Applications Supported In The Endpoint Application Channel .

2y ago
16 Views
3 Downloads
209.43 KB
14 Pages
Last View : 30d ago
Last Download : 3m ago
Upload by : Pierre Damon
Transcription

Applications Supported in theEndpoint Application channel forTRITON AP-ENDPOINT DLPEndpoint Applications TRITON AP-ENDPOINT DLP Version 8.3.xYou can monitor the operations performed by end users on any number of applicationsto prevent data loss from endpoint clients both on and off network—operations suchas file access, cut or copy, and paste. Forcepoint has analyzed the metadata for morethan a hundred applications and can monitor these with great accuracy.In the TRITON Manager, select Main Resources Endpoint Applications tochoose the applications to monitor for the Endpoint Application channel or selectEndpoint Application Groups to select entire groups of applications, such asencryption software or browsers.This document lists the predefined applications by Application Group and lists theoperating systems and operations that are supported.It also describes how to import user-defined applications if desired. Built-in support, page 1 Importing other applications, page 11Built-in supportEndpoint Applications TRITON AP-ENDPOINT DLP Version 8.3.xFollowing are the applications that you can choose to monitor on the endpoint whenyou set up your endpoint policy in the Data Security manager. This includes softwareapplications, web applications, and cloud applications.Endpoint Applications 1

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLPAlso noted is whether the application is supported on Windows endpoint, Macendpoint, or both, and the type of operations that can be analyzed byTRITON opy/CutPasteFile AccessCopy/CutPasteCopy/CutPasteFile AccessCopy/CutPasteFile AccessInternet Explorer(IE)Microsoft EdgeOperaSafariTorTorchCD BurnersAcoustica MP3CD BurnerAlcohol 120%CD-MateDisk UtilityiTunesNero BurningROMRoxio – EasyMedia CreatorWindows MediaPlayer2 TRITON AP-ENDPOINT DLP

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLPGroupApplicationCloudStorageAmazon aultOperationsCopy/CutPasteFile AccessCopy/CutPasteFile AccessEgnyteFile AccessOnlyFile AccessOnlyGoogle DriveCopy/CutPasteFile AccessCopy/CutPasteFile AccessBoxBox.com forWindowsand Mac;Box storeapp forWindowsDropboxDropboxstore appiCloud*iCloudDrive forbothWindowsand MacFile AccessFile AccessOneDriveOneDrivestore app**forWindowsCopy/CutPasteFile AccessCopy/CutPasteFile AccessSalesforce Files***ShareFileSyncplicityWatchDoxEndpoint Applications 3

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLPGroupApplicationEmailApple MailEudoraWindowsMacIncludesEudoraLightEudora teFile AccessPasteCopy/CutPasteFile AccessFile AccessLotus NotesMailMateMicrosoftOutlookMicrosoftOutlook ExpressMozillaThunderbirdPegasus MailPostboxSparrowWindows LiveMailWindows MailEncryptionSoftwareDK2 NetworkServer RemoteMonitor - DK2DESkeyFile EncryptionXPWindowsPrivacy Tray(WinPT)4 TRITON AP-ENDPOINT DLP

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLPGroupApplicationFTPCore FTP LEWindowsMacIncludesCute FTP tPasteFile AccessFile AccessFile TransferProgram(MicrosoftUtility)FileZilla FTPClientFlash FXP 3.6build 1240FTP Voyager 15Ipswitch WSFTP HomeLeech FTPServ-UFile ServerEXE;File ServerTrayApplication;FTP ServerSetup UtilitySmart FTP ClientEndpoint Applications 5

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLPGroupApplicationIM nsDefaultOperationsCopy/CutPasteFile AccessFile File AccessFile AccessPasteCamfrogCisco WebExGoToMeetingICQICQ storeapp t Lync2010Miranda IMooVooPidginSkype forBusinessTeamViewerTeccent QQTrillianViberYahoo! InstantMessenger6 TRITON AP-ENDPOINT DLPInstantMessenger(Windowsand Mac);YServerModuleServer(Windows)

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLPGroupApplicationOfficeApplicationsAdobe aultOperationsCopy/CutPasteFile ice/ApacheOpenOfficeMellelMicrosoft OfficeAccessMicrosoft OfficeExcelCopy/CutPasteFile AccessMicrosoft OfficeInfoPathMicrosoftOneNoteMicrosoft OfficePowerPointMicrosoft OfficeProjectEndpoint Applications 7

