Help Center
Quick Start
- Overview
- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
File Auditing
- About File Auditing
- Domain configuration
- File server configuration
- Failover cluster configuration
- NetApp server configuration
- Workgroup configuration
Setting up File Audit
Dashboard
Reports
Alerts
Configuration
Storage Configuration
File Analysis
- About File Analysis
- On-Demand Reports
Setting up File Analysis
Dashboard
Reports
Alerts
Configuration
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
Dashboard
Reports
Ownership analysis
Configuration
Endpoint DLP
- About Endpoint DLP
Setting up Endpoint DLP
Reports
Alerts
Prevention policies
Configuration
Cloud Protection
- About Cloud Protection
- Gateway Server Configuration
- Certificate Authority Configuration
- Gateway Configuration in Endpoint
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Gateway Server Failover
- Two-way SSL configuration
- Global Insight
- Application Insight
- User Insight
- Shadow Application Insight
- Banned Application Insight
- Cloud App Discovery
- Cloud Access Reports
- Application Insights
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload & Download Reports
Setting up Cloud Protection
Dashboard
Reports
Control Policies
Storage Configuration
Administrative settings
- Technician configuration
- Notification filters
- Manage agent
- Agent settings
- SIEM integration
- Business hours configuration
- Two-factor authentication
- Workgroup configuration
- Security policy
Email configuration
General settings
- Connection
- Personalize
- DataSecurity Plus Server
- Privacy Settings
- Disk utilization
- Schedule Retention Policy
Policy Configuration
Release notes
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
Troubleshooting
- HTTP communication failure
- Dormant DataEngine
- Secure Gateway server failure
- RPC communication failure
- Known issues and limitations
- Known errors and solutions
Guides
- Agent document
- How to Migrate/Move DataSecurity Plus
- How to apply SSL certificate
- How to automate DataSecurity Plus database backup
- How to set alerts in DataSecurity Plus
- How to secure your DataSecurity Plus installation
Policy
DataSecurity Plus uses predefined policies to identify endpoint security vulnerabilities in real time.
You can monitor the following security policies using the Endpoint DLP solution:
Data Leak Prevention
Block files containing business-critical data from leaving the network via USBs and email.
File Activity Monitoring
Audit accesses and changes made to files in workstations.
File Copy Auditing
Audit file copy actions by users both within workstations as well as to external storage devices.
File Integrity Monitoring
Detect and respond to unauthorized changes made to sensitive files by users.
Potential Malware Intrusion
Detect potential malware by receiving alerts when safe threshold limits are breached.
Removable Device Auditing
Audit the use of USBs and other removable storage devices.
Sensitive File Activity Monitoring and Response
Receive reports on user activities in files containing sensitive data such as PII and ePHI.
Steps to modify the predefined policies:
- Select Endpoint DLP from the application drop-down and navigate to Configuration > Policies.
- Click the edit icon next to the predefined policy you want to modify.
- In the Applies To field, select the desired groups and devices.
- Add or remove rules configured under Audit Profiles, Alert Profiles, and Prevention Policies.
- Click Save.
Steps to create a new DLP policy:
- Select Endpoint DLP from the application drop-down and navigate to Configuration > Policies.
- Click + Add Policy in the top-right corner.
- Name the policy and include an appropriate description.
- Choose the endpoints that it applies to.
- Choose the rules that you want to add from the Audit Profiles, Alert Profiles, or Prevention Policies section.
- Click Save.
Example: If you want to block sensitive files from being sent as attachments via email, select the Data Leak Prevention - email policy.
Note: The External Device Control Policy will appear in the menu only when a profile is created under that policy.