What's New and Changed in Symantec Data Loss Prevention 15.8

Total Page:16

File Type:pdf, Size:1020Kb

What's New and Changed in Symantec Data Loss Prevention 15.8 What's New and Changed in Symantec Data Loss Prevention 15.8 Last updated: February 1, 2021 What's New and Changed in Symantec Data Loss Prevention 15.8 Table of Contents Introducing Symantec Data Loss Prevention 15.8...........................................................................4 About What's New in DLP 15.8...................................................................................................................................... 4 Summary of new and changed features....................................................................................................................... 4 Enhanced MIP and Data Loss Prevention integration............................................................................................... 4 Endpoint features........................................................................................................................................................ 5 Enforce Server and platform features........................................................................................................................ 5 End User Remediation: (incident management).........................................................................................................6 Discover features........................................................................................................................................................ 7 Detection features....................................................................................................................................................... 7 Cloud features............................................................................................................................................................. 8 Language support in Data Loss Prevention............................................................................................................... 8 New and changed features in Data Loss Prevention 15.8.............................................................. 9 Enhanced MIP and Data Loss Prevention integration................................................................................................. 9 Manage MIP classification and decryption credential profiles in the Enforce Server administration console and the Cloud Management Portal.......................................................................................................................................... 9 Import MIP tags in the Enforce Server administration console..................................................................................9 Support for authoring an MIP classification-based Data Loss Prevention policy condition for the Endpoint, Network, Storage, and Cloud................................................................................................................................................... 10 Enable MIP classification for Microsoft Office applications on endpoints.................................................................10 DLP Agent inspection of files and emails that are encrypted by MIP...................................................................... 10 DLP Agent support for using a network proxy to connect to the MIP portal............................................................10 Enable Enforce Server and detection server support for using a network proxy to connect to the MIP portal......... 11 Network and Storage support for inspecting files and emails that are encrypted by MIP........................................ 11 Endpoint features in Data Loss Prevention 15.8........................................................................................................11 LiveUpdate improvements.........................................................................................................................................11 Support for Microsoft OneDrive within Microsoft Office Applications....................................................................... 12 Support for Box Drive............................................................................................................................................... 12 Support for monitoring Microsoft Edge Chromium on Windows endpoints using extensions.................................. 12 Rearchitecture of Google Chrome monitoring for endpoints....................................................................................12 Rearchitecture of Mozilla Firefox monitoring for macOS endpoints......................................................................... 13 Rearchitecture of Microsoft Outlook monitoring for macOS endpoints.................................................................... 13 Filtering for multiple endpoints on the Agent List page............................................................................................13 Allow Microsoft Outlook emails encrypted with S/MIME to be sent......................................................................... 13 Enforce Server and platform features in Data Loss Prevention 15.8....................................................................... 13 Age-based filtering and incidents..............................................................................................................................13 Phased migration during upgrade.............................................................................................................................14 Network Detection uptime protection.................................................................................................................14 2 What's New and Changed in Symantec Data Loss Prevention 15.8 Support for Red Hat Enterprise Linux 8................................................................................................................... 14 Support for Windows Server 2019........................................................................................................................... 14 Ability to specify usage type for User Groups..........................................................................................................15 Support for Oracle 19c Enterprise and Standard Edition 2......................................................................................15 Support for OpenJDK 8 Java Runtime Environment (JRE)......................................................................................15 Email quarantine integration with Symantec Messaging Gateway...........................................................................15 Support for installing EMDI, EDM, and IDM remote indexers on Linux systems..................................................... 