Configure Offline Data Loss Prevention
For supported software information, click here.
Offline data loss prevention (DLP) is a set of tools and processes for detecting and preventing data breaches, cyber exfiltration, and unwanted destruction of sensitive data. You use DLP to protect and secure an organization's data and to comply with regulations.
The Versa Networks DLP solution oversees, tracks, and reports all data transactions in the network, scanning all content that passes through an organization's ports and protocols to ensure data security in the organization. The gathered data is sent to Versa Analytics, which generates detailed reports about what data is being used, who is using it, and where the data is sent. These reports are available to users.
To configure DLP, you create a DLP profile that you associate with a security policy. To create the DLP profile, you do the following:
- Configure data patterns—Data patterns define the specific data strings that you want to filter in a data protection profile. Concerto includes a large number of predefined data patterns that are provided in the Versa security pack (SPack) software, and you can create custom data patterns.
- Define a data protection profile—You associate data patterns with a data protection profile, and you then use the data protection profile when you create DLP rules.
- Define DLP rules—You create the rules that are used in a DLP profile to match data.
- Configure a DLP profile—Create an ordered set of DLP rules that you can then apply to a security policy or to an internet protection rule.
Configure Custom Data Patterns
To configure custom data patterns:
- Go to Configure > Security Service Edge > Advanced Security > Profiles.

The following screen displays with the Cloud Access Security Broker (CASB) tab selected by default.

- Select Data Loss Prevention (DLP) > Data Patterns.

- In the horizontal menu bar, you can perform the following operations on existing data patterns.

Operation Description Add Create a new internet protection rule. This button is active when no existing rule is selected. Clone Clone the selected internet protection rule. When you select this option, the configuration wizard for the rule displays with the Review & Deploy screen selected. You can rename the default name of the cloned rule, if desired, and then click Save.
Delete Delete the selected internet protection rule. A popup window similar to the following displays:
Click Yes to delete the internet protection rule, or click No to retain the rule.
Refresh Refresh the list of existing rules. Reference If you select an object and then click Reference, all of the locations in the hierarchy in which the object is used are displayed. - To customize which columns display, click Select Columns, and then click the columns to select or deselect the ones you want to display. Click Reset to return to the default column display settings.

- Click the
Add icon to add a new data pattern. In the Data Patterns screen, enter information for the following fields.

Field Description Name Enter a name for the data pattern. Regex Enter an exact regular expression to search for in a file, for example, Employee.*Salary. Keywords Enter one or more keywords to search for in a file. Once a keyword is found, the DLP engine scans for the regex pattern within the given range. Use a comma to separate multiple keywords. Range From Select the location to search in the file:
- Anywhere—Start the scan anywhere in the file.
- Start—Start the scan at the beginning of the file.
Range Window Enter a range for the search with the file, which is sometimes called the proximity.
- If you select Range From Anywhere, you do not need to specify a range window, because the entire file is scanned.
- If you select Range From Start, enter the number of bytes to scan from the start of the file.
- If you do not enter a range window, the entire file is scanned.
Range: 1 through 4294967295 bytes
Default: 8192 bytes - Click Save.
Configure Data Protection Profiles
A data protection profile consists of an ordered set of rules in which each rule has one or more match conditions and an action. You can configure a data protection profile to stop evaluating rules after the first rule that matches (Exit on First Rule Match option) or to evaluate all rules and apply all those that match (default behavior).
After you create a data protection profile, you can use it as part of the enforcement actions on a policy rule in a security access control policy.
To configure a data protection profile:
- Go to Configure > Security Service Edge > Advanced Security > Profiles.

- Select Data Loss Prevention (DLP) > Data Protection Profiles.

- Click the
Add icon. The Data Pattern screen displays step 1, Select DLP Data Pattern.

- Click Add User-Defined Data Pattern, and then select one or more custom data patterns to use in the data protection profile.

- Click Save to add the user-defined data patterns to the data protection profile.
- Click Add Predefined Data Pattern, and then select one or more predefined data patterns to use in the data protection profile.

