12.07.2015 Views

McAfee Data Loss Prevention 9.2.2 Product Guide

McAfee Data Loss Prevention 9.2.2 Product Guide

McAfee Data Loss Prevention 9.2.2 Product Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

13Managing <strong>McAfee</strong> DLP systemsAdding servers to <strong>McAfee</strong> DLP systemsEach account on an Active Directory server is made up of attributes that identify the individual whoowns the account. <strong>McAfee</strong> Logon Collector matches the unique SIDs that are assigned to each ActiveDirectory user to IP addresses, and all of the parameters associated with that SID are extracted when<strong>McAfee</strong> Logon Collector moves binding updates from the Active Directory server to <strong>McAfee</strong> DLP.Because sAMAccountName was used to index data in earlier releases, that information might be lostduring ad hoc searches when the user upgraded, or the data residing in the capture database pre‐datesthe upgrade.How directory servers are used with DLP systemsIf a directory server is added to <strong>McAfee</strong> <strong>Data</strong> <strong>Loss</strong> <strong>Prevention</strong> Manager, DLP can use the data on theserver to identify remote users and manage their data.Directory servers enable enterprise users to locate users through their logins, email or IP addresses,or by compound rules that combine user logins with locations or affiliations.How LDAP user accounts are monitoredHistorically, DLP Manager has been linked to sAMAccountName as the main user identificationelement. But if that attribute is applied to users in the same domain who have similar or matchinguser names, they cannot be positively identified.<strong>McAfee</strong> <strong>Data</strong> <strong>Loss</strong> <strong>Prevention</strong> now keys on the unique alphanumeric SID (Security Identifier) that isassigned to each user account by the Windows domain controller.For example, the user name jsmith might belong to John Smith or Jack Smith, so more informationwould be needed to distinguish between those two users. Those individuals might even be using thesame IP address, which would aggravate the problem of discovering the identity of the actual user.But each account on an Active Directory server is made up of attributes that identify the individualwho owns the account. <strong>McAfee</strong> Logon Collector matches the unique SIDs that are assigned to eachActive Directory user to IP addresses, and all of the parameters associated with that SID are extractedwhen <strong>McAfee</strong> Logon Collector moves binding updates from the Active Directory server to DLP.Because sAMAccountName was used to index data in earlier releases, that information might be lostduring ad hoc searches when the user has upgraded, or when the data residing in the capture databasepre‐dates the upgrade.Monitoring LDAP usersThe ability to monitor user traffic on LDAP servers has extended the reach of <strong>McAfee</strong> DLP tools todirectory servers used by enterprise‐sized organizations. Connections through multiple domaincontrollers makes this possible.<strong>Data</strong> on local networks is captured and the software extends this capability to all traffic on up to tworemote LDAP servers.When users can be recognized by name, group, department, city or country, a DLP administrator canextract a great deal of significant information by using what little information is known about thoseusers to gradually gather more details about a potential threat.For example, suppose you know that your company has lost intellectual property to a Chinese firm,and you suspect that the leak came from an insider in your Shanghai branch.Because <strong>McAfee</strong> DLP Monitor captures all traffic on your company's network, you can add an ActiveDirectory server that contains the user account of that insider to <strong>McAfee</strong> DLP Manager, then search forthe UserName of that individual and monitor his communications.262 <strong>McAfee</strong> <strong>Data</strong> <strong>Loss</strong> <strong>Prevention</strong> <strong>9.2.2</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!