15 End User Remediation in Data Loss Prevention 15.8................................................................................................15 End User Remediation for decentralized incident remediation................................................................................ 15 Discover features in Data Loss Prevention 15.8........................................................................................................ 16 Enhanced support for the web server scanner........................................................................................................ 16 Network Discover support for Microsoft SharePoint 2019....................................................................................... 16 Removal of the Veritas Data Insight license file.......................................................................................................16 Rewritten Folder Risk Report page to remove Adobe Flash dependency............................................................... 16 Detection features in Data Loss Prevention 15.8.......................................................................................................16 High-performance Office Open XML content extraction upgrade............................................................................ 16 DICOM file metadata detection.................................................................................................................................17 XMP metadata detection for a variety of formats.....................................................................................................17 New and updated data identifiers in 15.8................................................................................................................ 17 Cloud features in Data Loss Prevention 15.8............................................................................................................. 22 Cloud email quarantine and release integration with Email Security.cloud..............................................................22 Language support in Data Loss Prevention 15.8....................................................................................................... 23 Important changes to language support in Data Loss Prevention 15.8................................................................... 23 Removed and deprecated platforms and features..................................................................................................... 24 Copyright statement.......................................................................................................................... 26 3 What's New and Changed in Symantec Data Loss Prevention 15.8 Introducing Symantec Data Loss Prevention 15.8 About What's New in DLP 15.8 What's New and What's Changed in Symantec Data Loss Prevention 15.8 describes new features
Recommended publications
  • Reconceptualising Ethnic Chinese Identity in Post-Suharto Indonesia
    Reconceptualising Ethnic Chinese Identity in Post-Suharto Indonesia Chang-Yau Hoon BA (Hons), BCom This thesis is presented for the degree of Doctor of Philosophy of The University of Western Australia School of Social and Cultural Studies Discipline of Asian Studies 2006 DECLARATION FOR THESES CONTAINING PUBLISHED WORK AND/OR WORK PREPARED FOR PUBLICATION This thesis contains sole-authored published work and/or work prepared for publication. The bibliographic details of the work and where it appears in the thesis is outlined below: Hoon, Chang-Yau. 2004, “Multiculturalism and Hybridity in Accommodating ‘Chineseness’ in Post-Soeharto Indonesia”, in Alchemies: Community exChanges, Glenn Pass and Denise Woods (eds), Black Swan Press, Perth, pp. 17-37. (A revised version of this paper appears in Chapter One of the thesis). ---. 2006, “Assimilation, Multiculturalism, Hybridity: The Dilemma of the Ethnic Chinese in Post-Suharto Indonesia”, Asian Ethnicity, Vol. 7, No. 2, pp. 149-166. (A revised version of this paper appears in Chapter One of the thesis). ---. 2006, “Defining (Multiple) Selves: Reflections on Fieldwork in Jakarta”, Life Writing, Vol. 3, No. 1, pp. 79-100. (A revised version of this paper appears in a few sections of Chapter Two of the thesis). ---. 2006, “‘A Hundred Flowers Bloom’: The Re-emergence of the Chinese Press in post-Suharto Indonesia”, in Media and the Chinese Diaspora: Community, Communications and Commerce, Wanning Sun (ed.), Routledge, London and New York, pp. 91-118. (A revised version of this paper appears in Chapter Six of the thesis). This thesis is the original work of the author except where otherwise acknowledged.
    [Show full text]
  • Understanding Capture and Validate KYC Processes: Global Experiences, Challenges and Learnings
    Understanding Capture and Validate KYC Processes: Global Experiences, Challenges and Learnings May 2019 Copyright © 2019 GSM Association Understanding Capture and Validate KYC Processes: Global Experiences, Challenges and Learnings v Digital Identity The GSMA represents the interests of mobile operators The GSMA Digital Identity Programme is uniquely worldwide, uniting more than 750 operators with over positioned to play a key role in advocating and raising 350 companies in the broader mobile ecosystem, awareness of the opportunity of mobile-enabled digital including handset and device makers, software companies, identity and life-enhancing services. Our programme works equipment providers and internet companies, as well as with mobile operators, governments and the development organisations in adjacent industry sectors. The GSMA also community to demonstrate the opportunities, address the produces the industry-leading MWC events held annually in barriers and highlight the value of mobile as an enabler of Barcelona, Los Angeles and Shanghai, as well as the Mobile digital identification. 360 Series of regional conferences. For more information, please visit the GSMA Digital Identity For more information, please visit the GSMA corporate website at www.gsma.com/digitalidentity website at www.gsma.com Follow GSMA Mobile for Development on Twitter: Follow the GSMA on Twitter: @GSMA @GSMAm4d This document is an output of a project funded by UK aid from the Department for International Development (DFID), for the benefit of developing countries. The views expressed are not necessarily those of DFID. Author: Matt Wilson, Senior Insights Manager, GSMA Rob Waddington, Futuresight Understanding Capture and Validate KYC Processes: Global Experiences, Challenges and Learnings v Contents Executive Summary .................................................................................
