for discovery scans.

Locating Files With Sensitive ContentHow scanning works

57McAfee Host Data Loss Prevention 9.1

Page 58: Hdlp 910 Product Guide

How to restore quarantined filesWhen the discovery crawler finds sensitive content it moves the affected files into a quarantinefolder, replacing them with placeholders that notify users that their files have been quarantined.The quarantined files are also encrypted to prevent unauthorized use.

Use this task to remove files from quarantine.

Task

1 Open the quarantine folder. Click the Host DLP Agent icon and select Open QuarantineFolder.

2 Select the files to be restored. Right-click and select Manual Decryption. TheChallenge/Response popup appears.

NOTE: The Manual Decryption context-sensitive menu item only appears when selectingfiles of type *.dlpenc (DLP encrypted).

3 Copy the challenge ID code from the popup and send it to the DLP administrator.

4 The administrator takes the challenge code, enters it into the Tools | Generate AgentQuarantine Release Key dialog box, and generates a response code, which is sent tothe user. (This also sends an event to the DLP monitor recording all of the details.)

5 The user enters the response code in the Challenge/Response popup and clicks OK. Thedecrypted files are restored to their original location.

NOTE: If the path has been changed or deleted, the original path is restored. If a file withthe same name exists in the location, the file is restored as xxx-copy.abc

Applications and how to use themImporting an applications list and creating application definitions are efficient ways of handlingall application related tagging and protection rules. System administrators can import a list ofall relevant applications available within the enterprise, create different application definitionsbased on their needs, and implement these definitions with relevant rules to maintain policies.

• Enterprise Applications List — A comprehensive list of applications used by the enterprise.You can scan for new applications and merge them with the existing list, modify the list,and group by any column.

• Application Definitions — The details that define templates you use to customize rulesabout specific applications. You can add applications to application definitions from theEnterprise Applications List, or create them directly. Tagging rules and protection rules alwaysrefer to application definitions rather than individual applications.

The Enterprise Application ListThe Enterprise Applications List is a comprehensive list of the applications whose data you wantto control. Application-based tagging rules and most protection rules reference applicationdefinitions. For example, to control the data in Excel files, add Excel to the Enterprise ApplicationsList, then create a rule that defines whether Excel files or their contents can be printed orcopied.

Locating Files With Sensitive ContentApplications and how to use them

McAfee Host Data Loss Prevention 9.158

Page 59: Hdlp 910 Product Guide

The information in the first five columns of the Enterprise Applications List is read from eachapplication file’s property list. In cases where the property has no value listed, it is displayedas unknown.

Applications must be defined in the Enterprise Applications List before they can be referencedin a rule. If applications you want to control do not appear on the list, you must add them.

Adding and removing applicationsUse these tasks to add or remove applications from the Enterprise Applications List.

Tasks

Importing an application manually

Importing new applications by scanning

Removing applications from the list

Importing an application manuallyUse this task to add an application manually to the Enterprise Applications List.

Task

1 In the Enterprise Applications List window, right-click and select Add. The AddExecutable window appears

2 Click Browse and select the application EXE file.

3 Select an application and click Open. The application details appear.

4 Click Add to import the application to the list.

NOTE: You can also add an application by selecting the executable, then dragging anddropping it into the Enterprise Applications List window.

Importing new applications by scanningUse this task to add groups of applications to the Enterprise Applications List from specific drivesor folders. You must use the Merge option to do this.

Task

1 In the Enterprise Applications List window, right-click and select Scan Applications.The Scan for Applications window appears.

2Click the Start button and select the drives and folders to scan for applications. Allavailable applications appear.

3 Select the required action from the list:

•The Clear icon discards the current list.

•The Merge icon adds the applications to the Enterprise Applications List.

4 Close the Scan for Applications window. The merged applications appear in the EnterpriseApplications List.

Locating Files With Sensitive ContentApplications and how to use them

59McAfee Host Data Loss Prevention 9.1

Page 60: Hdlp 910 Product Guide

Removing applications from the listUse this task to remove items from the Enterprise Applications List.

Task

1 In the Host DLP Policy console navigation pane under Applications, select EnterpriseApplications List. The available applications appear in the main panel.

2 Right-click the application’s main executable (EXE) file, and select Remove.

3 Click Yes to confirm the deletion. The entire application is removed, that is, the executableand all associated files.

NOTE: You cannot remove an application if it is included in an application definition.Right-click and select Application Definitions | Go To to see if the application is includedin any definitions before removing.

Application definitions and how they are categorizedApplication definitions replace the application groups used in previous versions of McAfee HostData Loss Prevention. Because they are defined in a similar manner to device definitions, theyare more intuitive, granular, scalable, and configurable. They also reduce policy size by usinga different data model.

A new subcategory, web application definitions, creates a URL-based template. Files, screenshots, or clipboards saved from a browser can now be tagged and blocked based on URL.

Application definitions can be identified by any of the following parameters:

• Command line — Allows command line arguments, for example: java-jar, that can controlpreviously uncontrollable applications.

• Executable file hash — The application display name, with an identifying SHA1 hash.

• Executable file name — Normally the same as the display name (minus the SHA1 hash), butcould be different if the file is renamed.

• Original executable name — Identical to the executable file name, unless the file has beenrenamed.

• Product name — The generic name of the product, for example Microsoft Office 2003, iflisted in the executable file's properties.

• Vendor name — The company name, if listed in the executable file's properties.

• Window title — A dynamic value that changes at run-time to include the active filename.

• Working directory — The directory where the executable is located. One use of this parameteris to control U3 applications.

With the exception of the SHA1 application name and working directory, all parameters acceptsub-string matches.

As a result of this new data model, application strategy is now defined in the applicationdefinitions, not in the Enterprise Applications List. One result of this is that the same applicationcan be included in several application definitions and can therefore be assigned more than onestrategy. The Host DLP Agent resolves potential conflicts according to the following hierarchy:archiver > trusted > explorer > editor, that is, editor has the lowest ranking. If an applicationis an editor in one definition and anything else in another, the Host DLP Agent does not treatthe application as an editor.

Locating Files With Sensitive ContentApplications and how to use them

McAfee Host Data Loss Prevention 9.160

Page 61: Hdlp 910 Product Guide

Creating application definitionsUse these tasks to create application definitions.

Tasks

Creating an application definition

Creating an application definition from the Enterprise Applications List

Creating a web application definition

Creating an application definitionUse this task to create an application definition directly. You can also create an applicationdefinition from the Enterprise Application List. Application definitions have replaced the applicationgroups used in earlier versions of McAfee Host Data Loss Prevention.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select ApplicationDefinitions. The available definitions appear in the main panel.

2 In the Application Definitions window, right-click and select Add New | ApplicationDefinition. A new application definition icon appears.

3 Name the new application definition and double-click the icon. The edit window appears.

4 Type a description (optional).

5 Select parameters. As you select each parameter, its edit window appears.

6 Click Add New, and type a value and optional description. Some parameters allow partialmatching. Select the option if you want to use it.

NOTE: If you select partial matching, the typed in value is matched as a substring.

7 Click Add New to add more values. When you have finished, click OK to close the parameteredit window.

8 When you are finished adding parameters, click OK to save the edited definition.

9 By default, all new application definitions are created with the Editor strategy. To changethe strategy, right-click the definition name and select Process Strategy.

CAUTION: Because the strategy affects the system’s observation level, it can strongly affectsystem performance.

Creating an application definition from the Enterprise Applications ListUse this task to create an application definition from the Enterprise Applications List.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Applications, select EnterpriseApplications List. The available applications list appears in the main panel.

2 Right-click an application and select Create Application Definition. The edit windowappears with several parameters selected, based on the information available. You can

Locating Files With Sensitive ContentApplications and how to use them

61McAfee Host Data Loss Prevention 9.1

Page 62: Hdlp 910 Product Guide

modify the definition now or after creating it. You can also add multiple applications to adefinition. Select them, using the usual Shift-click and Ctrl-click selection rules, beforeright-clicking.

NOTE: If application definitions that include the selected application already exist, the GoTo option is enabled. Clicking a Go To option opens Application Definitions in the mainpanel and selects the application.

3 Type a description (optional).

4 Click OK. In the Host DLP Policy console navigation pane under Definitions, selectApplication Definitions to view the new definition.

5 By default, all new application definitions are created with the Editor strategy. To changethe strategy, right-click the definition name and select Process Strategy.

CAUTION: Because the strategy affects the system’s observation level, it can strongly affectsystem performance.

Creating a web application definitionUse this task to create a web application definition. Web application definitions are used tocreate tagging and protection rules for files saved from browsers, based on the browsed URL.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select ApplicationDefinitions. The available definitions appear in the main panel.

2 In the Application Definitions window, right-click and select Add New | WebApplication Definition. A new web application definition icon appears.

3 Name the new web application definition and double-click the icon. The edit window appears.The window contains one parameter: Browser URL.

4 Type a description (optional).

5 Select the Browser URL parameter to open its edit window.

6 Click Add New, and type a value and optional description. Select partial matching if youwant the typed value to be used as a substring.

7 Click Add New to add more URL values. When you are finished, click OK to close theparameter edit window.

8 Click OK to save the edited definition.

File extension definitionsFile extension definitions restrict tagging rules and protection rules to particular file types. Alist of default file extensions is available in the software, and you can manually add file extensionsas needed for your environment.

Creating file extensions and file extension groupsUse these tasks to create file extensions or file extension groups.

Locating Files With Sensitive ContentFile extension definitions

McAfee Host Data Loss Prevention 9.162

Page 63: Hdlp 910 Product Guide

Tasks

Creating file extensions

Creating file extension groups

Creating file extensionsUse this task to create a file extension definition.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select File Extensions.The available file extensions appear in the main panel.

2 In the File Extensions window, right-click and select Add New |File Extension. Thenew File Extension icon appears.

3 Double-click the icon. The edit window appears.

4 Type the name of the new file extension entry and double-click the icon. The edit windowappears.

5 In the Extension text box, type the extension preceded with a period, for example .GIF.

6 Type a description for the file extension (optional).

7 Click OK.

Creating file extension groupsUse this task to create a file extension group definition.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select File Extensions.The available file extension groups appear in the main panel.

2 Click Add New | File Extension Group either on the Host DLP Policy console toolbar,or after right-clicking in the File Extensions window. The new File Extension Group iconappears.

3 Double-click the icon. The edit window appears.

4 Type the name of the file extension group.

5 Add a description for this group (optional).

6 Select the file extensions from the available list.

7 Click OK.

File server listThe file server list is created by an LDAP query or network scan. Define the network serversthat are used in location-based tagging rules. If a server doesn’t contain a file share used fora location-based tagging rule, you don’t need to include it in this list.

Locating Files With Sensitive ContentFile server list

63McAfee Host Data Loss Prevention 9.1

Page 64: Hdlp 910 Product Guide

Creating and adding to a file server listUse these tasks to create a file server list, or to add servers to the list.

Tasks

Creating a file server list

Adding a single server to a list

Creating a file server listUse this task to create a file server list.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select File Servers.The available file servers appear in the main panel.

2 In the File Servers window, right-click and select Scan for these scanning options:

• All Network Servers - By Organizational Units — Select the organizational unit tosearch and click OK.

• All Network Servers - By Net View — Find all available file servers on the localnetwork.

• Network Servers By LDAP Selection — Select the file servers and click OK.

Adding a single server to a listUse this task to add a file server to the file server list.

Task

1 In the Host DLP Policy console navigation pane under Definitions, select File Servers.The available file servers appear in the main panel.

2 In the File Servers window, right-click and select Add New | Server. The new Servericon appears.

3 Type the server name.

Network definitionsNetwork definitions serve as filter criteria in network-related protection rules.

• The Network Port Range allows you to use network port ranges to enforce the network-relatedrules to a specific service.

