Difference between revisions of "DLP"
m (1 revision imported: Importing all pages) |
|||
Line 6: | Line 6: | ||
= <span class="mw-headline" id="Prerequisites">Prerequisites</span> = | = <span class="mw-headline" id="Prerequisites">Prerequisites</span> = | ||
HTTPS Inspection should be enabled in SafeSquid. If not enabled, you can check our document '''- [ | HTTPS Inspection should be enabled in SafeSquid. If not enabled, you can check our document '''- [https://docs.safesquid.com/wiki/Configure_HTTPS_Inspection How to enable HTTPS Inspection]''' | ||
== <span class="mw-headline" id="Access_the_SafeSquid_interface"><span class="mw-headline" id="Access_the_SafeSquid_interface">[ | == <span class="mw-headline" id="Access_the_SafeSquid_interface"><span class="mw-headline" id="Access_the_SafeSquid_interface">[https://docs.safesquid.com/wiki/Access_The_SafeSquid_User_Interface Access the SafeSquid interface]</span></span> == | ||
== Go to configure page == | == Go to configure page == | ||
Line 107: | Line 107: | ||
== [https://docs.safesquid.com/wiki/How_to_block_file_uploads_or_downloads <span class="toctext">Prevent Uploads Of Selective File Types</span>] == | == [https://docs.safesquid.com/wiki/How_to_block_file_uploads_or_downloads <span class="toctext">Prevent Uploads Of Selective File Types</span>] == | ||
== [ | == <span class="toctext">[https://docs.safesquid.com/wiki/How_To#Block_Emails_or_Files_including_archives_or_Social_Posts_using_Keywords Block Emails or Files including archives or Social Posts using Keywords]</span> == |
Revision as of 12:54, 15 June 2022
Overview
DLP is nothing but Data Loss Prevention module in Safequid. DLP module was introduced in SafeSquid to restrict end users from sending sensitive or critical information outside the corporate network. You can achieve this simply by creating rule(s) in DLP section for blocking the predefined content type.
Prerequisites
HTTPS Inspection should be enabled in SafeSquid. If not enabled, you can check our document - How to enable HTTPS Inspection
Access the SafeSquid interface
Go to configure page
|
|
|
|
|
|
ALL The Following Entries will be tested from top to bottom.
Enabled
Enable or Disable this entry.
- TRUE : Enable this entry.
- FALSE : Disable this entry.
Comment
For documentation and future references, explain the relevance of this entry with your policies.
That is, by reading the policies, a future user can understand the purpose of that entry.
Profiles
Specify the list of Profiles that should be applicable for this entry.
This entry will be applicable only if the connection has any one of the specified profiles.
Leave it Blank, to apply for all connections irrespective of any applied profile.
To avoid application to a connection that has a profile, use negated profile (!profile).
Upload Content type
Select the list of upload content types or content categories, to which this entry will be applicable.
The connection should have been already profiled to have one or more of these content types or content categories to match.
Use Negation "!", to match this entry, only when specified content types or content categories are not applied to the connection.
Leave it blank to match this entry irrespective of applied content types or content categories.
If you set this to "Image, Pdf, Audio, !Text, !Jpeg ", then this entry will be applicable to only those connections that have been profiled as Image, or Pdf, or Audio,
or not profiled as Text or Jpeg.
Action
Specify action to enforce on matched connections.
- DO_NOT_BYPASS : Select this, if you want to strictly block the websites.
- ALLOW : Select this, if you want to allow requests matching this policy.
- DENY : Select this, if you want to block requests matching this policy. Will not block the requests to those users who have allow bypass set from the access section.