12.07.2015 Views

McAfee Data Loss Prevention 9.2.2 Product Guide

McAfee Data Loss Prevention 9.2.2 Product Guide

McAfee Data Loss Prevention 9.2.2 Product Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3Managing <strong>McAfee</strong> DLP PreventHow <strong>McAfee</strong> DLP Prevent works• Allow email that is determined to be legitimate• Redirect email to other users or groupsWhen <strong>McAfee</strong> DLP Prevent finds violation in webmail, the only action available is to block the message.To use <strong>McAfee</strong> DLP Prevent with <strong>McAfee</strong> DLP Endpoint, create action rules containing Endpointprotection rules to control data in use at network endpoints.To use <strong>McAfee</strong> DLP Prevent with <strong>McAfee</strong> DLP Discover, create action rules containing the remedialactions (copy, move, encrypt, delete) to control data at rest in network repositories.How <strong>McAfee</strong> DLP Prevent works<strong>McAfee</strong> DLP Prevent receives messages routed from an email or proxy server, analyzes them to detectpolicy violations, adds message headers defining the appropriate actions, and returns them to thedesignated server for enforcement.<strong>McAfee</strong> DLP Prevent can support up to 30 concurrent SMTP connections.<strong>McAfee</strong> DLP Prevent 9.2.x monitors SMTP or ICAP traffic, depending on whether it is inter‐operatingwith email or proxy servers — but cannot support both SMTP and ICAP traffic on the same appliance.How <strong>McAfee</strong> DLP Prevent works with emailIf an email user violates any of the policies deployed through <strong>McAfee</strong> DLP Manager, <strong>McAfee</strong> DLPPrevent applies the appropriate action and returns the transmission to the email gateway. Forexample, if his message contains privacy information, an action rule might be triggered to quarantinethat transmission and notify InfoSec.1 A host sends an email message to the designated email gateway.2 The message is relayed to the Smart Host (also known as the downstream MTA), which routes it tothe <strong>McAfee</strong> DLP Prevent appliance.The Smart Host and email server might be the same machine. If so, a white list must be added toprevent email looping.3 On receiving the email, the <strong>McAfee</strong> DLP Prevent appliance evaluates it against existing rules.4 If a rule matches, <strong>McAfee</strong> DLP Prevent adds an X‐RCIS‐Action header and stores the event in itsdatabase.5 The <strong>McAfee</strong> DLP Prevent then sends the email back to the Smart Host, which relays it back to theemail server.6 Based on the action specified in the X‐RCIS‐Action header appended by the Prevent appliance, themessage is allowed, blocked, bounced, encrypted, monitored, quarantined or redirected.7 The software sends notification of the action to the defined user.66 <strong>McAfee</strong> <strong>Data</strong> <strong>Loss</strong> <strong>Prevention</strong> <strong>9.2.2</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!