• The Network Address Range monitors network connections between an external source anda managed computer.

• The Network Address Ranges Group allows you to use multiple network ranges fornetwork-related rules.

Locating Files With Sensitive ContentNetwork definitions

McAfee Host Data Loss Prevention 9.164

Page 65: Hdlp 910 Product Guide

Creating network definitionsUse these tasks to add a network port range, network address range, or network address rangegroup.

Tasks

Creating a network address range

Creating a network address range group

Create a new network port range

Creating a network address rangeUse this task to add a network address range definition.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Network. Theavailable network address ranges appear in the main panel.

2 in the Network window, right-click and select Add New | Network Address Range.The new Network Address Range icon appears.

3 Double-click the icon. The edit window appears.

4 Type the name of the network address range.

5 Type a description (optional).

6 Type the IP range using one of these methods:

• Define using address range

• Define using a network mask

• Define using CIDR notation7 Click OK.

Creating a network address range groupUse this task to add a network address range group definition.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Network. Theavailable network address range groups appear in the main panel.

2 In the Network window, right-click and select Add New | Network Address RangeGroup. The new Network Address Range Group icon appears.

3 Double-click the icon. The edit window appears.

4 Type the name of the network address group.

5 Type a description (optional).

6 Select the network address ranges from the available list.

7 Click OK.

Locating Files With Sensitive ContentNetwork definitions

65McAfee Host Data Loss Prevention 9.1

Page 66: Hdlp 910 Product Guide

Create a new network port rangeUse this task to create a network port range definition.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Network. Theavailable network port ranges appear in the main panel.

2 In the Network window, right-click and select Add New | Network Port Range. Thenew Network Port Range icon appears.

3 Double-click the icon. The edit window appears.

4 Type the name of the network port range.

5 Type a description (optional).

6 Type the port range (single port, multiple ports, range.).

7 Select the protocol type (UDP, TCP or both).

8 Click OK.

Locating Files With Sensitive ContentNetwork definitions

McAfee Host Data Loss Prevention 9.166

Page 67: Hdlp 910 Product Guide

File DestinationsIn addition to classifying content by its originating location, you can classify, and control, wherecontent is being sent. In data loss prevention parlance, this is known as data-in-motion. In thefollowing section, the destinations you can control, and the creation of definitions to exercisethat control, are described.

Contents

Email destination definitions

Printers

Web destination definitions

Creating email destinations and groups

Creating a printer list and adding printers

Creating web destinations and groups

Email destination definitionsEmail destination objects are predefined email domains or specific email addresses that can bereferenced in email protection rules. The email protection rule can block tagged data from beingemailed to specific domains, or can prevent tagged data from being emailed to undefineddomains. Typically, the email destinations section defines any internal domains and externaldomains where emailing tagged data is allowed.

Email destination groups allow protection rules to reference a single entity that defines multipledestinations. A typical use of this feature is to create an email destination group for all internaldomains.

PrintersPrinter definitions are used to define printing protection rules. Printing protection rules are usedto manage both local and network printers and either block or monitor the printing of confidentialmaterial.

There are two types of printer definitions: network printers and unmanaged (whitelisted) printers.Network printers can be added manually by creating a definition that specifies the UNC pathto the printer, or automatically from a printer list. The printer list is created by an LDAP queryor network scan. Printers from the scan list are then selected to add them to the printerdefinitions.

Whitelisted printers are printers that cannot work with the proxy driver architecture requiredfor Data Loss Prevention management. To prevent operational problems, these printers are

67McAfee Host Data Loss Prevention 9.1

Page 68: Hdlp 910 Product Guide

defined as unmanaged. Unmanaged printer definitions are created manually using printer modelinformation from the operating system printer properties.

For reporting purposes, there is a third category of printer. When a printer is connected to amanaged computer and the DLP Agent fails to install its printer driver, it is reported asunsupported. After investigation of the reason for the failure, these printers are placed on thewhitelist if no other solution is found.

Web destination definitionsWeb destination objects are predefined web addresses that can be referenced in web postprotection rules. You can use web destination definitions to block tagged data from being postedto defined web destinations (websites or specific pages in a website), or use them to preventtagged data from being posted to websites that are not defined. Typically, the web destinationssection defines any internal websites as well as external websites where posting tagged datais allowed.

If you have defined numerous web destinations, you can create web destination groups so thatprotection rules can reference a single entity. A typical use of this feature is to create a webdestination group for all internal websites.

Creating email destinations and groupsUse these tasks to create email destinations and groups.

Tasks

Creating email destinations

Creating an email group

Creating email destinationsUse this task to create an email destination definition.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select EmailDestinations. The available email destinations and groups appear in the main panel.

2 In the Email Destinations window, right-click and select Add New | Email destination.A new Email Destination icon appears.

3 Double-click the icon. The edit window appears.

4 Add the email destination name: under Email address, type the domain name and clickAdd.

File DestinationsWeb destination definitions

McAfee Host Data Loss Prevention 9.168

Page 69: Hdlp 910 Product Guide

To create an email destination of external domains, Add a domain entry for everyinternal domain, then deselect all domains and select Other email domain.

Figure 8: Email destination edit dialog box

• To add a specific email address from this domain, right-click the domain name, selectAdd | Email User, then type the user name and click OK.

• To exclude a particular email address from the domain, add the user to the domain,right-click the domain name and select Add | Other email user, then deselect theuser.

5 Click OK.

Creating an email groupUse this task to create an email group.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select EmailDestinations. The available email destinations and groups appear in the main panel.

2 In the Email Destinations window, right-click and select Add New | Email Group. Anew Email Group icon appears.

3 Double-click the icon. The edit window appears.

4 Type the name of the email group.

5 Type a description (optional).

6 Select the email destination definitions from the available list.

7 Click OK.

File DestinationsCreating email destinations and groups

69McAfee Host Data Loss Prevention 9.1

Page 70: Hdlp 910 Product Guide

Creating a printer list and adding printersPrinter lists are used to manage sensitive content sent to printers. Use these tasks to create aprinter list and add printers to it.

Tasks

Creating a printer list

Adding a printer

Adding an unmanaged printer

Adding an existing printer to the printer whitelist

Creating a printer listUse this task to create a printer list.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Printers. Theavailable printers appear in the main panel.

2 In the Printers window, right-click, select Scan and select a scanning option:

• Network Printers By Organizational Units

• Network Printers By LDAP Selection

• Scan Shared Printers3 Edit the search parameters (optional), add a filter (optional) and click Search. A list of

printers appears in the view window.

TIP: After editing parameters or adding a filter, you can rerun the search by clickingRefresh.

4 Select the printers to add to the printer list and click OK.

Adding a printerUse this task to add a printer to a printer list.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Printers. Theprinters that have already been added appear in the main panel.

2 In the Printers window, right-click and select Add New | Network Printer. The newNetwork Printer icon appears.

3 Double-click the Network Printer icon. The edit window appears.

4 Type the name of the network printer.

5 Type the UNC path of the network printer.

6 Click OK.

File DestinationsCreating a printer list and adding printers

McAfee Host Data Loss Prevention 9.170

Page 71: Hdlp 910 Product Guide

Adding an unmanaged printerSome printers stop responding when the Host DLP Agent assigns them a proxy driver. Theseprinters cannot be managed, and must be exempted from printer rules to avoid problems. Inother cases, you might choose to exempt a printer, such as one belonging to a top executive,from printer rules. In either case, you define these printers as unmanaged, placing them onthe printer whitelist.

Use this task to add an unmanaged printer to the printer list.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Printers. Theprinters that have already been added appear in the main panel.

2 In the Printers window, right-click and select Add New | Unmanaged Printer Model.Type a name into the text box.

3 Double-click the icon. The edit window appears.

4 Type the printer model. You can cut and paste the information using the Model: informationfrom the printer properties:

a From the Microsoft Windows Start menu, select Printers and Faxes.

b Right-click the printer you are whitelisting and select Properties.

c On the General tab, copy the Model: information (below the Comment text box).

Figure 9: Copying the printer model information

5 Paste the model information into the Model text box in the Unmanaged Printer Modeldialog box.

6 Add a definition (optional).

File DestinationsCreating a printer list and adding printers

71McAfee Host Data Loss Prevention 9.1

Page 72: Hdlp 910 Product Guide

7 Click OK.

Adding an existing printer to the printer whitelistUse this task to add a printer to the printer whitelist.

When an existing network printer malfunctions, you can add it to the printer whitelist temporarilyuntil the problem is clarified. In this procedure, the printer remains on the network printer listbut is also whitelisted, preventing printer protection rules from being applied to it. When theproblem is resolved, the definition is removed.

Use this task to add an existing network printer to the printer whitelist.

Task

For option definitions, press the F1 key.

• Right-click an existing network printer definition and click Add as Unmanaged Printer.The printer appears in the Unmanaged Printer Model section of the Printers panel.

Creating web destinations and groupsUse these tasks to create web destinations and web destination groups.

Tasks

Creating a web destination

Creating a web destination group

Creating a web destinationUse this task to create a web destination definition.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Web Servers.The available web servers appear in the main panel.

2 In the Web Servers window, right-click and select Add New |Web Server. A new WebServer icon appears.

3 Double-click the icon. The edit window appears.

4 In the text box at the bottom of the window, type the web server URL and click Add toadd a web server address.

5 To add a resource path, right-click the web server address and select Add | ResourcePath. Type the path and click OK.

6 Type a description (optional).

7 Click OK.

File DestinationsCreating web destinations and groups

McAfee Host Data Loss Prevention 9.172

Page 73: Hdlp 910 Product Guide

Creating a web destination groupUse this task to create a web destination group definition.

Task

For option definitions, press the F1 key.

1 In the Host DLP Policy console navigation pane under Definitions, select Web Servers.The available web servers groups appear in the main panel.

2 In the Web Servers window, right-click and select Add New | Web Server Group. Anew Web Server Group icon appears.

3 Double-click the icon. The edit window appears.

4 Type the name of the web server group.

5 Type a description (optional).

6 Select the web servers from the available list.

7 Click OK.

File DestinationsCreating web destinations and groups

73McAfee Host Data Loss Prevention 9.1

Page 74: Hdlp 910 Product Guide

Assignment GroupsDevice and protection rules are applied equally for every computer and user receiving a policy,unless otherwise specified in the rule. However, when required, rules can be applied to particularusers, groups, Active Directory organizational units, or computers. This flexibility allowsadministrators to apply rules that are appropriate for a user’s job function. Individuals orcomputers that should not access sensitive data can have restrictive rule sets, while a manager’srule set can be much less restrictive. When protection rules are created, they can be appliedto a specific user or group by using the assignment group, or to computers by using ePolicyOrchestrator deployment.

Contents

User assignment

Computer assignment groups

Creating user assignment groups

User assignmentUser assignment groups define groups of users to be included or excluded from rules.

The Privileged Users setting can be used to override blocking or monitoring rules for certainusers. There are two strategies available for privileged users: Monitor only and Override all.You create the list in a similar manner to creating the user assignment groups — by scanningthe user list and selecting names.

In addition, you can include or exclude users from the rule the group is assigned to, or addlocal users to a user assignment group.

Excluded users are similar to privileged users, in that they are exempt from particular rules.The difference is that the excluded user is defined in the assignment group, so only that onegroup need be assigned to a rule. On the other hand, you can’t monitor that user if the groupis being blocked. The option to use excluded users or privileged users gives the administratorconsiderable flexibility in how rules are applied.

Local users are defined as users logged on remotely who have local authentication. In earlierversions of McAfee Host Data Loss Prevention software there was no way to define them as auser category, or to apply specific rules to them.

Computer assignment groupsComputer assignment groups is a feature of ePolicy Orchestrator. It is being described herebecause of the effect on McAfee Host Data Loss Prevention rules.

