Data Loss Prevention R80.40 Administration Guide
Total Page:16
File Type:pdf, Size:1020Kb
22 January 2020 DATA LOSS PREVENTION R80.40 Administration Guide ] Protected [Classification: Check Point Copyright Notice © 2020 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c) (1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: Refer to the Copyright page for a list of our trademarks. Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses. Data Loss Prevention R80.40 Administration Guide Important Information Latest Software We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements and protection against new and evolving attacks. Certifications For third party independent certification of Check Point products, see the Check Point Certifications page. Check Point R80.40 For more about this release, see the R80.40 home page. Latest Version of this Document Open the latest version of this document in a Web browser. Download the latest version of this document in PDF format. Feedback Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments. Revision History Date Description 22 January 2020 First release of this document Data Loss Prevention R80.40 Administration Guide | 3 Table of Contents Table of Contents Glossary 10 Introduction to Data Loss Prevention 20 The Need for Data Loss Prevention 20 Data Loss Prevention and Privacy 20 The Check Point Solution for DLP 21 Content Awareness Software Blade 22 How DLP Works 22 Integrated DLP Security Gateway Deployment 23 Dedicated DLP Gateway Deployment 24 Alternative Gateway Deployments 26 What Happens on Rule Match 28 Role of DLP Administrator 28 DLP Permissions for Administrator Accounts 29 Configuring Full DLP Permissions 30 Configuring a Subset of Permissions 30 Installation and Configuration 32 Installing the DLP Gateway 32 DLP Software Blade Trial License 32 Configuring a DLP Gateway or Security Cluster 32 Data Loss Prevention Wizard 34 Configuring a DLP Gateway in Bridge Mode 35 Configuring Active Directory and LDAP for DLP 36 Rerunning the Data Loss Prevention Wizard 37 Configuring a DLP Gateway for a Web Proxy 37 Configuring DLP for an Internal Web Proxy 39 Configuring Proxy Settings after Management Upgrade 39 Mail Server Required Configuration 40 Action Settings for DLP Rules 40 Configuring Mail Relay 41 Configuring Settings for the Mail Relay 41 Data Loss Prevention R80.40 Administration Guide | 4 Table of Contents Configuring a Dedicated DLP Gateway and Relay on DMZ 42 Recommended Deployment - DLP Gateway with Mail Relay 43 Workarounds for a Non-Recommended Mail Relay Deployment 44 Untrusted Mail Relays and Microsoft Outlook 46 TLS-Encrypted SMTP Connections 46 Configuring Incident Log Handling 46 Configuring the Exchange Security Agent 47 Configuring SmartConsole for the Exchange Security Agent 48 Exchange Server Configuration 49 Configuring SMTP Mirror Port Mode 53 Configuring HTTPS Inspection 54 Inspecting HTTPS Packets 55 Outbound Connections 55 Inbound Connections 55 Configuring Gateways to Inspect Outbound and Inbound HTTPS 56 UserCheck Interaction Objects 66 Configuring UserCheck 66 Kerberos Single Sign On 67 UserCheck Page 71 Creating UserCheck Interaction Objects 72 Plain Text Email Notifications 74 More UserCheck Interaction Options 75 Localizing and Customizing the UserCheck Portal 75 UserCheck Client 77 Enabling UserCheck Client 77 Client and Gateway Communication 78 Renaming the MSI 79 Troubleshooting DNS Based Configuration 82 Getting the MSI File 83 Distributing and Connecting Clients 83 UserCheck and Check Point Password Authentication 85 Helping Users 85 Out of the Box 87 Data Loss Prevention R80.40 Administration Guide | 5 Table of Contents Default Deployment 87 Data Loss Prevention in SmartDashboard 87 Defining My Organization 89 Adding Email Addresses and Domains to My Organization 89 Managing Users 90 Managing Networks 91 Managing VPNs 92 Data Loss Prevention Policies 94 Overview of DLP Rules 94 DLP and Identity Awareness 95 DLP Rule Matching 98 DLP Rule Actions 99 Managing Rules in Detect 100 Setting DLP Rule Tracking 100 Store Incident 101 Setting a Time Restriction 103 DLP Selective Deployment 104 Auditing and Analysis of Incidents 105 DLP Actions 106 Data Owner and User Notifications 110 Defining Data Owners 110 Preparing Corporate Guidelines 110 Communicating with Data