- Click Save. The selected data patterns display.

- Click Next to go to step 2, Action.

- Create a Boolean operation that defines how to match the selected data patterns. To do this, click a data pattern, click the AND, OR, NEAR, or NOT operator, and then click a second data pattern to complete the Boolean operation. The Boolean operation can include multiple data patterns, with each separated by a Boolean operator.
The Boolean operators are:- AND—The patterns before and after the AND operator must both appear in the file for a match to be made.
- OR—Either the pattern before or the pattern after the OR operator must appear in the file for a match to be made.
- NEAR—The two data patterns before and after the NEAR operator are located within 200 bytes of each other in the file for a match to be made.
- NOT—The pattern that occurs after the NOT operator does not appear in the file for a match to be made.
The following example shows a Boolean operation created from the data patterns shown in the previous screenshot:
- To replace one data pattern in the Boolean operation with another, click the down arrow next to the data pattern name, and then select a different one.

- To change the Boolean operator, click the down arrow next to the operator name and then selecting a different one.

- To remove the last element of a Boolean operation, click the down arrow and then click Remove Selection.

- Click Next.
- In step 3, Review and Submit, enter a name for the data protection profile and, optionally, a text description and one or more tags. A tag is an alphanumeric descriptor, with no white spaces or special characters, that you can use to search the objects.

- Review the data protection profile entries.
- To change any of the information, click the
Edit icon in the section and then make the required changes. - Click Save to create the data protection profile.
Configure DLP Rules
A DLP profile rule consists of the following components:
- Rule Type—You can select one of the following rule types:
- Content analysis—Scan data in the HTTP Context, such as HTTP Attachment, HTTP Body, and HTTP Header.
- Exact data match (EDM)—Validate the match result of a custom or predefined data pattern against a user-provided data set. An exact data match rule can reduce false positives and can help to guarantee precise DLP for entries in the data set.
- File DLP—Provide protection based on the configured file attributes.
- File-type filtering—You can configure data filters based on file types.
- Activity, Protocol, and Context scanning—DLP monitoring can scan by activity (upload, download, or both), the HTTP protocol, and context (header, body, attachment.
The following table shows the applications supported by DLP, and whether upload and download are supported for each of the listed actions.
| Application | Alert | Allow | Alert & Set Label | Allow & Set Label | Block | Encrypt | Encrypt-Upload | Quarantine | Reject |
|---|---|---|---|---|---|---|---|---|---|
|
Box.com |
Upload |
Upload |
Upload |
Upload
|
Upload |
Upload |
Upload |
Upload |
Upload |
| Confluence |
Upload |
Upload |
Upload |
Upload
|
Upload |
Upload |
Upload |
Upload |
Upload |
|
Dropbox |
Upload |
Upload |
— | — |
Upload |
— |
Upload |
Upload |
Upload |
|
Google Drive |
— | — | — | — | — | — | — | — | — |
|
Github |
Upload |
Upload |
— | — |
Upload |
— |
Upload |
Upload |
Upload |
| Jira |
Upload |
Upload |
Upload |
Upload
|
Upload |
Upload |
Upload |
Upload |
Upload |
|
One Drive |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
|
Outlook |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
|
Salesforce |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
Upload |
| Sharepoint |
Upload |
Upload |
Upload |
Upload
|
Upload |
Upload |
Upload |
Upload |
Upload |
|
Slack |
Upload |
Upload |
— | — |
Upload |
— |
Upload |
Upload |
Upload |
|
Teams |
Upload |
Upload |
— | — |
Upload |
— |
Upload |
Upload |
Upload |
| Trello |
Upload |
Upload |
Upload |
Upload
|
Upload |
Upload |
Upload |
Upload |
Upload |
| Yammer |
Upload |
Upload |
Upload |
Upload
|
Upload |
Upload |
Upload |
Upload |
Upload |
| Zoom |
Upload |
Upload |
Upload |
Upload
|
Upload |
Upload |
Upload |
Upload |
Upload |
To configure rules to use in DLP profiles:
- Go to Configure > Security Service Edge > Advanced Security > Profiles.