McAfee Host Data Loss Prevention 9.174

Page 75: Hdlp 910 Product Guide

Computer assignment groups specify which computers are assigned which policies. You canuse this feature to apply different policies to groups of computers in your network. When acomputer group is assigned specific policies, those policies are enforced on the named computers,and user assignment groups in McAfee Host Data Loss Prevention rules are lost.

Assigning policies with computer assignment groups

The computer assignment group feature allows you to choose which McAfee Host Data LossPrevention rules you want to assign to a particular group of computers.

Figure 10: Assigning rules with ePO computer assignment groups

If, for example, you have assigned Marketing computers to a group, and then select an emailprotection rule and a web post protection rule in the computer assignment group definition,those DLP rules will be applied to all users in the Marketing computer group, and not accordingto any User Assignment Groups defined in the DLP protection rule. Any rules not included inthe computer assignment group (for example, a removable storage protection rule) will beapplied according to the User Assignment Group definition in the rule.

Creating user assignment groupsUse these tasks to work with user assignment groups.

Tasks

Creating a user assignment group

Creating a privileged users group

Creating a user assignment groupUse this task to create a user assignment group.

Task

For option definitions, press F1.

Assignment GroupsCreating user assignment groups

75McAfee Host Data Loss Prevention 9.1

Page 76: Hdlp 910 Product Guide

1 In the Host DLP Policy console navigation pane under Policy Assignment, select UserAssignment Groups. The available assignment groups appear in the main panel.

2 In the User Assignment Groups panel, right-click and select Add New | UserAssignment Group. The new User Assignment Group icon appears.

3 Name the new User Assignment Group entry and double-click the icon. The edit windowappears with the Policy Assignment tab displayed.

4 Click Add to select the objects for this group (domains, organizational units, groups, andusers). A search window appears.

5 Select the Object Types to search for, then type in a filter and click Search to find usersand groups.

6 Select the users and groups to be added to the assignment group, and click OK.

7 Users and groups are included by default. To exclude any of them from the rules the groupis assigned to, make the appropriate selection.

Figure 11: Including and excluding users

8 To add local users to the group, click Add Local Users.

9 If you created rules to assign the group to, click the Protection Rules tab to select theprotection rules for this assignment group. When you have finished making selections, clickOK.

NOTE: The order doesn’t matter. You can create rules first and assign them to a group inthis step, or create groups first and assign them to rules when you create the rules.

Creating a privileged users groupUse this task to create a user assignment group with special permissions.

Task

For option definitions, press the F1 key.

Assignment GroupsCreating user assignment groups

McAfee Host Data Loss Prevention 9.176

Page 77: Hdlp 910 Product Guide

1 In the Host DLP Policy console navigation pane under Policy Assignment, selectPrivileged Users. The available groups appear in the main panel.

2 In the Privileged Users panel, right-click, and select Scan users and groups. A searchwindow opens.

3 Select the Object Types to search for, then type in a filter and click Search to fine usersand groups.

4 Select the users and groups to be added to the privileged users group, and click OK. Thenew Privileged Users icon appears in the window.

5 The default strategy for privileged users is Override All. To change this, right-click thegroup icon and click Set Strategy | Monitor Only.

Assignment GroupsCreating user assignment groups

77McAfee Host Data Loss Prevention 9.1

Page 78: Hdlp 910 Product Guide

Protection RulesProtection rules control the flow of data by defining the action taken when an attempt is madeto transfer or transmit sensitive data. They do this by linking actions with definitions, tags andcontent categories, and user assignment groups.

You can define protection rules to include or exclude specific tags, file extensions, or documentproperties. You can also specify file types, users, and encryption (including password protection).(Not all options are available for all rules.) These options allow creation of rules with considerablegranularity.

Contents

How protection rules work

Defining a protection rule

Removing rules, definitions, device classes, or user groups

How templates work

Synchronizing templates

How protection rules workProtection rules define the action taken when an attempt is made to transfer or transmit taggeddata. The protection rule specifies the transfer method, named tag(s), and how the systemshould react to the event. Each event is given a severity level, and options for responding tothe event. In some cases, protection rules merely log the event. In other cases, the protectionrules may prevent the transfer of data and notify the user of the violation. Protection rules areoptionally applied to assignment groups. This allows a rule to apply only to particular usergroups.

McAfee Host Data Loss Prevention 9.178

Page 79: Hdlp 910 Product Guide

Actions/Rules matrix

Figure 12: Rules and their actions

Definitions and how they define rulesDefinitions are the fundamental building blocks used to create rules. You create a definition foreach category you want to control. For example, you can have a McAfee email destination anda Microsoft email destination, or Marketing printers and Finance printers. When you modify adefinition, the modification is automatically propagated to all rules that use the definition.

Definitions let you customize the system to enforce your enterprise security policy and otherrequirements, such as compliance issues and privacy laws. Customizing these definitions createsan efficient method of maintaining company policies.

Definitions can be assigned to any new or existing rule. Changes take effect immediately uponredeploying the system policy to the agents.

Definitions are created in a two-step process: first you create the definition (right-click, selectAdd New), then you define it (double-click the newly created definition.) These two stepsshould always be done together. Leaving a definition empty (undefined) will, in most cases,generate an error when you try to apply the policy to ePolicy Orchestrator. At the very least, itwill generate a warning.

Table 2: Definitions and the tagging and protection rules that use themAssociated protection rulesAssociated tagging/classification

rulesDefinition

Application File Access, Clipboard, File System,Network Communication, Printing, RemovableStorage, Screen Capture

Application-based taggingApplication

NAContent classificationDictionary

EmailNAEmail Destination

Application File Access Protection, EmailProtection, File System Protection, Network

Application-based, Location- basedFile Extension

Protection RulesHow protection rules work

79McAfee Host Data Loss Prevention 9.1

Page 80: Hdlp 910 Product Guide

Associated protection rulesAssociated tagging/classificationrules

Definition

Communication Protection, Removable StorageProtection, Web Post Protection

NANAFile Server

Network Communication ProtectionNANetwork

Printing ProtectionNAPrinter

NARegistered document classificationRegistered documentrepository

all Protection RulesApplication-based tagging,Location-based tagging, Content

Tag/Content Category

classification, Registered documentclassification

NAContent classification, Application-basedtagging, Location-based tagging

Text Pattern

Web Post ProtectionNAWeb Destination

NANAWhitelist

Defining a protection ruleUse these tasks to define protection rules.

CAUTION: If you are also working with McAfee Endpoint Encryption, be aware that includingMcAfee Host Data Loss Prevention processes on a McAfee Endpoint Encryption Blocked Processeslist will prevent protection rules with encryption definitions from triggering, and might causethe Host DLP Agent to malfunction.

Tasks

Creating and defining an application file access protection rule

Creating and defining a clipboard protection rule

Creating and defining an email protection rule

Creating and defining a file system protection rule

Creating and defining a network communication protection rule

Creating and defining a PDF/Image Writer protection rule

Creating and defining a printing protection rule

Creating and defining a removable storage protection rule

Creating and defining a screen capture protection rule

Creating and defining a web post protection rule

Creating and defining an application file access protection ruleProtection rules for application file access monitor or block files based on the application orapplications that created them. By selecting different combinations of application definitionsand file extensions, you have considerable granularity in deciding which files are blocked.

Use this task to define an application file access protection rule.

Protection RulesDefining a protection rule

McAfee Host Data Loss Prevention 9.180

Page 81: Hdlp 910 Product Guide

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Protection Rules. The availableprotection rules appear in the main panel.

2 In the Protection Rules pane, right-click and select Add New | Application File AccessProtection Rule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

You can include or exclude tags and file extensions as well as application definitions.

ActionStep

Select an application definition or definitions from the available list. You can include or excludedefinitions. Click Add item to create a new application definition. Click Next.

1 of 6

Select available tags to be included or excluded from the rule. You must include at least onetag in order to use the exclude tag option. Click Add item to create a new tag. Click Next.

2 of 6

Select the Select from list option, then select file extensions from the available list. ClickNext.

3 of 6 (optional)

Select a document properties definition or definition group from the available list. You caninclude or exclude definitions. Click Add item to create a new document properties definitionor Add group to create a new document properties group. Click Next.

4 of 6 (optional)

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. The only options for application file access rules areMonitor and Notify User. If you select Monitor, click Severity to modify the value.

5 of 6

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.6 0f 6 (optional)

5 To activate the rule, right-click the protection rule icon and select Enable.

Creating and defining a clipboard protection ruleClipboard protection rules monitor or block use of the clipboard. To protect clipboards largerthan 1 MB, select the Protect clipboard of any size option on the Advanced Configurationtab of the Agent Configuration dialog box.

Use this task to define a clipboard protection rule.

NOTE: Trusted processes are not part of the clipboard rule logic. Applications with a Trustedstrategy are not exempt from being blocked by clipboard rules.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Protection Rules. The availableprotection rules appear in the main panel.

2 In the Protection Rules pane, right-click and select Add New | Clipboard ProtectionRule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

You can include or exclude tags as well as application definitions.

Protection RulesDefining a protection rule

81McAfee Host Data Loss Prevention 9.1

Page 82: Hdlp 910 Product Guide

ActionStep

Select an application definition or definitions from the available list. You can include or excludedefinitions. Click Add item to create a new application definition. Click Next.

1 of 5 (optional)

Type the title of a specific application window and click Add. Repeat as required. Click Next.2 of 5 (optional)

Select tags, content categories, and groups to be included or excluded from the rule. Youmust include at least one tag, content category, or group in order to use the exclude option.

3 of 5 (optional)

Click Add item to create a new tag or content category. Click Add group to create a newtag and content category group. Click Next.

Select an action from the available list. For clipboard protection rules, Block is the only action,and Online / Offline the only option. Click Next.

4 of 5

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.5 of 5 (optional)

5 To activate the rule, right-click the protection rule icon and select Enable.

Creating and defining an email protection ruleEmail protection rules monitor or block email sent to specific destinations or users.

To activate Lotus Notes support, select the Lotus Notes Handler on the Miscellaneous tab ofthe Agent Configuration dialog box. McAfee recommends disabling unused handlers.

NOTE: In systems where both Microsoft Exchange and Lotus Notes are available, email ruleswill not work if the outgoing mail server (SMPT) name is not configured for both.

Use this task to define an email protection rule.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Protection Rules. The availableprotection rules appear in the main panel.

2 In the Protection Rules pane, right-click and select Add New | Email Protection Rule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

ActionStep

Select Select from list option, and select one or more email destination definitions. ClickAdd item to create a new email destination definition, or Add group to create a newdestination group. Click Next.

1 of 9 (optional)

Select tags, content categories, and groups to be included or excluded from the rule. Youmust include at least one tag in order to use the exclude tag option. Click Add item to create

2 of 9 (optional)

a new tag or content category. Click Add group to create a new tag and content categorygroup. Click Next.

Select the Select from list option, then select file types from the available list. Use theOther File Types option to select unlisted (unknown) file types. Click Next.

3 of 9 (optional)

Select the Select from list option, then select file extensions from the available list. ClickNext. You can include or exclude file extensions.

4 of 9 (optional)

Select a document properties definition or definition group from the available list. You caninclude or exclude definitions. Click Add item to create a new document properties definitionor Add group to create a new document properties group. Click Next.

5 of 9 (optional)

Protection RulesDefining a protection rule

McAfee Host Data Loss Prevention 9.182

Page 83: Hdlp 910 Product Guide

ActionStep

To apply the rule to attachments of specific encryption types, select the Select from listoption, and select one or more attachment encryption types.

6 of 9 (optional)

Email bypass feature: To exclude an email based on subject, select Do not apply thisrule if the email subject contains this pattern and select a pattern.

NOTE: Text patterns must be pre-defined, and only one can be used per rule.

