Help Center
Quick Start
- Overview
- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
File Auditing
- About File Auditing
- Domain configuration
- File server configuration
- Failover cluster configuration
- NetApp server configuration
- Workgroup configuration
Setting up File Audit
Dashboard
Reports
Alerts
Configuration
Storage Configuration
File Analysis
- About File Analysis
- On-Demand Reports
Setting up File Analysis
Dashboard
Reports
Alerts
Configuration
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
Dashboard
Reports
Ownership analysis
Configuration
Endpoint DLP
- About Endpoint DLP
Setting up Endpoint DLP
Reports
Alerts
Prevention policies
Configuration
Cloud Protection
- About Cloud Protection
- Gateway Server Configuration
- Certificate Authority Configuration
- Gateway Configuration in Endpoint
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Gateway Server Failover
- Two-way SSL configuration
- Global Insight
- Application Insight
- User Insight
- Shadow Application Insight
- Banned Application Insight
- Cloud App Discovery
- Cloud Access Reports
- Application Insights
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload & Download Reports
Setting up Cloud Protection
Dashboard
Reports
Control Policies
Storage Configuration
Administrative settings
- Technician configuration
- Notification filters
- Manage agent
- Agent settings
- SIEM integration
- Business hours configuration
- Two-factor authentication
- Workgroup configuration
- Security policy
Email configuration
General settings
- Connection
- Personalize
- DataSecurity Plus Server
- Privacy Settings
- Disk utilization
- Schedule Retention Policy
Policy Configuration
Release notes
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
Troubleshooting
- HTTP communication failure
- Dormant DataEngine
- Secure Gateway server failure
- RPC communication failure
- Known issues and limitations
- Known errors and solutions
Guides
- Agent document
- How to Migrate/Move DataSecurity Plus
- How to apply SSL certificate
- How to automate DataSecurity Plus database backup
- How to set alerts in DataSecurity Plus
- How to secure your DataSecurity Plus installation
Workstation configuration
In the Endpoint DLP module, you can either configure workstations individually or add them to groups and configure them in bulk.
Best practice: We recommend grouping workstations and configuring them in bulk because this streamlines the application of DLP policies and makes it easier to manage them.
A. Configuring workstations individually
To configure workstations individually, follow these steps:
- Select Endpoint DLP from the modules drop-down in the top-left corner.
- Go to Configuration > Devices > Configured Workstations.
- Click + Add Workstation(s).
- Select your domain from the drop-down.
- Click + in the Select Workstation(s) field to add your required workstations.
- Select the security policies you want to apply for the selected workstations.
- If you want to add specific folders to be monitored on the selected workstations, click Folder Settings > Local Folders and enter the path of the folder.
- Click Install Agent and Finish.
Note: To add a domain that is not listed, click the Domain button and follow these steps.
B. Configuring workstations in bulk
To configure workstations in bulk, follow these steps:
- Select Endpoint DLP from the modules drop-down in the top-left corner.
- Go to Configuration > Devices > Configured Groups.
- Click + Create Group.
- Enter your desired group name and description.
- Select whether you want to add workstations or OUs to the group.
- Select your domain from the drop-down.
- Click + in the Select Workstation(s) or Select OU(s) field to add your required workstations or OUs.
- Select the security policies you want to apply to the group.
- Click Create Group.
Note:
- Ensure that all workstations in the group are in the same domain.
- A workstation can only be part of one group.
- When two conflicting policies are applied to a workstation, the most restrictive policy is applied, regardless of whether the policy was applied directly or through a group.