- Select Data Loss Prevention (DLP) > DLP Rules.

- To customize which columns display, click Select Columns down arrow and then click the columns to select or deselect the ones you want to display. Click Reset to return to the default column display settings.

- Click + Add to add a DLP rule. The Select a Rule Type screen displays. You can create Content Analysis, File DLP, and Exact Data Match (EDM). The following sections describe how to configure the DLP file types.

- Configure a Content Analysis Rule—To create a content analysis rule, click the Content Analysis box in the Select a Rule Type screen. The following screen displays, which lists all predefined data protection profiles by default. The pre-defined profiles are:
- AUSTRALIA_FINANCIAL_DATA
- CCPA_California_Consumer_Privacy_Act
- Financial_Information
- GDPR_General_Data_Protection_Regulation
- GLBA_Gramm_Leach_Bliley_Act
- PCI_DSS
- SOCIAL_SECURITY_NUMBER_CONFIDENTIALITY_ACT2000
- SOURCE_CODE_ACT
- UK_ACCESS_TO_MEDICAL_REPORTS_Act1988
- UK_FINANCIAL_DATA
- UK_PII
- US_DRIVERS_LICENSE_NUMBER_ALL_STATES
- US_FEDERAL_TRADE_COMISSION_RULES
- US_FINANCIAL_DATA
- US_HIPAA
- US_PATRIOTS_ACT
- US_PHI
- US_PII
- WESTERN_AUSTRALIA_HEALTH_SERVICES_ACT

- To view the custom data protection profiles, click User Defined.
- To add the DLP rule for analysis, click one predefined or one user-defined data protection profile. You can select only one data protection profile, which can be either a predefined or a user-defined profile. To filter the data protection profiles by category, click All Categories. To filter the data protection profiles by region, click All Regions.
- Configure a File DLP Rule—To create a file DLP rule, click File DLP in the Select a Rule Type screen. In the File DLP screen, enter information for the following fields.

Field Description Filename Enter a name for the file. File Size (Group of Fields) - Enter Minimum
Enter the minimum size of the DLP file, and then select the size unit, either megabytes (MB), gigabytes (GB), kilobytes (KB), or bytes. The configured action is taken on all files that are smaller than the minimum size and that match the configured file type. If you set the minimum size to 0, the maximum DLP file size is used for the action. - Enter Maximum
Enter the maximum size of the DLP file, and then select the size unit, either megabytes (MB), gigabytes (GB), kilobytes (KB), or bytes. The configured action is taken on all the files that are larger than the maximum size that match the configured file type. SHA256 Enter the secure hash algorithm 256-bit (SHA256) value. To enter multiple SHA256 values, separate them by a new line. File Label Enter a file label, and then click Add. - Configure an Exact Data Match Rule—To create an exact data match rule, click Exact Data Match (EDM) in the Select a Rule Type screen. The following screen displays.

- To create an expression, click Create Expression, and then enter information for the following fields.

Field Description Expression Name Enter a name for the expression. Data Pattern Select a data pattern. Enter Value Enter a value for the expression, the click Add. - Click Save.
- To upload a CSV file that contains a list of exact data matches, click Upload File.
- Drag and drop the CSV file into the window, or click Select CSV File to upload the file.
- To hash the CSV file, click Hash the File.
- Click Save.

- To select a filename, click Select File Name. The Select Filename screen displays.

- In the File Name field, select a filename. Note that this list shows the names of CSV files that were previously uploaded. For information about uploading CSV files, see the Manage DLP Files and Folders, below.
- Click Get Columns. The screen displays the columns for each field in the CSV file.