7 of 9

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. If you select Monitor, click Severity to modify the

8 of 9

value. If you select Notify User, click Change default alert to modify the alert message,URL, or link text. If you want Request Justification to block email when no justification isprovided, you must also select Block. Click Next.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.9 of 9 (optional)

5 To activate the rule, right-click the protection rule icon and select Enable.

Creating and defining a file system protection ruleFile system protection rules protect files on specific file servers or mass storage devices. Filescan be monitored, but not blocked. You can save evidence, and notify the user when files aremonitored. You can specify applications, file types, file extensions, or tags to limit to the rule.

Use this task to define a file system protection rule.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Protection Rules. The availableprotection rules appear in the main panel.

2 In the Protection Rules pane, right-click and select Add New | File System ProtectionRule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

You can include or exclude tags and file extensions as well as application definitions.

ActionStep

Select a destination or destinations where files are being sent. If you select File Servers,the Configure Selection window opens. Type a network path and click Add, or click Browseto select a new network destination, then Add to add it to the list. Click Next.

1 of 9

Select an application definition or definitions from the available list. You can include or excludedefinitions. Click Add item to create a new application definition. Click Next.

2 of 9 (optional)

Select tags, content categories, and groups to be included or excluded from the rule. Youmust include at least one tag, content category, or group in order to use the exclude option.

3 of 9 (optional)

Click Add item to create a new tag or content category. Click Add group to create a newtag and content category group. Click Next.

Select the Select from list option, then select file types from the available list. Use theOther File Types option to select unlisted (unknown) file types. Click Next.

4 of 9 (optional)

Select the Select from list option, then select file extensions from the available list. ClickNext.

5 of 9 (optional)

Protection RulesDefining a protection rule

83McAfee Host Data Loss Prevention 9.1

Page 84: Hdlp 910 Product Guide

ActionStep

Select a document properties definition or definition group from the available list. You caninclude or exclude definitions. Click Add item to create a new document properties definitionor Add group to create a new document properties group. Click Next.

6 of 9 (optional)

To apply the rule to files with specific encryption types, select the Select from list option,and select one or more encryption types.

7 of 8 (optional)

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. If you select Monitor, click Severity to modify the

8 of 9

value. If you want Request Justification to encrypt files when no justification is provided,you must also select Encrypt. Click Next.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.9 of 9 (optional)

5 To activate the rule, right-click the protection rule icon and select Enable.

Creating and defining a network communication protection ruleNetwork communication protection rules monitor or block incoming or outgoing data on yournetwork. You can limit the rule with specific applications or tags.

Use this task to define a network communication protection rule.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Protection Rules. The availableprotection rules appear in the main panel.

2 In the Protection Rules pane, right-click and select Add New |Network CommunicationProtection Rule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

NOTE: You can include or exclude tags as well as application definitions.

ActionStep

Select the Select from list option, then select one or more available network address ranges.You can protect or exclude range definitions. Click Add item to create a new network addressrange definition. Click Add group to create a new network address range group. Click Next.

1 of 7 (optional)

Select the Select from list option, then select one or more available network port ranges.You can protect or exclude range definitions. Click Add item to create a new network portrange definition. Click Add group to create a new network port range group. Click Next.

2 of 7 (optional)

Select the network connection direction. You can protect incoming or outgoing connectionsor both directions. Click Next.

3 of 7

Select an application definition or definitions from the available list. You can include or excludedefinitions. Click Add item to create a new application definition. Click Next.

4 of 7 (optional)

Select tags to be included or excluded from the rule. You must include at least one tag inorder to use the exclude tag option. Click Add item to create a new tag. Click Next.

5 of 7 (optional)

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. If you select Monitor, click Severity to modify the

6 of 7

value. If you select Notify User, click Change default alert to modify the alert message,URL, or link text. Click Next.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.7 of 7 (optional)

Protection RulesDefining a protection rule

McAfee Host Data Loss Prevention 9.184

Page 85: Hdlp 910 Product Guide

5 To activate the rule, right-click the protection rule icon and select Enable.

Creating and defining a PDF/Image Writer protection ruleMcAfee Host Data Loss Prevention software can block PDF and Image Writer print drivers thatprint to files.

Use this task to create and define a PDF/Image Writer protection rule.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Protection Rules. The availableprotection rules appear in the main panel.

2 In the Protection Rules pane, right-click and select Add New | PDF/Image WritersProtection Rule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

ActionStep

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. If you select Monitor, click Severity to modify the

1 of 2

value. If you select Notify User, click Change default alert to modify the alert message,URL, or link text. If you want Request Justification to block printing when no justificationis provided, you must also select Block. Click Next.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.2 of 2 (optional)

5 To activate the rule, right-click the protection rule icon and select Enable.

Creating and defining a printing protection rulePrinting protection rules monitor or block files from being printed. You can limit the rule tospecific applications or tags.

New Feature: Printer add-ins, enabled on the Agent Configuration | Miscellaneous tab,can improve printer performance when using certain common applications. The add-ins areonly installed when a printing protection rule is enabled on the client computer.

Use this task to create and define a printing protection rule.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Protection Rules. The availableprotection rules appear in the main panel.

2 In the Protection Rules pane, right-click and select Add New | Printing Protection Rule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

NOTE: You can include or exclude tags as well as application definitions.

Protection RulesDefining a protection rule

85McAfee Host Data Loss Prevention 9.1

Page 86: Hdlp 910 Product Guide

ActionStep

Select the Select from list option, then select an available network printer. Select Othernetwork printer to protect all network printers that have not been defined, including PDFand Image Writer printer drivers. Click Next.

1 of 6 (optional)

Select the Select from list option, then select Any local printer to protect printing fromlocal printers. Click Next.

NOTE: Only one of the first two steps can be optional. You must select a network printer,local printers, or both.

2 of 6 (optional)

Select an application definition or definitions from the available list. You can include or excludedefinitions. Click Add item to create a new application definition. Click Next.

3 of 6 (optional)

Select tags, content categories, and groups to be included or excluded from the rule. Youmust include at least one tag, content category, or group in order to use the exclude option.

4 of 6 (optional)

Click Add item to create a new tag or content category. Click Add group to create a newtag and content category group. Click Next.

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. If you select Monitor, click Severity to modify the

5 of 6

value. If you select Notify User, click Change default alert to modify the alert message,URL, or link text. If you want Request Justification to block printing when no justificationis provided, you must also select Block. Click Next.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.6 of 6 (optional)

5 To activate the rule, right-click the protection rule icon and select Enable.

Creating and defining a removable storage protection ruleRemovable storage protection rules monitor or block data from being written to removablestorage devices.

Use this task to define a removable storage protection rule.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Protection Rules. The availableprotection rules appear in the main panel.

2 In the Protection Rules pane, right-click and select Add New | Removable StorageProtection Rule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

You can include or exclude tags and file extensions as well as application definitions.

ActionStep

Select an application definition or definitions from the available list. You can include or excludedefinitions. Click Add item to create a new application definition. Click Next.

1 of 8 (optional)

Select tags, content categories, and groups to be included or excluded from the rule. Youmust include at least one tag, content category, or group in order to use the exclude option.

2 of 8 (optional)

Click Add item to create a new tag or content category. Click Add group to create a newtag and content category group. Click Next.

Select the Select from list option, then select file types from the available list. Use theOther File Types option to select unlisted (unknown) file types. Click Next.

3 of 8 (optional)

Protection RulesDefining a protection rule

McAfee Host Data Loss Prevention 9.186

Page 87: Hdlp 910 Product Guide

ActionStep

Select the Select from list option, then select file extensions from the available list. ClickNext.

4 of 8 (optional)

Select a document properties definition or definition group from the available list. You caninclude or exclude definitions. Click Add item to create a new document properties definitionor Add group to create a new document properties group. Click Next.

5 of 8 (optional)

To apply the rule to specific encryption types, select the Select from list option, and selectone or more encryption types.

6 of 8 (optional)

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. If you select Encrypt, click Select an Encryption key

7 of 8

to select an encryption key or add a new key. If you select Monitor, click Severity tomodify the value. If you select Notify User, click Change default alert to modify the alertmessage, URL, or link text. If you want Request Justification to block files when nojustification is provided, you must also select Block. If you want Request Justification toencrypt files when no justification is provided, you must also select Encrypt. Click Next.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.8 of 8 (optional)

5 To activate the rule, right-click the protection rule icon and select Enable.

Creating and defining a screen capture protection ruleUse this task to define a screen capture protection rule.

NOTE: Trusted processes are not part of the screen capture rule logic. Applications with aTrusted strategy are therefore not exempt from screen capture rules, and will be blocked likeany other applications.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Protection Rules. The availableprotection rules appear in the main panel.

2 In the Protection Rules pane, right-click and select AddNew| screen Capture ProtectionRule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

You can include or exclude tags as well as application definitions.

ActionStep

Select an application definition or definitions from the available list. You can include or excludedefinitions. Click Add item to create a new application definition. Click Next.

1 of 5 (optional)

Type the title of a specific application window and click Add. Repeat as required. Click Next.2 of 5

Select tags to be included or excluded from the rule. You must include at least one tag inorder to use the exclude tag option. Click Add item to create a new tag. Click Next.

3 of 5 (optional)

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. If you select Monitor, click Severity to modify the

4 of 5

value. If you select Notify User, click Change default alert to modify the alert message,URL, or link text. Click Next.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.5 of 5 (optional)

Protection RulesDefining a protection rule

87McAfee Host Data Loss Prevention 9.1

Page 88: Hdlp 910 Product Guide

5 To activate the rule, right-click the protection rule icon and select Enable.

Creating and defining a web post protection ruleWeb post protection rules monitor or block data from being posted to websites, includingweb-based email sites.

NOTE: The web post protection rule is supported only for Microsoft Internet Explorer 6 andlater. For other browsers, use network communication protection rules.

New Feature:Web post protection rules can now block or monitor content uploaded to websitesbased on AJAX or Flash technologies. This includes the following sites that could not be blockedin earlier versions:

• Microsoft Outlook Web Access

• Gmail

• Google Docs

• Yahoo

• Hotmail

NOTE: When a web post protection rule is enabled, web post file uploads continue in thebackground after the upload bar indicates that the upload is finished.

Use this task to define a web post protection rule.

Task

For option definitions, press the F1 key.

1 From the navigation pane, select Content Protection | Protection Rules. The availableprotection rules appear in the main panel.

2 In the Protection Rules pane, right-click and select Add New | Web Post ProtectionRule.

3 Rename the rule to something that will help you recognize its specific function.

4 Double-click the rule icon and follow these steps in the wizard:

You can include or exclude tags and file extensions.

ActionStep

Select the Select from list option, then select an available web destination or web destinationgroup for this rule. Click Add item to create a new web destination definition. Click Addgroup to create a new web destination group. Click Next.

NOTE: Not defining any specific web destinations will block all outgoing HTTP content.

1 of 8(optional)

Select tags, content categories, and groups to be included or excluded from the rule. Youmust include at least one tag, content category, or group in order to use the exclude option.

2 of 8 (optional)

Click Add item to create a new tag or content category. Click Add group to create a newtag and content category group. Click Next.

Select the Select from list option, then select file types from the available list. Use theOther File Types option to select unlisted (unknown) file types. Click Next.

3 of 8 (optional)

Select the Select from list option, then select file extensions from the available list. ClickNext.

4 of 8 (optional)

Select a document properties definition or definition group from the available list. You caninclude or exclude definitions. Click Add item to create a new document properties definitionor Add group to create a new document properties group. Click Next.

5 of 8 (optional)

Protection RulesDefining a protection rule

McAfee Host Data Loss Prevention 9.188

Page 89: Hdlp 910 Product Guide

ActionStep

To apply the rule to specific encryption types, select the Select from list option, and selectone or more encryption types.

6 of 8 (optional)

Select actions from the available list. By default, selecting an action selects both Online andOffline. Deselect either as required. If you select Monitor, click Severity to modify the

7 of 8

value. If you select Notify User, click Change default alert to modify the alert message,URL, or link text. If you want Request Justification to block web posts when no justificationis provided, you must also select Block. Click Next.