Owners 111 Communicating with Users 112 Notifying Data Owners 113 Notifying Users 113 Customizing Notifications 114 Setting and Managing Rules to Ask User 116 Setting Rules to Ask User 116 Managing Rules in Ask User 116 DLP Self Incident-Handling Portal 117 What Users See and Do 117 Unhandled UserCheck Incidents 117 Data Loss Prevention R80.40 Administration Guide | 6 Table of Contents Managing Incidents by Replying to Emails 118 UserCheck Notifications 118 Learning Mode 118 Data Loss Prevention by Scenario 120 Analytical Deployment 120 Creating New Rules 120 Internal DLP Policy Rules 121 More Options for Rules 123 Rule Exceptions 124 Fine Tuning 127 Customized Deployment 127 Setting Rules to Prevent 128 Multi-Realm Authentication Support 128 Troubleshooting DLP-Related Authentication Issues 129 Defining Data Types 130 Protecting Data by Keyword 130 Protecting Data by Pattern 131 Protecting Documents by Template 131 Protecting Data by Fingerprint 133 Repository Scanning 134 Filtering the Repository for Efficiency 134 Granularity 134 Scan Times 135 Logging 135 Log Details 135 NFS Repository scanning in NATed Environments 139 Protecting Files by Attributes 139 Defining Compound Data Types 140 Advanced Data Types 140 Enhancing Accuracy through Statistical Analysis 145 Adding Data Types to Rules 146 Repositories 156 Whitelist Policy 158 Data Loss Prevention R80.40 Administration Guide | 7 Table of Contents Defining Email Addresses 159 Configuring the DLP Watermark 160 Watermarking documents 160 Creating a New Watermark Profile 161 Adding a Shadow Behind Watermark Text in Word and PowerPoint 162 Configuring Watermark Settings on the General Page 163 Configuring Watermark Settings on the Hidden Text Page 163 Completing the Watermark Profile 164 Previewing Watermarks 164 Viewing Watermarks in MS Office Documents 164 Resolving Watermark Conflicts 165 Turning Watermarking On and Off 168 Using the DLP Watermark Viewing Tool 168 Fine Tuning Source and Destination 169 Creating Different Rules for Different Departments 169 Isolating the DMZ 171 Defining Strictest Security 171 Defining Protocols of DLP Rules 172 Fine Tuning for Protocol 173 Configuring More HTTP Ports 173 Advanced Configuration 175 Configuring User Access to an Integrated DLP Gateway 175 Internal Firewall Policy for a Dedicated DLP Gateway 176 Advanced Expiration Handling 177 Advanced SMTP Quotas 177 Advanced FTP and HTTP Quotas 178 Advanced User Notifications 179 Gateway Cleanup of Data 179 Gateway Cleanup of Expired Data 180 Gateway Cleanup of All Captured Data 180 Customizing DLP User-Related Notifications 182 Supporting LDAP Servers with UTF-8 Records 184 Configuring the Corporate Guidelines Link 185 Data Loss Prevention R80.40 Administration Guide | 8 Table of Contents Editing Extreme Condition Values 185 Editing Exchange Security Agent Values 187 Configuring HTTP Inspection on All Ports 189 Defining New File Types 189 Supported File Types 190 Server Certificates 207 Obtaining, Installing, and Viewing a Trusted Server Certificate 207 Troubleshooting 210 Incidents Do Not Expire 210 Mail Server Full 210 Advanced Options for Data Types 212 Regular Expressions and Character Sets 215 Non-Printable Characters 216 Character Types 216 Supported Character Sets 216 Character Set Aliases 218 Command Line Reference 220 Syntax Legend 220 dlpcmd 223 Working with Kernel Parameters on Security Gateway 226 Kernel Debug on Security Gateway 227 Data Loss Prevention R80.40 Administration Guide | 9 Glossary Glossary A Administrator A user with permissions to manage Check Point security products and the network environment. API In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software. In general terms, it is a set of clearly defined methods of communication between various software components. Appliance A physical computer manufactured and distributed by Check Point. B Bond A virtual interface that contains (enslaves) two or more physical interfaces for redundancy and load sharing. The physical interfaces share one IP address and one MAC address. See "Link Aggregation". Bonding See "Link Aggregation". Bridge Mode A Security Gateway or Virtual System that works as a Layer 2 bridge device for easy deployment in an existing topology. Data Loss Prevention R80.40 Administration Guide | 10 Glossary C CA Certificate