- In the Data Pattern column, select a data pattern to apply to each entry. Click Remove to remove an entry from the CSV file.
- Click Save.
- Click Next to go to step 2, File Type in the Create DLP Rule screen.
- Select one or more file types to be analyzed. To search for specific file types, use the search box. To select all file types, click Select All File Types.
Concerto supports the following file types:
any bmp c class cpp csv docx gif gzip html jpeg msoffice pdf pem pgp php pl png ppk ppt pptx rtf sh tar tif txt visio vsf xls xlsx xml xz zip

- Click Next to go to step 3, Configure Activity, Protocol, and Context.
- Enter information for the following fields.

Field Description Activity Select the direction of the traffic on which to apply the rule:
- Upload—Apply the rule when the client posts data to a server.
Protocol Click the protocol to scan:
- Web Protocol
- HTTP
Context Select one or more HTTP contexts of data to scan:
- Attachment—Data in an attachment
- Body—Data in the body
- Header—Data in the header of a packet
- Click Next to go to step 4, Exclude.
- In the Filename field, enter the names of a file to exclude, for example, budget.xlsx, and then click Add. The filename displays to the right of the Add button. You can exclude multiple files. To delete a filename from the list, click the
Trash icon next to the filename.

- Click Next to go to step 5, Action.
- Enter information for the following fields.
The following table shows the applications supported by DLP and whether file-name matching is supported for upload.
Applications Upload Box Supported Confluence Supported Dropbox Supported Github Supported Google Drive Supported Jira Supported Microsoft OneDrive Supported Microsoft Outlook Supported Microsoft Sharepoint Supported Microsoft Teams (web) Supported Microsoft Yammer Supported Salesforce Supported Slack Supported Trello Supported Zoom Supported

Field Description Action Select an action to take if the file matches the rule:
- Alert—Allow the file to pass and log it to Versa Analytics
- Allow—Allow the file to pass without logging it to Versa Analytics
- Block—Drop the file without sending a notification to the client host that originated the file.
- Encrypt—Encrypt the file before sending it.
- Legal Hold—Apply a legal hold profile to the file.
- Quarantine—Send the file to the customer-provided cloud portal without encrypting it.
- Redaction—(For the EDM rule type only.) If a rule match is detected in an editable, text-based file, change the content of the matched packet to random characters. Note that redaction is supported only for Exact Data Match (EDM) with the file types txt, xml, sh, html, c, and php.
- Reject—Drop the file and send a notification to the client host indicating that the file was dropped.
- Tokenization—(For the EDM rule type only.) Replace sensitive data with randomized, non-sensitive data, referred to as a token, which has no inherent value that can be exploited.
- URL Action Redact—Mask or remove parts of a URL that contain sensitive information.
- URL Action Redirect—Redirect a URL request to another page or website based on a URL argument.
Logging Click to enable LEF logging to Analytics, which logs all actions to Versa Analytics, except fo actions that explicitly do not log. If you do not enable logging, no logging information is sent to Versa Analytics. Notification Profile Select a notification profile. To configure a notification profile, see Configure SASE User-Defined Objects. Label Select a sensitivity label to be set or removed on a file before uploading or downloading it. Enter the text of the label to be set or removed in the text box. Threat Type Select the threat type. The options are:
- Alert
- Block
- Exfiltration in Content Analysis
- Document Fingerprint
- File Size Not In Range
- Source Code Detection
- Mip Label
- File DLP
- OCR Match (currently not supported)
- MI Image Classification
- MI Source Code
- MI Document Fingerprint
- MI Spam Mail
Threat Severity Select the threat severity, either Critical, Major, or Normal. - Click Next to go to step 6, Review & Submit.

- Enter a name for the rule.
- To change any of the information, click the
Edit icon and then make the required changes. - Click Save to create the DLP rule.
Configure DLP Profiles
A DLP profile consists of one or more DLP rules.
To configure a DLP profile:
- Go to Configure > Security Service Edge > Advanced Security > Profiles.

- Select Data Loss Prevention (DLP) > DLP Profiles.

- To customize which columns display, click the Select Columns down arrow, and then click the columns to select or deselect the ones you want to display. Click Reset to return to the default column display settings.

- Click
Add to add a new DLP profile. The Select Rules screen displays step 1, Select DLP Rules.