Select an assignment group or groups, or define a new group by clicking Add. Click Finish.8 of 8 (optional)

5 To activate the rule, right-click the protection rule icon and select Enable.

Removing rules, definitions, device classes, or usergroups

Use this task to remove rules, device classes. or any definition except whitelist content.

Before you begin

You cannot remove a definition or device class that is in use. Before removing, you must deselectit in all rules and groups that contain it. To remove tags, you must either remove the rules thatuse them, or remove the tags from the rules, before proceeding.

TIP: If you don't know if or where the item is in use, attempt to remove it. If the item is in use,a message identifies which rules or groups contain it.

Task

1 In the Host DLP Policy console navigation pane, select the category (for example, Networkdefinition) of the item you want to remove. The available items and groups appear in themain panel.

2 Select the item or group to remove, right-click and select Delete.

3 Click Yes to confirm the deletion.

How templates workTemplates are predefined system definitions such as application definitions or text patterns.Using the template synchronizer wizard, you can copy templates to an existing policy or createnew templates from definitions created for the current system policy. Policy definitions storedin the templates directory can be shared or used later.

NOTE: When distributing a template to create a Plug and Play device definition, make sure thatany device classes used in definitions are included in the system’s defaults. If you use a deviceclass that is not in the system default, the definition is removed with a notification message.

Synchronizing templatesUse this task to synchronize templates with the current policy.

Protection RulesRemoving rules, definitions, device classes, or user groups

89McAfee Host Data Loss Prevention 9.1

Page 90: Hdlp 910 Product Guide

Task

For option definitions, press the F1 key.

1 From the Host DLP Policy console File menu, select Synchronize Templates. TheTemplate Synchronization wizard appears.

2 Select the template type from the tabs. Where there is no match between the templatesfolder and the current system policy the definition will be displayed as missing.

Figure 13: The Template Synchronization Wizard

3Click the View icon to view the selected definition properties or the Delete icon toremove the selected definition.

4 To copy a template to the current policy, or create a new template from a current policy

definition, select the definition and click one of the Move icons or . Thedefinition entry is changed from Missing to the definition name

5 Click OK.

Protection RulesSynchronizing templates

McAfee Host Data Loss Prevention 9.190

Page 91: Hdlp 910 Product Guide

Policy AssignmentAfter creating the rules and definitions required for your enterprise, you enforce them byassigning the policy to your managed computers. Once the policy is in place, use the Host DLPMonitor to audit the state of your enterprise’s sensitive information.

Using McAfee Host Data Loss Prevention software involves the following tasks:

• Assigning policy — Deploying the Host DLP policy to managed computers.

• Monitoring events — Using the Host DLP Monitor to audit, view, filter, and sort events inyour enterprise network.

• Performing administrative maintenance — Keeping the Host DLP Agents up-to-dateand generating agent override, agent uninstall, and quarantine release keys as required.

TIP: To review a policy quickly, select File | Export Policy to HTML. This outputs the policyin an easily readable format for review and analysis. You can control exactly what is output onthe Tools | Options | HTML Export tab.

Contents

Assigning policies with ePolicy Orchestrator

Importing policies and editing policy descriptions

Agent bypass and related features

Administering the Host DLP Agent

Assigning policies with ePolicy OrchestratorUse these tasks to work with McAfee Host Data Loss Prevention policies in ePolicy Orchestrator.

Tasks

Applying the system policy

Assigning a policy or agent configuration

Applying the system policyUse this task to apply a policy in ePolicy Orchestrator.

Task

1 From the ePolicy Orchestrator Menu, select Data Protection | DLP Policy.

2 Verify the policy before applying it: click Tools | Run Policy Analyzer.

NOTE: Policies can be applied to ePolicy Orchestrator with warnings, but not if they containerrors. If you see errors, resolve the problem(s) causing the error(s), or customize the

91McAfee Host Data Loss Prevention 9.1

Page 92: Hdlp 910 Product Guide

policy analyzer options. If you are using the agent backward compatibility option and apolicy contains a feature that is unsupported in older agent versions, it will generate anerror. See the McAfee Host Data Loss Prevention 9.1 Installation Guide for a list ofunsupported features.

3 From the Host DLP Policy console File menu, select Apply to ePO. The Applying to ePOwindow appears. The policy is saved to the ePO database, and an administrative event isgenerated.

TIP: If you have activated the browser Status Bar, you see the message “Validationsucceeded.”

Assigning a policy or agent configurationUse this task to assign a policy or agent configuration to a computer or directory with ePolicyOrchestrator.

Task

For option definitions, click ? in the interface.

1 In ePolicy Orchestrator, click System Tree.

2 Locate the directory containing the computers that will be assigned a policy, and selectthem.

3 Click Actions | Agent | Wake Up Agents.

4 Select Agent Wake-Up Call, and set Randomization to 0 minutes. Click OK.

5 When the agent wake-up call is completed, you are returned to the System Tree. Reselectthe computers that will be assigned a policy, and click Actions | Agent | Set Policy &Inheritance.

6 On the Assign Policy page, select the Product, Category, and Policy to be applied.

7 Click Save.

Importing policies and editing policy descriptionsUse these tasks to import policies from ePolicy Orchestrator, or to modify policy descriptions.

Tasks

Importing a policy from ePolicy Orchestrator

Editing a policy description

Importing a policy from ePolicy OrchestratorUse this task to import a policy from ePolicy Orchestrator.

Task

1 From the Host DLP Policy console File menu, select Import Policy from ePO.

2 Click Yes in the confirmation window.

Policy AssignmentImporting policies and editing policy descriptions

McAfee Host Data Loss Prevention 9.192

Page 93: Hdlp 910 Product Guide

Editing a policy descriptionUse this task to change the name of a policy, or modify its description.

Task

1 From the Host DLP Policy console File menu, select Edit Policy Description.

2 Edit the policy name and description in the Host DLP Security Policy window.

3 Click OK.

Agent bypass and related featuresOccasionally there is a legitimate business need to bypass the Host DLP system. McAfee HostData Loss Prevention offers two methods of doing this.

• Business justification action

• Agent bypass

Business justification

Most protection rules offer the option of a Business Justification action. When this action isadded to a protection rule, the user is prompted when copying or sending sensitive content.Justifications are entered in the Global Agent Configuration window, and are part of the globalpolicy. If a user types in a preset justification when prompted, the action is monitored. Otherwise,the action is blocked.

Agent bypass

A user can be given permission to access or transfer sensitive information for a limited time.When this is done, all sensitive information is monitored, rather than blocked, according toexisting rules. Both the user and the system administrator receive messages about the bypassstatus when its enabled and disabled (the user by a popup message, and the administrator byan event entry in the ePO Event Monitor.)

The agent context-menu is used to request a bypass. When this is done, the agent generatesa FIPS-compliant 16 digit code. The user communicates this code to the Host DLP administrator.The administrator then sets the bypass time limit, generates and 32 digit challenge key, andreturns this to the user. The challenge key is entered in the appropriate text box, and the bypasstimer starts.

Quarantine removal

A similar situation occurs when the discovery crawler quarantines sensitive content on a clientcomputer. To remove the files from quarantine, the user must request a quarantine removekey from the administrator. The procedure is similar to that of agent bypass and uninstall.

Administering the Host DLP AgentAgent administration consists of keeping the Host DLP Agents up-to-date and generating agentoverride, agent uninstall, and quarantine release keys as required.

Use these tasks to administer the Host DLP Agent.

Policy AssignmentAgent bypass and related features

93McAfee Host Data Loss Prevention 9.1

Page 94: Hdlp 910 Product Guide

Tasks

Refreshing the Host DLP Agent policy

Requesting an override key

Generating an agent override key

Generating a quarantine release key

Refreshing the Host DLP Agent policyNormally, the system policy deployment relies on the ePolicy Orchestrator server, and the policyrefresh on the managed computer is performed in accordance with the McAfee Agent settings.

Use this task to update a policy in ePolicy Orchestrator without waiting for the scheduled refresh.

Task

For option definitions, click ? in the interface.

1 In the ePolicy Orchestrator system tree, select the computer or computers to be refreshed.

2 Click More Actions | Wake Up Agents.

3 Select the wake-up call type, and set Randomization to 0 minutes. Click OK.

NOTE: Policies are updated on a scheduled basis by the ePolicy Orchestrator server. Usersof managed computers do not refresh policies manually unless specifically instructed to doso.

Requesting an override keyOccasionally, a user has a valid need to copy something that is blocked by a rule. In such cases,the user requests an override key, which bypasses normal agent action for a preset amount oftime. When in bypass mode, the agent still collects and sends event information to the ePOEvent Parser, marking them with the override flag. The user does not receive visual notificationof events while in bypass mode.

Use this task to request an override key.

Task

1 For McAfee Agent 4.0: In the system tray of the managed computer, click the McAfeeAgent icon, then click (or right-click) the DLP icon and select Request Agent Bypassfrom the menu.

Figure 14: Requesting an agent bypass

Policy AssignmentAdministering the Host DLP Agent

McAfee Host Data Loss Prevention 9.194

Page 95: Hdlp 910 Product Guide

The release code window appears.

Figure 15: Host DLP Agent bypass request

For McAfee Agent 4.5: In the system tray of the managed computer, click the McAfeeAgent icon, click Managed Features, then right-click McAfee DLP Agent and selectRequest Agent Bypass from the menu.

2 The user communicates the Identification Code to the administrator. When approved,the administrator generates the Release Code and sends it to the user. The systemadministrator sets the length of time for the override before generating the code.

NOTE: Each time you select Request Agent Bypass from the menu a new IdentificationCode is generated. You must leave the bypass request window open until you receive yourmatching Release Code.

3 Type or paste the Release Code into the text box and click OK.

NOTE: The release code is a 8 or 16 digit alphanumeric. If the code contains dashes (makingit easier to read), you must remove them before copying the number into the text box.

The agent popup displays a verification.

Figure 16: Host DLP Agent popup

Generating an agent override keyWhen a user requests an override, the administrator can generate an override key for a specifiedperiod.

Use this task to create an agent override key.

Task

1 From the Host DLP Policy console Tools menu, select Generate Agent Override Key.

Policy AssignmentAdministering the Host DLP Agent

95McAfee Host Data Loss Prevention 9.1

Page 96: Hdlp 910 Product Guide

2 Type the user information in Step 1.

NOTE: All fields are required, and all information is logged to the database.

3 Type the agent override request Identification Code generated by the Host DLP Agent.(Step 2)

4 Select the length of time to override the system rules. (Step 3)

5 Type the agent override key password or select Use password from current policy.(Step4)

6 Click Generate Key to create the override code for the user.This Release Code is sent to the user to enter into the request bypass dialog box.

Generating a quarantine release keyDiscovery rules can place files on a managed computer in quarantine if they contain sensitivecontent. The administrator can release these files for use by creating a quarantine release key.

Use this task to create a quarantine release key.

Task

1 From the Host DLP Policy console Tools menu, select Generate Agent QuarantineRelease Key.

2 Type the user information in Step 1.

NOTE: All fields are required, and all information is logged to the database.

3 Type the challenge code.

4 Type the agent override key password or select Use password from current policy.

5 Click Generate Key to create the release key for the user.This Release Code is sent to the user to enter into the request bypass dialog box.

Policy AssignmentAdministering the Host DLP Agent

McAfee Host Data Loss Prevention 9.196

Page 97: Hdlp 910 Product Guide

The Host DLP Monitor and What It DoesMonitoring the system consists of gathering and reviewing evidence and events, and producingreports. You can use the database administration tools to manage the database and viewdatabase statistics.