    [Show full text]
  • FX Harsono Gazing on Identity Menerawang Identitas Colophon
    Man as an individual has the freedom to decide their own will’ is a meaningless quote. When one is declared to be valid as a citizen the freedom changed. For the Chinese, although they were born in Indonesia, they are still considered as migrant. Apart from Indonesian Citizenship certificate, they must also have other documents, where this regulation is not applied to ‘real’ Indonesians. The dichotomy of real-migrant, free-bonded, is presented in this work. The facial expressions, poses, interaction in the family that seems to be free and happy on one side; and on the other side facing legal-formal issues that specifically only applies on them The point is, the law becomes discriminative if it applies only to suppress a community group. FX HARSONO GAZING ON IDENTITY Menerawang Identitas Colophon GAZING ON IDENTITY Menerawang Identitas Solo Exhibition of FX Harsono ARNDT Fine Art Gillman Barracks Singapore 20 October – 20 November 2016 Exhibition Curator Lisa Polten Writer Didi Kwartanada Text Translator Elly Kent Photo FX Harsono Design for Catalogue Sari Handayani Printed in Yogyakarta, Indonesia in an edition of 500 ©2016, FX. Harsono and the author 4 Didi Kwartanada THE PAPERS THAT SURVEILLED Identity Cards and Suspicion of the Chinese From time to time, the slip of paper featuring passport photos and personal details, which we usually call an “identity card” (Ind: kartu identitas), becomes the subject on national debate. During the New Order (1966-1998), citizenship cards (known as the “Kartu Tanda Penduduk”/KTP in Indonesia) belonging to former political prisoners (Ind: tahanan politik or simply “tapol”) were stamped with a special code, as were those belonging to ethnic Chinese.
    [Show full text]
  • How to Apply for a Social Insurance Number in Some EU States
    Professional European and Worldwide Accounts and Tax Advisors How to Apply for a Social Insurance Number in Some EU States This document provides information on obtaining a Social Insurance number in the following EU member states: Ø Spain Ø Belgium Ø Germany Ø Italy Ø Sweden Ø Poland Ø Norway Ø Denmark Ø Portugal Ø Greece Ø Hungary Ø Lithuania Ø Malta Ø The Netherlands Spain To apply for a Social Insurance number in Spain you first need to apply for a NIE number. How to get an NIE number in Spain The application process is quite easy. Go to your local National Police Station, to the Departmento de Extranjeros (Foreigners Department) and ask for the NIE application form. The following documents must be submitted to the police station to obtain a NIE number: Ø Completed and signed original application and a photocopy (original returned) Form can be downloaded here: http://www.mir.es/SGACAVT/extranje/regimen_general/identificacion/nie.htm Ø Passport and photocopy Address in Spain (you can use a friend's) Ø Written justification of why you need the NIE (issued by an accountant, a notary, a bank manager, an insurance agent a future employer, etc.) If you have any questions, call the National Police Station, the Departamento de Extranjeros (Foreigners Department) Tel: (+34) 952 923 058 When you hand in the documentation, a stamped photocopy of the application is returned to you along with your passport. Ask them when you should come back to pick up the document. The turnaround time fluctuates and your NIE can take one to six weeks.
