McAfee Data Loss Prevention 9.2.2 Product Guide
McAfee Data Loss Prevention 9.2.2 Product Guide
McAfee Data Loss Prevention 9.2.2 Product Guide
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
ContentsTypical scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Monitor source code using a template . . . . . . . . . . . . . . . . . . . . . . 239Find images using a template . . . . . . . . . . . . . . . . . . . . . . . . . 239Use a template to protect archives . . . . . . . . . . . . . . . . . . . . . . . 240Use a template to search for documents . . . . . . . . . . . . . . . . . . . . . 241How templates work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241Review template construction . . . . . . . . . . . . . . . . . . . . . . . . . 242Extending queries or rules with templates . . . . . . . . . . . . . . . . . . . . 242Add, modify, and delete templates . . . . . . . . . . . . . . . . . . . . . . . . . . 242Add or modify templates . . . . . . . . . . . . . . . . . . . . . . . . . . . 243Delete templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243Remove templates from rules . . . . . . . . . . . . . . . . . . . . . . . . . 24313 Managing <strong>McAfee</strong> DLP systems 245Configure <strong>McAfee</strong> DLP devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245Configure <strong>McAfee</strong> DLP devices . . . . . . . . . . . . . . . . . . . . . . . . . 245Add <strong>McAfee</strong> DLP devices . . . . . . . . . . . . . . . . . . . . . . . . . . . 246Restart <strong>McAfee</strong> DLP appliances or services . . . . . . . . . . . . . . . . . . . . 247Deregister <strong>McAfee</strong> DLP devices . . . . . . . . . . . . . . . . . . . . . . . . . 247Change link speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247Setting wiping policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248Manage <strong>McAfee</strong> DLP appliance disk space . . . . . . . . . . . . . . . . . . . . 248Using capture filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249Typical scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249How content capture filters work . . . . . . . . . . . . . . . . . . . . . . . . 252How network capture filters work . . . . . . . . . . . . . . . . . . . . . . . 252Types of capture filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253Add content capture filters . . . . . . . . . . . . . . . . . . . . . . . . . . 254Add network capture filters . . . . . . . . . . . . . . . . . . . . . . . . . . 255Copy capture filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255Deploy capture filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256View deployed capture filters . . . . . . . . . . . . . . . . . . . . . . . . . 256Remove deployed capture filters . . . . . . . . . . . . . . . . . . . . . . . . 257Reprioritize capture filters . . . . . . . . . . . . . . . . . . . . . . . . . . . 257Modify capture filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257Adding servers to <strong>McAfee</strong> DLP systems . . . . . . . . . . . . . . . . . . . . . . . . 258Synchronize and troubleshoot <strong>McAfee</strong> DLP connections . . . . . . . . . . . . . . . 258Using DLP on directory servers . . . . . . . . . . . . . . . . . . . . . . . . . 261Adding <strong>McAfee</strong> Logon Collector servers to <strong>McAfee</strong> DLP . . . . . . . . . . . . . . . 269Adding DHCP servers to DLP systems . . . . . . . . . . . . . . . . . . . . . . 271Using network statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272Types of network statistics . . . . . . . . . . . . . . . . . . . . . . . . . . 272Filtering network statistics . . . . . . . . . . . . . . . . . . . . . . . . . . 272Managing users and groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273Managing user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . 273Managing user groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275Set permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276Monitoring audit logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278Technical specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280<strong>McAfee</strong> DLP rack mounting requirements . . . . . . . . . . . . . . . . . . . . 280<strong>McAfee</strong> DLP power redundancy . . . . . . . . . . . . . . . . . . . . . . . . 280<strong>McAfee</strong> DLP FCC compliance . . . . . . . . . . . . . . . . . . . . . . . . . 280<strong>McAfee</strong> DLP safety compliance guidelines . . . . . . . . . . . . . . . . . . . . 28114 Disaster recovery backup and restore 283How the backup and restore process works . . . . . . . . . . . . . . . . . . . . . . . 28310 <strong>McAfee</strong> <strong>Data</strong> <strong>Loss</strong> <strong>Prevention</strong> <strong>9.2.2</strong> <strong>Product</strong> <strong>Guide</strong>