The Host DLP monitor provides the necessary feedback for designing an effective Data LossPrevention system. By reviewing recorded events and evidence, you determine when rules aretoo restrictive, causing unnecessary work delays, and when they are too lax, allowing dataleaks.

Contents

Agent events and how they are tracked

Redaction

Monitoring system events and alerts

Filtering event information

Using labels

Searching Host DLP Monitor events by event ID

Exporting Host DLP Monitor events

Printing Host DLP Monitor events

Sending Host DLP Monitor events by email

Agent events and how they are trackedWhen an agent determines a policy violation has occurred, it generates an event and sends itto the ePO Event Parser. These events can be viewed, filtered, and sorted in the Host DLPMonitor, allowing security officers or administrators to view events and respond quickly. Ifapplicable, suspicious content is attached as evidence to the event.

The Host DLP Monitor can be installed on multiple ePolicy Orchestrator servers, and specificmonitoring permissions are defined during the installation of the Host DLP WindowsCommunication Foundation (WCF) Service. It can also be installed on multiple clients thatconnect to the ePO server using a browser.

As McAfee Host Data Loss Prevention takes a major role in a enterprise’s effort to comply withall regulation and privacy laws, the Host DLP Monitor presents information about the transmissionof sensitive data in an accurate and flexible way. Auditors, signing officers, privacy officials andother key workers can use the Host DLP Monitor to observe suspicious or unauthorized activitiesand act in accordance with enterprise privacy policy, relevant regulations or other laws. Thesystem administrator or the security officer can follow administrative events regarding agentsand policy distribution status.

97McAfee Host Data Loss Prevention 9.1

Page 98: Hdlp 910 Product Guide

Agent overrideAgent override temporarily suspends blocking by the agent. When in override mode, the agentstill collects and sends event information to the ePO Event Parser. Events are marked with theoverride flag. The user does not receive visual notification of events while in override mode.

EvidenceSome rules allow the option of storing evidence. When this option is selected, an encryptedcopy of the content that was blocked or monitored is stored in the pre-defined evidence folderon the endpoint computer. When the Host DLP Agent passes information to the server, thefolder is purged and the evidence is stored in the server evidence folder. Settings on theEvidence tab of the Agent Configuration can be used to control the maximum size and age oflocal evidence storage when the computer is offline.

Prerequisites for evidence storage

Evidence storage must be enabled before it can be used. This is the default condition for McAfeeHost Data Loss Preventionsoftware. If you do not want to save evidence, you can improveperformance by disabling the evidence handler. The following are either required or set asdefaults when setting up the software:

Evidence storage folder

Specifying the UNC path to the evidence storage folder is a requirement for applying a policyto ePolicy Orchestrator. See the McAfee Host Data Loss Prevention Installation Guide for detailson setting up the folder and setting access permissions.

Evidence handler

The evidence handler is enabled on the Miscellaneous tab of the Agent Configuration. It is asub-entry under Reporting Service, which must also be enabled for evidence collection.

Evidence replication setting

A setting on the Evidence tab of the Agent Configuration allows you to select evidence collection,hit highlighting, or both.

Hit highlighting

The hit highlighting option helps administrators identify exactly which sensitive content causedan event. When selected, it stores an encrypted HTML file containing extracted text. For tagsand content categories, the text consists of a highlighted word or phrase and one hundredcharacters before and after (for context) organized by the tag or content category that triggeredthe event and including a count of the number of events per tag/content category. For securedtext patterns and dictionaries, the exact text is extracted.

Rules allowing evidence storage

The following rules have the option of storing evidence:

• Email protection rules — Saves a copy of the email

• File system protection rules — Saves a copy of the file

• Printing protection rules — Saves a copy of the file

The Host DLP Monitor and What It DoesEvidence

McAfee Host Data Loss Prevention 9.198

Page 99: Hdlp 910 Product Guide

• Removable storage protection rules — Saves a copy of the file

• Screen capture protection rules — Saves a JPEG of the screen

• Web post protection rules — Saves a copy of the email

• Discovery rules — Saves a copy of the file

Hit countThe Host DLP Monitor maintains hit counts — the number of tags and content categories thattriggered each event. In the event details pane, the total number of hits is concatenated toeach evidence file path. Hit counts are recorded in two fields in the Host DLP Monitor:

• Number of hits — the sum of content category hits. Multiple dictionary hits add to thetotal. Tags are not counted.

• Number of tags and categories — the sum of all content categories and tags found.

A single event can generate multiple hits. For example, if an email with two attachments isblocked, the first attachment because it triggered a dictionary, and the second because ittriggered a text pattern and contained tagged content, that would be listed as two hits andthree tags and categories.

RedactionTo meet legal demands in some markets, and to protect confidential information in allcircumstances, McAfee Host Data Loss Prevention software offers a data redaction feature.When using data redaction, specific fields in the DLP Monitor containing confidential informationare encrypted to prevent unauthorized viewing, and links to evidence are hidden. Currently,the fields computer name, user name, and IP address are predefined as confidential.

Redacted information is encrypted in:

• DLP Monitor

• RSS feeds

The confidential fields can only be viewed by a user who has User can reveal sensitivedata... permissions. This can only be done in the presence of a user with User can partiallyview DLP Monitor permissions. The permissions are set up in the Permission Sets section ofePolicy Orchestrator. If you are not using the redaction feature, use the permission User canview DLP Monitor, which allows viewing without encryption. See the McAfee Host Data LossPrevention Installation Guide for details on setting permissions.

For RSS feeds, the enable/disable option is in the WCF setup wizard.

Redaction in ePO Reports

In ePO reports and the Event Threat log, all DLP events are filtered out of the reports forunauthorized users. A user with the DLP Monitor permission User can partially view DLPMonitor can view only the following reports:

• Agent distribution by date

• Agent version

• Bypassed agents

• Enforced device control rules.

The Host DLP Monitor and What It DoesHit count

99McAfee Host Data Loss Prevention 9.1

Page 100: Hdlp 910 Product Guide

• Enforced discovery rules

• Enforced protection rules

• Evidence path distribution

• Event collector distribution

• Policy distribution

• Privileged permissions

• Undefined device classes

• Unmanaged printers

• Unsupported printers

Table 3: Summary of DLP Monitor permissions and their effectsEffect in EventThreat log

Effect in RSSfeeds

Effect in ePOReports

Effect in DLPMonitor

DescriptionPermission

Only generalinformation about

Available.Confidential fields

No DLP Reportsare authorized.

DLP Monitor isunavailable.

User isunauthorized toview the DLPMonitor

User cannot viewDLP Monitor

DLP events isavailable.

are encrypted ifWCF service wasinstalled withredaction enabled.

DLP events arefiltered out.

DLP EventReports areempty. All eventsare filtered out.

DLP Monitor isavailable, butconfidential fieldsare encrypted andevidence ishidden.

User is notauthorized to viewconfidential fields.

User can partiallyview DLPMonitor...

DLP events arefiltered out.

No DLP Reportsare authorized.

DLP Monitor isunavailable.

User is notauthorized to viewDLP events, but

User can revealsensitive data...

can decryptconfidential fieldsin the presence ofa user who canview DLP events.

Only generalinformation about

All DLP Reportsare authorized.

All DLP Monitorfields areavailable.

User can view allDLP event data.

User can view DLPMonitor

DLP events isavailable.

Viewing redacted monitor fieldsUse this task to view redacted content in the DLP Monitor

Before you begin

Create permission sets for viewing and auditing in ePolicy Orchestrator. See the McAfee HostData Loss Prevention Installation Guide for information.

Task

1 Select the events to be viewed.

NOTE: You can select up to 10 events at one time.

The Host DLP Monitor and What It DoesRedaction

McAfee Host Data Loss Prevention 9.1100

Page 101: Hdlp 910 Product Guide

2 Right-click, and select Decrypt Data of Selected Events from the context menu. Acredentials dialog box appears.

3 Enter a user name and password in the Release Redacted Information dialog box and clickOK. The confidential information is revealed.

NOTE: The permission set in ePolicy Orchestrator for releasing information is different thanthe permission set for viewing information. An administrator account for viewing the DLPMonitor (and selecting the events) cannot release the encrypted information. A GlobalAdministrator account, or one with permission to reveal sensitive data, is required.

Monitoring system events and alertsUse this task for basic Host DLP Monitor operations.

1 In ePolicy Orchestrator, Click Reporting, then click Host DLP Monitor.

2 In the All Events pane, sort the list by clicking any column. Sort by severity, time of day,user, and so forth.

3 Select a single event from the list to display its full details. The event information appearsin the Details pane.

TIP: Click the Hide/Display icon to hide/display the Details pane. To enlarge either ofthe panes grab the bar between the All Events and Details panes and drag it.

4 If any Evidence is available, double-click the attached file to view its content.

NOTE: When the Monitor window is minimized to the taskbar, new event notifications aredisplayed via the popup tray.

5 To view encrypted sensitive text, select the data to view, right-click, and select DecryptData of Selected Events. In the dialog box that appears, enter the user name andpassword of an administrator with permission to reveal sensitive data. Redacted evidenceis viewed in a similar manner.

NOTE: Two administrators are required: one with permission to view the DLP Monitor(except sensitive text), the other with permission to view sensitive text. These are separateroles and require separate permission sets. See the McAfee Host Data Loss Prevention 9.1Installation Guide for information on setting up the permission sets.

Filtering event informationWhen viewing events, you might need to reduce the amount of information shown to seerelevant details at a glance. You can apply a filter to define specific criteria to reduce the list ofevents to only relevant data.

Some typical filters are:

• Critical events.

• Violations of a new rule.

The Host DLP Monitor and What It DoesMonitoring system events and alerts

101McAfee Host Data Loss Prevention 9.1

Page 102: Hdlp 910 Product Guide

• Events associated with a particular user or computer.

NOTE: Two standard filters are Computer Name and User Name. If you are using the redactionfeature, these fields are pre-defined as confidential and are encrypted for users with partialview permission.

Tasks

Defining filters

Defining date filters

Adding predefined filters

Filtering the events monitor list

Defining filtersUse this task to define a new events filter.

Task

1On the Host DLP Monitor toolbar, click the Show Filters icon to display the availablefilter list.

2Click the Add Filter icon to add a new filter.

3 Type a name for your filter in the Filter Name text box.

The Host DLP Monitor and What It DoesFiltering event information

McAfee Host Data Loss Prevention 9.1102

Page 103: Hdlp 910 Product Guide

4 Select the filter conditions and properties.

Figure 17: Host DLP Monitor Filter dialog box

5 Click OK. You are prompted to save the filter. The filter is applied to the events displayedin the events panel.

NOTE: The filter is applied even if you click No at the prompt. However, you can’t use thefilter in future monitor sessions if you do not save it.

6In the Filters pane, click the Edit button to modify the filter.

Defining date filtersUse this task to define a date filter.

Task

1On the Host DLP Monitor toolbar, click the Show Filters icon to display the availablefilter list.

2On the Host DLP Monitor toolbar, click the Add Filter icon to add a new filter.

3 Type a name for your filter in the Filter Name text box.

4 Under Filter Conditions, select Event Time.

The Host DLP Monitor and What It DoesFiltering event information

103McAfee Host Data Loss Prevention 9.1

Page 104: Hdlp 910 Product Guide

5 To set a date range, use the Date pull-down list and related calendars.

6 To select a day of the week, select In from the Days pull-down list, then select the daysof the week.

7 To select an hour range, use the Hours pull-down menu and related hour lists.

8 To display a relative range, select Display recent events in the Relative section, selecta number in the dial window, and a unit (Hours, Days, Months) in the units window.

9 Click OK.

NOTE: You can combine selections from any of the sections to define your date filter.However, you should take care that the definitions are compatible with each other. Forexample, do not select a relative range with a date that is outside of that range.

Adding predefined filtersMcAfee Host Data Loss Prevention software contains a number of predefined filters that cansave you the trouble of creating commonly used filters.