    [Show full text]
  • KYC Practices in Indonesia and the Opportunity for Implementing E-KYC to Accelerate Financial Inclusion
    MSC Policy brief #24 KYC practices in Indonesia and the opportunity for implementing e-KYC to accelerate financial inclusion Agnes Salyanty, Arshi Aadil, Rahmatika Febrianti, Raunak Kapoor, and Sneha Sampath KYC practices in Indonesia and the opportunity for implementing e-KYC to accelerate financial inclusion Introduction and background In response to the COVID-19 pandemic, the Public infrastructure for electronic Know Your Government of India provided emergency Customer (e-KYC) has been critical to financial digital cash transfers to more than 300 million inclusion initiatives in many developing people within a month by utilizing the payment countries. E-KYC provides multiple benefits over system backed by Aadhaar, the foundational traditional paper-based KYC. It enables efficiency digital ID in the country. This included a total gains in terms of time, cost, and resource transfer of USD 3.8 billion (INR 280 billion) to requirements involved in the verification of the farmers, senior citizens, and women who were identity of an individual or entity. This ensures a identified quickly as they were beneficiaries of near real-time onboarding of a customer for any social protection programs. The digital payment financial product or service. Since an efficient infrastructure built around Aadhaar provides an KYC process is one of the most important and interoperable, cost-effective, quick, and secure costly aspects of any customer due diligence, payment solution using the digital ID to verify making it easy and cost-effective is the priority beneficiaries and authenticate transactions and of financial services providers. In addition, withdrawals. inefficiencies in the customer onboarding process can have a significant impact on the trust Countries have built robust architecture around of a potential customer in the financial service foundational identity systems that enable provider and consequently on the adoption and different stakeholders to access the identity uptake of its products and services.
    [Show full text]
  • Consolidated List of Financial Sanctions Targets in the Uk
    CONSOLIDATED LIST OF FINANCIAL SANCTIONS TARGETS IN THE UK Last Updated:29/04/2019 Status: Asset Freeze Targets REGIME: The ISIL (Da'esh) and Al-Qaida organisations INDIVIDUALS 1. Name 6: ABD AL-BAQI 1: NASHWAN 2: ABD AL-RAZZAQ 3: n/a 4: n/a 5: n/a. DOB: --/--/1961. POB: Mosul, Iraq a.k.a: (1) ABU ABDALLAH (2) AL-ANSARI, Abd, al-Hadi (3) AL-IRAQI, Abd Al- Hadi (4) AL-IRAQI, Abdal, Al-Hadi (5) AL-MUHAYMAN, Abd (6) AL-TAWEEL, Abdul, Hadi (7) ARIF ALI, Abdul, Hadi (8) MOHAMMED, Omar, Uthman Nationality: Iraqi National Identification no: Ration card no. 0094195 Other Information: UN Ref QI.A.12.01. (a) Fathers name: Abd al-Razzaq Abd al-Baqi, (b) Mothers name: Nadira Ayoub Asaad. Also referred to as Abu Ayub. Photo available for inclusion in the INTERPOL-UN Security Council Special Notice. Listed on: 10/10/2001 Last Updated: 07/01/2016 Group ID: 6923. 2. Name 6: 'ABD AL-NASIR 1: HAJJI 2: n/a 3: n/a 4: n/a 5: n/a. DOB: (1) --/--/1965. (2) --/--/1966. (3) --/--/1967. (4) --/--/1968. (5) --/--/1969. POB: Tall 'Afar, Iraq a.k.a: (1) ABD AL-NASR, Hajji (2) ABDELNASSER, Hajji (3) AL-KHUWAYT, Taha Nationality: Iraqi Address: Syrian Arab Republic.Other Information: UN Ref QDi.420. UN Listing (formerly temporary listing, in accordance with Policing and Crime Act 2017). ISIL military leader in the Syrian Arab Republic as well as chair of the ISIL Delegated Committee, which exercises administrative control of ISIL's affairs. Listed on: 20/11/2018 Last Updated: 23/11/2018 Group ID: 13720.
