Home » Understanding Data Loss Prevention
 

Understanding Data Loss Prevention

Endpoint Central's Data Loss Prevention provides a robust layer of security by preventing unauthorized access and leakage of sensitive data. This document delves into the specifications of the agent processes and the core mechanisms behind Data Loss Prevention, helping you understand how it safeguards your endpoints and protects critical information from unauthorized exposure.

Specifications of Agent Processes

Agent Process Running Device Name Bandwidth Consumption (Approximately) CPU Consumption (Approximately) Memory Consumption (Approximately)
Processing EDLP Policy Medlp.exe N.A. <0.5% 20-22 MB
Classifying Process UemsProcessMonitor.exe N.A. 0.11-0.13% 23-25 MB
Network Packet Monitor Netfilter.exe N.A. <0.1% 6-8 MB
Clipboard Monitor HostExe N.A. <0.1% 3-4 MB
Monitoring Browser File upload DLPNativeHost.exe N.A. <0.1% 10-11 MB
Component Upgrade meaaphelper.exe 14-17 MB 0-1% 1 MB
Build after 11.4.2504.01 (UemsProcessMonitor.exe is merged with MEDLP.exe)
Processing DLP Policy and Process Classification Medlp.exe (During background scan and process classification) N.A. 10-20% 25-120 MB
Processing DLP Policy and Process Classification Medlp.exe (After background scan completion) N.A. <0.5% 20-25 MB

Policy Deployment: Agent-Server Synchronization

Policy Deployment

When an Data Loss Prevention policy is created, it is deployed in the following two options:

  • Deploy Immediately option: The policy is immediately pushed to and applied on agent machines that are currently online. For large CGs (over 200 machines), the policy is applied to 200 machines initially, with the rest following in the next refresh cycle.
  • Deploy option: The policy is scheduled for the next 90-minute refresh cycle.

Policy modifications, deletions, group changes, and unmanaged Device updates are synchronized with agent machines during refresh cycles. In environments with a Distribution Server, policies and configurations are replicated to the Distribution Server and then synchronized with agent machines during the 90-minute refresh cycle.

Policy Enforcement in Agent

The Data Loss Prevention policy will be received by the agent and enforced by the kernel mode driver named medlp. This driver monitors device connections and ensures that only authorized devices can be accessed according to the deployed policy. Audited and blocked device events will be posted in the 90-minute refresh cycle.

App Request

Sensitive Data Discovery

After agent installation, the agent remains dormant until a policy is deployed. Once a policy is in place, the agent scans endpoints for sensitive files based on the defined rules.

Endpoint DLP Conflict Precedence

When conflicting policies are applied to the same target group, The following is the order of precedence:

  1. Block
  2. Allow within Trusted
  3. Audit Only

For Example: In Endpoint DLP, if a block policy conflicts with an "Allow Trusted" rule, the sensitive file will be blocked.
Was this article helpful?

Thank you for your feedback!

Sorry about that!

By clicking "Submit", you agree to processing of personal data according to thePrivacy Policy.
Back to Top