Task

1 From the Host DLP Monitor File menu, select Load filters from file. Select the fileDefaultFilters.xml and open it.

2 Select the filters you want to use and click OK. The filters appear in the Filters window.

TIP: By default, the Filters pane is hidden. Click the Show Filter icon on the DLP toolbarto display the selected filters.

Filtering the events monitor listUse this task to filter the events monitor list.

Task

1On the DLP Monitor toolbar, click the Show Filter icon to display the available filter list.

2 In the Filters section, select a predefined filter or create a new one. The title of the eventlist becomes the name of the filter, and the list displays according to the filter definition.

3 Select more filters (optional). All selected filters display simultaneously.

NOTE: By default, all administrative events such as agent state (up or down), policy changed,and so forth, are displayed in the event list with all other system events. To exclude

administrative events from the list, click the Hide administrative events icon on theHost DLP Monitor toolbar.

Using labelsCustomized labels allow you to mark events with a unique tag. The events can then be easilysorted and filtered by these customized labels.

Use this task to create or remove a label.

The Host DLP Monitor and What It DoesUsing labels

McAfee Host Data Loss Prevention 9.1104

Page 105: Hdlp 910 Product Guide

Task

1 In the Host DLP Monitor, select an event, several events, or a range of events.

2 On the Host DLP Monitor toolbar, click Labels | Set Labels.

3 In the Label Editor, select a label from the list or create a new label by typing in a namefor the label and clicking New Label.

4 Click OK to add the label to the event(s). The selected label(s) are both applied and saved.

5 To remove labels, select the events and click Labels | Remove Labels.

NOTE: You can also use Set Labels to remove labels, or to change them. Set Labelschanges the state of the label according to what is selected. Add Labels adds, but doesn’tremove or change, a label. Remove Labels only removes the selected label(s).

Searching Host DLP Monitor events by event IDUse this task to find an event by ID.

Task

1 On the Host DLP Monitor toolbar, click the Search icon to start the search.

Figure 18: Host DLP Monitor search dialog box

2 Type the event ID and select one of the find options.

3 Click Find.

Exporting Host DLP Monitor eventsThe Host DLP Monitor export feature produces an Excel file that you can use for further analysisor auditing, or as part of an external report.

Use this task to export Host DLP Monitor events.

Task

1 From the Host DLP Monitor File menu, select Export.

2 Select Export Events to Excel to export the complete event list, or Export SelectedEvent to Excel to export a specific event from the list.

The Host DLP Monitor and What It DoesSearching Host DLP Monitor events by event ID

105McAfee Host Data Loss Prevention 9.1

Page 106: Hdlp 910 Product Guide

3 Type a file name and click Save.

Printing Host DLP Monitor eventsUse this task to send a list of events or event details to a printer.

Task

1 In the Host DLP Monitor, select the event or events you want to print.

2 From the Host DLP Monitor File menu, select one of the following:

• To print just the events, select Print | Selected Events.

• To print event details, select Print | Details.

• To print the complete list, select Print | Event Table.

Sending Host DLP Monitor events by emailUse this task to email specific events to users.

Task

1 In the Host DLP Monitor, select specific events.

2 Right-click and select Send email report or Send email report (Without evidence).An email message with the selected event details appears.

3 Add a recipient and click Send.

The Host DLP Monitor and What It DoesPrinting Host DLP Monitor events

McAfee Host Data Loss Prevention 9.1106

Page 107: Hdlp 910 Product Guide

Database Administration and ReportingMcAfee Host Data Loss Prevention has built-in features for database management and reporting.The database features allow you to remove data that is no longer needed, and to view databasestatistics.

Reporting

McAfee Host Data Loss Prevention uses ePolicy Orchestrator reporting features. See the Queryingthe Database chapter in the McAfee ePolicy Orchestrator Product Guide for details. Two typesof reports are supported:

• Host DLP properties reports

• Host DLP events reports

Nine Host DLP properties reports are displayed in the DLP: Status Summary dashboards. Twelvepredefined events queries are provided. All twenty-one queries can be found in the ePolicyOrchestrator console under Menu | Queries | Shared Groups.

ePolicy Orchestrator includes a "rollup" function, which runs queries that report on summarydata from multiple ePO databases. All of the McAfee Host Data Loss Prevention reports are setup to support rollup queries.

Contents

Report options

Setting up RSS feeds

Administering the database

Viewing database statistics

Report optionsMcAfee Host Data Loss Prevention offers two reporting options to review events, ePO Reportsand RSS feeds. In addition, you can view information on product properties on the ePODashboard.

ePO Reports

McAfee Host Data Loss Prevention integrates reporting with the ePolicy Orchestrator reportingservice. For information on using the ePO reporting service, see the ePolicy Orchestrator ProductGuide. ePolicy Orchestrator rollup queries and rolled up reports, which summarize data frommultiple ePO databases, are supported.

ePO Notifications are supported. See the Sending Notifications chapter in the McAfee ePolicyOrchestrator 4.0 Product Guide for details.

107McAfee Host Data Loss Prevention 9.1

Page 108: Hdlp 910 Product Guide

RSS feeds

You can monitor McAfee Host Data Loss Prevention events without being logged on to ePolicyOrchestrator. You can set up any RSS reader that supports authentication to get feeds fromthe Host DLP Monitor. You can use Host DLP Monitor filters to filter results.

ePO Dashboard/ePO Reports

You can view information on Host DLP product properties on the ePO Dashboard. There arenine predefined monitors that display on the DLP: Status Summary tab of the ePO Dashboardsconsole. The DLP Dashboards are listed as Public Dashboards in the ePO Manage Dashboardswindow. Monitors can be edited and customized, and new monitors can be created. See theePolicy Orchestrator documentation for instructions.

The nine dashboard reports and eleven other predefined reports are available from the ePolicyOrchestrator Menu by selecting Queries. They are listed under Shared Groups. Those alsoavailable as rolled up reports are indicated in the tables.

Table 4: Predefined Host DLP DashboardsDescriptionName

Displays agents according to the date of their last communication withePolicy Orchestrator.

Agent to ePO communications distribution(also rolled up report)

Displays the distribution of agents in the enterprise. Used to monitoragent deployment progress.

Agent version (also rolled up report)

Displays how many Host DLP nodes are in policy bypass mode. This isa real-time view that refreshes when a bypass begins or expires.

Bypassed agents

Displays the number of computers enforcing each device control rule.Drill down to view which rules are being enforced on which users.

Enforced device control rules

Displays the number of computers enforcing each protection rule.Enforced protection rules

Shows how many nodes report to each event collector server. Useful inthe case of a multiple event collector setup.

Event collector distribution

Displays the different evidence shares used by the agents. Useful whenthere are several different agent configurations.

Evidence path distribution

Displays the Host DLP policy distribution throughout the enterprise. Usedto monitor progress when deploying a new policy.

Policy distribution (also rolled up report)

Displays the current privileged Host DLP users. It allows you to drill downto view normal Host DLP users as well as users with “monitor only”permissions, and users allowed to bypass all Host DLP events.

Privileged permissions

Table 5: Predefined Host DLP Event ReportsDescriptionName

Displays all agents and their status.Agent status

Displays device events that were blocked or write-blocked.Block and block write device events

Displays a day's events ordered by severity.Daily events distribution by severity

Displays the number of computers enforcing each discoveryrule.

Enforced discovery rules

Displays the number of events for each event type.Events by event type (also rolled up report)

Displays the number of events for each rule, for differentdates.

Events by protection / discovery rule by date

Displays the number of events for each rule.Events by protection rule

Displays the number of events for each severity level.Events by severity (also rolled up report)

Database Administration and ReportingReport options

McAfee Host Data Loss Prevention 9.1108

Page 109: Hdlp 910 Product Guide

DescriptionName

Displays the number of events for each tag and contentcategory that they recognize.

Events by tag and category (also rolled up report)

Lists and shows a bar graph of the devices whose deviceclass cannot be determined.

Undefined device classes

Lists and shows a bar graph of the unmanaged(whitelisted) printers and the number of nodes attached

Unmanaged printers

to each. Clicking either a listed printer or a bar on thegraph drills down to a list of the computers connected toit. Clicking on a computer drills down to the properties ofthe computer.

Lists and shows a bar graph of the unsupported printers(that is, printers detected by the Host DLP Agent that were

Unsupported printers

not whitelisted but failed to install a Host DLP proxy driver)and the number of nodes attached to each. Clicking eithera listed printer or a bar on the graph drills down to a listof the computers connected to it. Clicking on a workstationdrills down to the properties of the computer.

Setting up RSS feedsMcAfee Host Data Loss Prevention events can be viewed in any RSS reader (feed reader) thatsupports authentication.

Use this task to configure your reader to receive Host DLP events.

1 Open the reader and select the Add feed option.

2 Specify the DLP RSS URL: http://<servername>:8731/DLPWCF/DLPRSSFeeder/GetRSS. HostDLP Monitor provides a feed of the latest 50 events.

NOTE: Replace <servername> with the name of the DLP Event Parser server. For a standardinstallation, use localhost. You might also need to change the port designation, dependingon your installation.

3 To change the default number of events, change the URL to.../GetRSSCounted?itemCount=X.

4 To filter the results with an existing Host DLP Monitor filter, use.../GetRSSFiltered?filterName=X.

5 To specify both an event count and a filter, use.../GetRSSFilteredCounted?filterName=X&itemCount=Y.

Setting up Data Loss Prevention rolled up reportsUse this task to set up a rolled up report of McAfee Host Data Loss Prevention data.

Task

For option definitions, click ? in the interface.

1 From the ePolicy Orchestrator Menu, select Automation | Server Tasks, the click NewTask.

2 Type a name for the task, and (optional) notes, then click Next.

Database Administration and ReportingSetting up RSS feeds

109McAfee Host Data Loss Prevention 9.1

Page 110: Hdlp 910 Product Guide

3 In the Actions drop-down menu, select Roll Up Data. In the Data Type drop-downmenu, select one of the McAfee Host Data Loss Prevention report types: DLP CMAProperties or DLP Events.

4 Continue with the configuration as required. Click Next.

5 Set the schedule type, date and time. Click Next.

6 Review the set-up information, then click Save.

Administering the databaseUse this task to remove events from the events database.

Task

For option definitions, click ? in the interface.

Before you begin

When removing events from the database, make sure they have been properly reported andanalyzed. McAfee recommends creating a database backup prior to removing events. Removingall events from the system can potentially remove violations before they have been seen bysecurity officers or administrators.

1 In the Host DLP Policy console navigation pane, under Database Administration, selectDatabase Administration. The administrative actions appear in the main panel.

2 Select an action from the available list. The confirmation window appears.

CAUTION: Pay attention to the description of each option. Specifically, the Date optionremoves events older than the date specified.

3 Click Execute to proceed with the operation or Close to cancel the operation. The operationprogress bar window appears.

Viewing database statisticsUse this task to view the database statistics.

Task

For option definitions, click ? in the interface.

1 In the Host DLP Policy console navigation pane, under Database Administration, selectDatabase Statistics. The list of available statistical values appears in the main panel.

2 On the toolbar, click Refresh Database statistics to update the information.

3 Select any value from the available list to view details.

Database Administration and ReportingAdministering the database

McAfee Host Data Loss Prevention 9.1110

Page 111: Hdlp 910 Product Guide

Configuring the Host DLP SystemSystem components can be customized to best fit the needs of your enterprise. By configuringthe agent and system options, you can optimize the system to safeguard sensitive enterpriseinformation efficiently. You can configure and fine-tune these options and components:

• McAfee Device Control vs. full McAfee Host Data Loss Prevention configuration.

• Agent configuration — Sends the agents all relevant information about event storagelocations, customized user notifications, whitelisted content limitations and locations, filetracing parameters, Outlook logon settings, and agent module selections.