    [Show full text]
  • Seeking the State from the Margins: from Tidung Lands to Borderlands in Borneo
    Seeking the state from the margins From Tidung Lands to borderlands in Borneo Nathan Bond ORCID ID: 0000-0002-8094-9173 A thesis submitted in total fulfilment of the requirements for the degree of Doctor of Philosophy. December 2020 School of Social and Political Sciences The University of Melbourne i Abstract Scholarship on the geographic margins of the state has long suggested that life in such spaces threatens national state-building by transgressing state order. Recently, however, scholars have begun to nuance this view by exploring how marginal peoples often embrace the nation and the state. In this thesis, I bridge these two approaches by exploring how borderland peoples, as exemplars of marginal peoples, seek the state from the margins. I explore this issue by presenting the first extended ethnography of the cross-border ethnic Tidung and neighbouring peoples in the Tidung Lands of northeast Borneo, complementing long-term fieldwork with research in Dutch and British archives. This region, lying at the interstices of Indonesian Kalimantan, Malaysian Sabah and the Southern Philippines, is an ideal site from which to study borderland dynamics and how people have come to seek the state. I analyse understandings of the state, and practical consequences of those understandings in the lives and thought of people in the Tidung Lands. I argue that people who imagine themselves as occupying a marginal place in the national order of things often seek to deepen, rather than resist, relations with the nation-states to which they are marginal. The core contribution of the thesis consists in drawing empirical and theoretical attention to the under-researched issue of seeking the state and thereby encouraging further inquiry into this issue.
    [Show full text]
  • FATCA-CRS-Faqs.Pdf
    FATCA/CRS FAQs:- 1. What is FATCA? The Foreign Account Tax Compliance Act (FATCA) is a United States federal law that requires United States persons, including US persons who live outside the United States, to report their financial accounts held outside of the United States, and requires foreign financial institutions to report to the Internal Revenue Service (IRS) about their U.S. clients. Government of India (GOI) has signed a Model 1 Inter-Governmental Agreement (IGA) with US on July 9, 2015 which necessitates financial institutions in India to comply with FATCA. 2. What is CRS? CRS is known as Common Reporting Standards. It is an information standard for the automatic exchange of information (AEoI), developed in the context of the Organisation for Economic Co-operation and Development (OECD). The Government of India has also joined the Multilateral Competent Authority Agreement (MCAA) on June 3, 2015 and financial institutions in india to comply with CRS. 3. Why do we need to ask the FATCA/CRS declaration from the customer? Government of India (GOI) has signed a Model 1 Inter-Governmental Agreement (IGA) with US on July 9, 2015. The IGA provides that the Indian FIs will provide the necessary information to Indian tax authority i.e. Central Board of Direct Taxes (CBDT), which will then be transmitted to USA automatically in case of FATCA. The Government of India has also joined the Multilateral Competent Authority Agreement (MCAA) on June 3, 2015, for exchanging information with respective tax authorities from 63 partner jurisdictions which are signatories to MCAA. To enable this, CBDT has issued a notification to all financial institutions in India to comply with the CRS and FATCA regulations.
    [Show full text]
  • Tax ID Table
    Country Flag Country Name Tax Identification Number (TIN) type TIN structure Where to find your TIN For individuals, the TIN consists of the letter "E" or "F" followed by 6 numbers and 1 control letter. TINs for Número d’Identificació residents start with the letter "F." TINs for non-residents AD Andorra Administrativa (NIA) start with the letter "E". AI Anguilla N/A All individuals and businesses receive a TIN (a 6-digit number) when they register with the Inland Revenue Department. See http://forms.gov. AG Antigua & Barbuda TIN A 6-digit number. ag/ird/pit/F50_Monthly_Guide_Individuals2006.pdf CUIT. Issued by the AFIP to any individual that initiates any economic AR Argentina activity. The CUIT consists of 11 digits. The TIN is generated by an automated system after registering relevant AW Aruba TIN An 8-digit number. data pertaining to a tax payer. Individuals generally use a TFN to interact with the Australian Tax Office for various purposes and, therefore, most individuals have a TFN. This includes submitting income tax returns, reporting information to the ATO, obtaining The Tax File Number (TFN) is an eight- or nine-digit government benefits and obtaining an Australian Business Number (ABN) AU Australia Tax File Number (TFN) number compiled using a check digit algorithm. in order to maintain a business. TINs are only issued to individuals who are liable for tax. They are issued by the Local Tax Office. When a person changes their residence area, the TIN AT Austria TIN Consists of 9 digits changes as well. TINs are only issued to people who engage in entrepreneurial activities and AZ Azerbaijan TIN TIN is a ten-digit code.