- Select one or more DLP rules to include in the profile. To filter the types of rules that are displayed, use the User-Defined, All Categories, and All Regions boxes.
- Click Next to go to step 2, Applications and Group.

- If any application groups have been defined, you can select them from the list.
- Select one or more user-defined and/or predefined applications.
- Click Next to go to step 3, Configure Rule Order.
- If you selected two or more DLP rules on the Select DLP Rules screen, you can change the order in which the rules are processed by dragging and dropping the rules to the desired order.

- Click Next to go to step 4, Reputation. Enter information for the following fields.

Field Description Enable Logging Click to enable logging. Cloud Lookup State Click to enable the cloud lookup state. If the cloud lookup state is not configured for this profile, the cloud lookup state configurations are inherited from the tenant VOS device. - Click Next to go to step 5, Action. Enter information for the following fields.

Field Description Default Action Click the down arrow and select a default action. This default action applies if none of the scanned data matches a rule.
- Alert
- Allow
- Block
- Reject
Exit on First Rule Match Click to exit rule processing after the first match occurs. Logging Enable logging of the DLP rules processing. All logs are sent to Versa Analytics. Forensics Enabled Enable forensics on uploaded original files. Data forensics is used to collect and analyze data on computing devices, network devices, phones, or tablets. The results are often used in legal procedures, regulatory and company investigations, investigations of criminal activity, and other types of investigations that involve digital evidence.
For more information, see Configure Forensic Profiles in Concerto.Profile Select a forensic profile. Upload Original File Enable or disable uploading an original file. This option is only selected if you select Forensic Enabled. - Click Next to go to step 6, Review & Submit.
- Enter a name for the DLP profile and, optionally, a description and one or more tags. A tag is an alphanumeric descriptor, with no white spaces or special characters, that you can use to search the rules.

- Review the configuration.
- To change any of the information, click the
Edit icon and then make the required changes. - After review, click Save to create the new DLP profile.
Associate a DLP Profile with SaaS Applications
To associate a DLP profile with a SaaS application:
- Go to Configure > Security Service Edge > Advanced Security > API Based Data Protection > Policy Rules.

The following screen displays.

- Select the SaaS tab, and then select either the Schedule Based or Event Based subtab. (This example uses the Schedule Based option.)
- Click the
Add icon. The screen displays step 1, SaaS Applications.

- Click an application, and then click Next to go to step 2, Instance.

- In the Instance screen, select an application instance, then click Next to go to step 3, Users & Groups.

- By default, all users and groups are included in the policy rule. Click Customize to specify the users and groups to include in the rule. The Users & Groups screen displays, with the Include tab and User Groups subtab selected by default.

- Select a user group from the User Source drop-down list. The user groups within the selected group display under User Group.
- Click the User tab.
- Select a user from the User Source drop-down list. The users in the selected group display under Users.

- Select one or more users to include in the policy.
- Click the User Profiles tab.

- Select one or more user profiles.
- Click
Add New User Profile to add one or more additional user profiles.

- Enter a name for the profile in the Profile Name field.
- (Optional) Enter a description.
- Enter a name for the user in the User field.
- Click Add. The user is added to the Available list. You can add additional users to the list.

- Click Remove to remove a user name from the list.
- When you have finished adding users to the profile, click Submit.
- Click the Internal-External tab.

- Select one of the following internal-external users to add to the rule, either None, Internal, External, or Both.
- Click the Domains tab. The following screen displays any previously configured domains.

- Select a domain to add to the rule.
- If no domains are listed, click + Add New Domain.

- Enter a valid domain name, such as versa-networks.com, and then click Add. You can add additional domains.
- You can then add one or more of the new domains to the rule.
- If no domains are listed, click + Add New Domain.
- Click the Domain Profiles tab.

- Select one or more domain profiles to add to the rule.
- Click
Add New Domain Profile to create additional domain profiles.
- Enter a name for the domain profile in the Profile Name field.
- (Optional) Enter a description.
- Enter a valid domain name, such as versa-networks.com.
- Click Add. The domain profile is added to the Available list.