• System options — Allows you to set the DLP Policy WCF service path, policy analyzersettings, system logging options, and system report printing options.

Contents

McAfee Device Control

Agent configuration

System tools

Managing agent configuration

Configuring Safe Mode operation

Viewing the system log

McAfee Device ControlMcAfee Host Data Loss Prevention is available in two versions: a Device Control-only version,and a full Data Loss Prevention version. The default installation is for a 90-day trial license forMcAfee Device Control. Upgrade to full McAfee Host Data Loss Prevention by upgrading thelicense. License options for either version of the software are 90-day trial or unlimited. Whenupgrading, you do not need to reinstall the software.

The default configuration of McAfee Device Control includes device rules and removable storageprotection. You can turn off removable storage protection if it is not needed.

Differences between versions

The following definitions are turned off (unavailable) in McAfee Device Control:

• Discovery

• Email Destinations

• File Servers

• Network

• Printers

• Rights Management

111McAfee Host Data Loss Prevention 9.1

Page 112: Hdlp 910 Product Guide

• Web Destinations

The following features are unavailable:

• Protection rules (with the exception of removable storage rules)

• Tags and tagging rules

Agent configurationThe Host DLP Agent resides on enterprise computers and executes the defined policy. Theagent also monitors user activities involving sensitive content. To define the behavior of theagent and other system components, use the Agent Configuration menu in the Host DLP Policyconsole. Agent configuration is stored in the policy, which is deployed to managed computers.If the agent configuration is updated, the policy needs to be redeployed.

Agent Service WatchDog

To maintain normal operation of the Host DLP Agent, even in the event of malicious interference,McAfee Host Data Loss Prevention runs a protective service called the Agent Service WatchDog(ASWD). This service monitors the Host DLP Agent, and restarts it if it stops running for anyreason. ASWD is enabled by default. If you want to verify that ASWD is running, look in theWindows Task Manager processes for a service named fcagswd.exe.

System toolsUse the system tools in McAfee Host Data Loss Prevention software version 9.1 to keep trackof system health alerts and to configure advanced features.

System logUse the system log to observe and receive alerts about the system health and related events.The system log is crucial for troubleshooting.

Managing agent configurationAfter setting the options in the Agent Configuration window, you can use the Configurationmenu to restore default settings and to save the settings to a file, which can be used as aconfiguration backup or to load the same agent configuration on other systems.

Use these tasks to work with the Global Configuration Policy.

Tasks

Applying the global agent configuration

Importing the global agent configuration

Resetting the agent configuration values

Configuring the Host DLP SystemAgent configuration

McAfee Host Data Loss Prevention 9.1112

Page 113: Hdlp 910 Product Guide

Applying the global agent configurationUse this task to apply the global agent configuration.

Task

• From the Host DLP Policy console Agent Configurationmenu, select Apply global AgentConfiguration. The Agent Configuration progress bar window appears as the configurationis applied to ePolicy Orchestrator.

Importing the global agent configurationUse this task to import a global agent configuration.

Task

1 From the Host DLP Policy console Agent Configuration menu, select Import GlobalAgent Configuration from ePO.

2 Click Yes to confirm.

Resetting the agent configuration valuesUse this task to reset the agent configuration values to the defaults.

Task

1 From the Host DLP Policy console Agent Configuration menu, select Reset AgentConfiguration values.

2 Click Yes to restore default settings.

Configuring Safe Mode operationSafe Mode operation was changed in McAfee Host Data Loss Prevention version 9.0. Only agentprotection operates in Safe Mode. The agent itself does not run in Safe Mode.

Use this task to configure the agent protection in Safe Mode.

Task

For option definitions, press the F1 key.

1 From the Agent Configuration menu, select Edit Global Agent Configuration.

2 Open the Advanced Configuration tab.

3 Select Activate agent self protection in safemode and change the setting to Enabled.A warning message appears concerning possible system inaccessibility with this option.

4 Click OK.

Viewing the system logUse this task to display system log entries.

Configuring the Host DLP SystemConfiguring Safe Mode operation

113McAfee Host Data Loss Prevention 9.1

Page 114: Hdlp 910 Product Guide

Task

• From the Host DLP Policy console Tools menu, select View Log (or press F7). The bottomof the window displays the system log entries.

Configuring the Host DLP SystemViewing the system log

McAfee Host Data Loss Prevention 9.1114

Page 115: Hdlp 910 Product Guide

Index

AAdobe LiveCycle Rights Management, See rights managementagent bypass 94agent configuration

about 112assigning with ePolicy Orchestrator 92global 113resetting 113Safe Mode 113

application definitionstemplates 89about 60creating 61creating from the Enterprise Applications List 61removing 89strategy 13using 58web applications 62

application strategy 58applications, in rules 58archiver, application strategy 58assignment groups

computer 74creating 75definition 10privileged users 76users, including and excluding 74

audience, for this document 15

Bbackward compatibility, errors with 91business justification 82, 88, 93

Ccategory catalog 42classification rules 10, 40clipboard protection 81, 112

options, advanced, See online Helprules, creating 81

components, described 9computer assignment groups 74content categories 39, 40, 42

Ddashboards, report options 107data

classifying 28data-at-rest 54data-in-motion 67, 68data-in-use 62

databaseadministration 107removing events 110

database (continued)statistics, viewing 110

date filters, See filtersdefinitions

application 58device, See device definitionsdictionaries 28document properties 29email destination 67file extension 29, 62file server list 63network 64printer 67registered document repository 29registered documents 32removing 89table of 79tags 39text pattern 30web destination 68whitelist 31

device classcreating new 19removing 89status, changing 20types of 17

device control 111device definitions

groups 23importing 22importing to existing 22parameter management 18Plug and Play 20removable storage 21

device rulesabout 19definition 10Plug and Play 23removable storage 24

deviceslists, adding Plug and Play definitions 21management 17parameters, list of 26Plug and Play 18removable storage 18whitelisted 18

dictionariesabout 28creating 31importing entries 31

discoveryabout 54creating a discovery rule 55scheduling 57setup 56

DLP Discover 54

115McAfee Host Data Loss Prevention 9.1

Page 116: Hdlp 910 Product Guide

DLP messages, See online HelpDLP Monitor

viewing redacted content 100defining event filters 102responding to events 97system events and alerts 101viewing database statistics 110

DLP Policyconsole, illustrated 10, 14defined 9

DLP systemconfiguring 112options, See online Help

document groupsregistered, creating 32

document properties definitions 29documentation, McAfee enterprise products 16

Eeditor, application strategy 58email

protection rules 82sending DLP events by 106

email bypass 82email destinations

about 67creating 68definitions (table) 79groups 69removing 89

encryption 13enterprise applications list

about 58importing by scanning 59importing to 59removing applications 60

ePO Event Parser 9ePolicy Orchestrator

computer assignment groups 74ePO notifications 107ePO reports 107policy template synchronization wizard 91system policy, assigning 91

eventsmonitor list, filtering 104RSS feeds for viewing 109defining new 102exporting 105marking with labels 104monitoring 97printing 106removing 110search by ID 105sending by email 106viewing 101

events, Data Loss Preventionmarking with labels 104

evidenceagent events 97DLP Monitor 101storage for encrypted content 98

Excel, exporting to 105explorer, application strategy 58

Ffeatures, described 9file access

rules, about 19rules, removable storage 25

file extensionsabout 62creating 63creating groups 63definitions 29definitions (table) 79removing 89

file server listabout 63adding a server 64creating 64definitions (table) 79

file system protection rule 83filters

events monitor list 104date, defining 103defining new 102event information, viewing 101network definitions 64predefined 104

Gglobal agent configuration 113groups

device definitions 23email 69file extension 62network address range 65text patterns 34, 37web destination 72

HHDLP actions/rules matrix (graph) 78hit count 99hit highlighting, events 98Host DLP Agent

bypass 93, 98defined 9memory setting, See online Helpoverride key, creating 95service watch dog 112uninstall 93wake-up call 94

Host DLP data, classifying 30Host DLP Monitor

defined 9Host DLP Policy, See DLP PolicyHost DLP repositories, registered document 29Host DLP rules

classification 10device 10, 23, 24protection 10removable storage file access 25tagging 10

HTML export option, See online Help

IImage Writer, in printing protection rules 85

McAfee Host Data Loss Prevention 9.1116

Index

Page 117: Hdlp 910 Product Guide

Jjustification, See business justification

Kkey generator 93, 98

Llabels

marking events 104labels, Data Loss Prevention

marking events 104local users 74logging, See online HelpLotus Notes, email protection rule 82

Mmanual tags 46McAfee Device Control 8, 111McAfee Encrypted USB 18McAfee Endpoint Encryption 18

Nnetwork definitions

(table) 79about 64address range 65address range group 65port range 66protection rule 84removing 89

network shares, See online Helpnotifications, ePolicy Orchestrator 107NTFS extended attributes, See online Help

OOutlook probe, See online Helpoverride

key, generating 95key, requesting 94mode for the Host DLP Agent 98

Pparameters, device 26PDF writer, in printing protection rules 85Plug and Play devices

device definitions 20whitelisted 18whitelisted definition, creating 21

policiesapplying to ePolicy Orchestrator 91assigning with ePolicy Orchestrator 92assignment with ePolicy Orchestrator 91definition 10editing a description 93importing 92refreshing 94user assignment 74

policy analyzer, See online HelpPolicy console

console, illustrated 10printer list

adding printers 70

printer list (continued)creating 70definitions (table) 79

printer protection rule 85printers

about 67unmanaged 67, 71unsupported 67whitelisted 67, 71, 72

privileged users assignment group 76protection rules

application file access 80clipboard 81definition 10email 82file system 83how they work 78, 79network communication 84printer 85removable storage 86screen capture 87web post 88

Qquarantine

release key, See online Helprelease key, generating 96removing files 93

quarantine removal 58

Rredaction

about 99viewing content 100viewing redacted text 101

registered document repositories 29, 32, 33registered document repositories, using 30registered documents repositories, indexing 33removable storage

protection rules 86reporting 107repositories, registered document 32rights management

setting up the server 51, 52synchronizing policies 51synchronizing templates 52users 49working with Data Loss Prevention 49

rolled up reports 107rolled up reports, in Host Data Loss Prevention 109rollup queries 107RSS feeds

monitoring events 107setting up 109

rulesclassification 40removing 89tagging 10, 40

SSafe Mode 113screen capture protection rules 87server options, See online Helpstorage devices, removable 18

Index

117McAfee Host Data Loss Prevention 9.1

Page 118: Hdlp 910 Product Guide

strategy, See application definitionsstrategy, for applications 58system log 112system log, viewing 113system tools 112

Ttagging rules

application-based 43content-based 45creating 43definition 10dictionary 46links to content 40location-based 44

tagsabout 39content, See content categoriescreating 41definitions (table) 79in non-NTFS file systems, See online Helplinking tags to content 40manual 46, 47removing 89storing, See online Helptag groups 42

templates 89text patterns

about 30creating 34definitions (table) 79groups 37removing 89testing 36

trusted, application strategy 58tuning tool, See online Help

Uunmanaged printers, See printers, whitelisteduser assignment groups

creating 75

usersassignment groups 74excluding from a user assignment group 74local 74restricting domains, See online Help

Vvalidators 30, 36

Wwake-up call 94WatchDog

configuring, See online Helpprotective service, about 112

WCF service 97web destinations

about 68creating 72definitions (table) 79groups 73removing 89

web post protection rules 88whitelist

adding content 37definition (table) 79deleting content 37printer 67

whitelisted Plug and Play devices 18whitelists

about 31application definitions 25how Data Loss Prevention works 10Plug and Play definitions, creating 21printers 72unmanaged printers 71

window titles, in screen capture protection rules 87wizards

Template Synchronization 89Client Task Builder 33

McAfee Host Data Loss Prevention 9.1118

Index