Mcafee Total Protection for Data Loss Prevention 9.2 Software Product Guide Contents
Total Page:16
File Type:pdf, Size:1020Kb
Product Guide Revision A McAfee Total Protection for Data Loss Prevention 9.2 Software COPYRIGHT Copyright © 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Total Protection for Data Loss Prevention 9.2 Software Product Guide Contents Preface 13 About this guide ..................................13 Audience ..................................13 Conventions .................................13 About this guide ...............................14 Finding product documentation ............................14 1 Introducing McAfee Total Protection for Data Loss Prevention 15 How McAfee DLP works ...............................16 McAfee DLP products ................................17 McAfee DLP Endpoint integration ...........................17 Hardware and operating system improvements ......................18 Discover features .................................18 Internationalization features .............................19 Usability improvements ...............................19 System improvements ................................19 Capture engine enhancements ............................20 Browser support ..................................20 McAfee DLP data types ............................... 20 2 Home 23 How the Home page is configured ...........................23 How the Home page is used .............................23 Customize the Home page ..............................23 Check Home page permissions ............................24 3 Using the Incidents dashboard 25 How incidents are sorted ...............................25 Find policy violations .............................26 Find violations by attribute ...........................26 Delete incidents ...............................26 Delete similar incidents ............................26 How incidents are filtered ..............................26 Filter incidents ................................27 Group incidents ...............................27 Set a time filter for incidents ..........................27 Clear filters .................................28 How to work with incident details ...........................28 Get incident details ..............................29 Find concept matches .............................30 Find match strings ..............................30 Get history of incidents ............................30 Find case status of incidents ..........................30 Assign incidents to cases ........................... 31 Add attributes to incidents ...........................31 McAfee Total Protection for Data Loss Prevention 9.2 Software Product Guide 3 Contents Tune rules ................................. 32 Get related incidents .............................33 How views are set up ................................33 Save views .................................33 Select pre-configured views .......................... 34 Select view vectors ..............................34 Select graphical views .............................34 Copy views to users ............................. 34 Delete views ................................ 35 How reports are generated ..............................35 Create PDF reports ..............................35 Create HTML reports .............................36 Create CSV reports ..............................36 Schedule reports ...............................36 Add report titles ...............................37 How dashboards are customized ........................... 37 Expand dashboard display ...........................37 Add rows to the dashboard ...........................37 Configure dashboard columns ..........................38 Add a match string column ...........................38 How dashboard settings work .............................38 Encrypt incidents ...............................39 Configure throttling to limit incidents reported ...................39 4 Search 41 How data is captured and processed ..........................41 How the capture engine works ............................42 How capture works .................................43 Get search details .................................43 Stop searches ...................................43 Set search parameters ............................... 44 Set up search notification ..............................44 Search by attribute ................................ 45 Finding email ................................45 Finding files ................................ 49 Finding keywords ...............................53 Find chat sessions ..............................55 Find geographic users and incidents .......................55 Find IP addresses .............................. 56 Find a range of IP addresses ..........................56 Find IP addresses on subnets ..........................56 Exclude IP addresses .............................56 Find source code ...............................57 Find websites ................................57 Rules used by the capture engine ...........................57 Distributed searching .............................58 Large-scale searches .............................58 Number of results supported ..........................58 Time-stamping files ..............................58 Archive handling ...............................58 Case insensitivity ...............................59 Microsoft Office 2007 anomalies .........................59 Negative searches ..............................59 Proper name treatment ............................59 Parts of speech excluded from capture ......................59 Special character exceptions ..........................60 4 McAfee Total Protection for Data Loss Prevention 9.2 Software Product Guide Contents Word stemming ...............................60 Languages supported by search engine ..................... 60 Use logical operators in queries ............................61 Logical operators supported in queries ......................61 Tips for searching ................................. 62 Search by excluding content concepts ......................63 Search by excluding ports ...........................64 Search by excluding protocols ......................... 64 Search by file creation time .......................... 64 Search by file last modification time .......................65 Search by global time .............................65 Search by local time globally ..........................66 Search by port ................................66 Search by port range .............................67 Search by protocol ..............................67 Search in a relative time frame .........................68 Search using content concepts .........................68 Use concept expressions ............................68 5 Policies 71 International policies ................................72 How policy inheritance works ............................ 72 How policy activation works .............................72 Activate policies ...............................73 Deactivate policies ..............................73 Work with policies .................................73 Add policies .................................74 Policy fields .................................74 Rename policies ...............................75 Clone policies ................................75 Change ownership of policies ..........................75 Change states of policies ........................... 76 Modify policies ................................76 Execute policies ...............................76 Delete policies ................................77 Publish policies ............................... 77 Rules ...................................... 77 View rule parameters .............................77 Add rules ..................................78 Disable rule inheritance ............................78 Copy rules to policies .............................79 Modify rules .................................79 Delete rules .................................79 Reconfigure rules for web traffic .........................80 Exceptions