- Click Remove to remove a domain profile from the list.
- When you have finished additional domain profiles to the list, click Submit.
- Select the Exclude tab. By default, all users and groups are excluded in the policy rule. Click Customize to specify the users and groups to exclude from the rule.
Note: The subtabs under the Exclude tab are the same as the subtabs under the Include tab. See Steps 6 through 20 for information about these subtabs.

- Click the
Back arrow or click Next to go to step 4, Schedule. - Select a schedule and enter the required information.

Scan Type Description Non Recurring Time Select this scan type to run a single, non-recurring scan. Enter the following information:
- Start Date—Enter the date to start the scan.
- Start Time—Enter the time of day to start the scan.
Hourly Select this scan type to run a scan every hour. Enter the following information: - Start Date—Enter the date to start the scans.
- Start Time—Enter the time of day to start the scans.
- End Date—Enter the date to end the scans.
Daily Select this scan type to run a scan once per day. Enter the following information: - Start Date—Enter the date to start the scans.
- Start Time—Enter the time of day to start the scans.
- End Date—Enter the date to end the scans.
Weekly Select this scan type to run a scan once per week. Enter the following information: - Every—Select how often to run the weekly scan. Select 1 to run the scan every week, enter 2 to run the scan every 2 weeks, etc.
- On—Select one or more days of the week on which to run the scan.
- Start Date—Enter the date to start the scans.
- Start Time—Enter the time of day to start the scans.
- End Date—Enter the date to end the scans.
Monthly Select this scan type to run a scan once per month. Enter the following information:
- Every—Select how often to run the monthly scan. Select 1 to run the scan every month, enter 2 to run the scan every 2 months, etc.
- Start Time—Enter the time of day to start the scans.
- End Date—Enter the date to end the scans.
- Click Next to go to step 5, Security Profiles.

- Click Profiles, and then select the Data Loss Prevention (DLP) tab.
- Click the slider bar to enable Data Loss Prevention, then select a profile from the drop-down list. The details of the profile display.
- Click Next to go to step 6, Notification Profile, and then select a notification profile, if desired.
- Click Next to go to step 7, Review & Deploy, and then enter a name for the rule.

- Click Save.
Supported Actions for Each Application
|
Application |
Alert |
Quarantine |
Legal Hold |
Forensic |
Encrypt |
|---|---|---|---|---|---|
|
IaaS Applications |
|||||
|
Amazon Web Services (AWS) |
Yes |
Yes |
Yes |
Yes |
Yes |
| Google cloud Platform (GCP) |
Yes |
Yes |
Yes |
Yes |
Yes |
| Microsoft Azure Cloud |
Yes |
Yes |
Yes |
Yes |
Yes |
| Oracle Cloud Infrastructure (OCI) |
Yes |
Yes |
Yes |
Yes |
Yes |
|
SaaS Applications |
|||||
|
Asana |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Box |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Cisco Webex Teams |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Citrix ShareFile |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Confluence |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Dropbox |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Egnyte |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Google Drive |
Yes |
Yes |
Yes |
Yes |
Yes |
|
GitHub |
Yes |
Yes |
Yes |
Yes |
Yes |
|
GitLab |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Gmail |
Yes |
Yes |
No |
No |
No |
|
Jira |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Microsoft OneDrive |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Microsoft Outlook |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Microsoft SharePoint |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Microsoft Teams |
Yes |
Yes |
No |
No |
No |
|
Microsoft Yammer |
Yes |
Yes |
No |
Yes |
No |
|
Notion |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Salesforce |
Yes |
Yes |
Yes |
Yes |
Yes |
|
ServiceNow |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Slack |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Trello |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Zendesk |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Zoom |
Yes |
Yes |
Yes |
Yes |
Yes |
Supported Software Information
Releases 12.2.1 and later support all content described in this article.
Additional Information
Configure Forensic Profiles in Concerto
Configure SASE Internet Protection Rules