    [Show full text]
  • Trend Micro Data Protection Lists (Release 3.0)
    Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at: http://docs.trendmicro.com/ Trend Micro, the Trend Micro t-ball logo, and OfficeScan are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2014. Trend Micro Incorporated. All rights reserved. Document Part No. LPEM55806/121205 Release Date: September 2014 Document Version No.: 3.0 Protected by U.S. Patent No.: 5,623,600; 5,889,943; 5,951,698; 6,119,165 This document contains information common to all Trend Micro products that support data protection features. Detailed information about how to use specific features within your product may be available in the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base at the Trend Micro website. Read through the documentation before installing or using the product. Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Table of Contents Chapter 1: Data Loss Prevention - Predefined Data Identifiers and Templates Predefined Expressions ................................................................................
    [Show full text]
  • Forcepoint DLP Predefined Policies and Classifiers
    Forcepoint DLP Predefined Policies and Classifiers Predefined Policies and Classifiers | Forcepoint DLP | v8.5.x For your convenience, Forcepoint DLP includes hundreds of predefined policies and content classifiers. ● Predefined policies help administrators quickly and easily define what type of content is considered a security breach at their organization. While choosing a policy or policy category, some items are set “off” by default. They can be activated individually in the Forcepoint Security Manager. ■ Data Loss Prevention policies, page 2 ■ Discovery policies, page 108 ● Predefined classifiers can be used to detect events and threats involving secured data. This article provides a list of all the predefined content classifiers that Forcepoint DLP provides for detecting events and threats involving secured data. This includes: ■ File-type classifiers ■ Script classifiers ■ Dictionaries ■ Pattern classifiers The predefined policies and classifiers are constantly being updated and improved. See Updating Predefined Policies and Classifiers for instructions on keeping policies and classifiers current. © 2017 Forcepoint LLC Data Loss Prevention policies Predefined Policies and Classifiers | Forcepoint DLP | v8.5.x Use the predefined data loss prevention policies to detect sensitive content, compliance violations, and data theft. For acceptable use policies, see: ● Acceptable Use, page 3 The content protection policies fall into several categories: ● Company Confidential and Intellectual Property (IP), page 4 ● Credit Cards, page 9 ● Financial
    [Show full text]
  • Sis Ii S the Schengen Information System a Guide
    SIS II SUPERVISION COORDINATION GROUP THE SCHENGEN INFORMATION SYSTEM A GUIDE FOR EXERCISING THE RIGHT OF ACCESS Secretariat postal address: rue Wiertz 60 - B-1047 Brussels Offices: rue Montoyer 30 E-mail : [email protected] Tel.: 02-283 19 13 - Fax : 02-283 19 50 This guide has been compiled by the SIS II Supervision Coordination Group Address: rue Wiertz 60 - B-1047 Brussels Offices: rue Montoyer 30 E-mail : [email protected] Tel.: 02-283 19 13 - Fax : 02-283 19 50 SIS II Supervision Coordination Group - A Guide for exercising the right of access Issued in October 2014 - Updated in October 2015 TABLE OF CONTENTS I. Introduction to the second generation Schengen information system (SIS II) ........................... 5 II. Rights recognized to individuals whose data is processed in the SIS II ..................................... 7 II.1. Right of access .................................................................................................................. 8 II.1.1. Direct access ................................................................................................... 8 II.1.2. Indirect access ................................................................................................ 9 II.2. Right to correction and deletion of data ............................................................................ 9 II.3. Remedies: the right to complain to the data protection authority or to initiate a judicial proceeding ...........................................................................................................
    [Show full text]