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT crosoft OfficePublisherMicrosoft faultOperationsCopy/CutPasteFile AccessCopy/CutCopy/CutPasteFile AccessDownloadCopy/CutDownloadMicrosoft eGreatSequel8 TRITON AP-ENDPOINT DLP

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT File AccessFile AccessPasteCopy/CutPasteFile AccessFile eMuleFrostWireKazaa LiteKazaadownload/databaseviewer a - KDat;KazaaQuickLinksHandler/Generat - KSig;klrun:protocol Kazaa agingSoftware7-Zip FileManageriArchiverWinRARWinZipEndpoint Applications 9

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLPGroupApplicationPortableDevicesBluetooth StackCOM Server DefaultOperationsCopy/CutPasteFile AccessFile AccessCopy/CutPasteFile AccessDownloadCopy/CutDownloadCopy/CutPasteFile AccessNoneFsquirtiTunesWireless LinkFile TransferApp – IrftpWCESMgrCloud(SaaS)****Aplicor (online)CRM.comHostAnalyticsIntacctNetSuiteOracle CRM NT backup toolVista backup toolVMWare*File Access only. The Copy, Cut, and Paste operations are not supported.**Requires adding the applications runtimebroker.exe, bulkoperationhost.exe, and filemanager.exe tothe FTP application group. See the section on importing Windows Desktop Applications for instructions.*** This application does not operate correctly on Mac 10.11.1, regardless of endpoint.****The cut, copy, paste, file access, and download operations are not supported for cloud apps on Windowsendpoints when they are used through a Windows Store browser. Online application download is notsupported in Firefox.10 TRITON AP-ENDPOINT DLP

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLPYou can also configure the system to block and/or audit screen captures when aspecific endpoint application is running. Navigate to the Resources EndpointApplications page and click on the application name to enable this feature.Importing other applicationsEndpoint Applications TRITON AP-DATA Version 8.3.xIf you want to monitor an endpoint application other than the ones supplied byForcepoint, follow the instructions below. The instructions vary depending on theoperating system, as well as the type of application. Windows Desktop Applications, page 11 Windows Store apps, page 12 Mac Applications, page 13Windows Desktop ApplicationsThe following applies to Windows applications prior to Windows 8, as well asWindows 8 desktop applications. For instructions on how to monitor Windows Storeapplications, see the section below, Windows Store apps.There are 2 ways to import applications onto the TRITON AP-DATA server forWindows desktop applications:1. Selecting Main Resources Applications New Application/OnlineApplication. See Endpoint Applications.When you add applications using this screen, they are identified by theirexecutable name. Occasionally, users try to get around being monitored bychanging the executable name. For example, if you are monitoring “winword.exe”on users’ endpoint devices, they may change the executable name to “winword.exe” to avoid being monitored.2. Using an external utility program, EPRegApps.exe. This method records theapplication’s metadata, so that TRITON AP-DATA can analyze the metadata.In other words, if the name of the application is modified by an end users,TRITON AP-ENDPOINT DLP can still identify the application and applypolicies.NoteThis tool can be copied to any other machine and beexecuted on it as long as it has connectivity to the TRITONmanagement server.To use the external tool to import applications in the TRITON AP-DATA server:Endpoint Applications 11

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLP1. Go to [%DSS Home%] directory (Default: C:\Program Files\Websense\DataSecurity Suite) and double-click EPRegApps.exe. The Get File Properties screenis displayed.2. Complete the following fields:FieldDescriptionIP Address/HostnameInsert the IP Address or Hostname of the TRITON AP-DATAServer.User NameProvide the user name used to access the TRITON AP-DATAServer. This is the user name assigned to administrators that haverelevant permissions.PasswordEnter the password used to access the TRITON AP-DATAServer. This is the password assigned to administrators withrelevant permissionsFile NameInsert the File Name of the application, e.g. Excel.exe OR clickthe Browse. button and in the Open dialog box, navigate to theFile Name of the application and double-click it.Display NameEnter the name of the application as you want it displayed in theTRITON management server.3. Click OK.A message will appear indicating that the application was successfully registered withthe TRITON AP-DATA Server. The Get File Properties screen will be re-displayedwith the TRITON AP-DATA Server fields completed, but the File Name and DisplayName empty. This allows you to select additional applications to register with theTRITON AP-DATA Server. Continue this process until all applications are registered.When you are finished adding applications, click the Cancel button in the Get FileProperties screen.Windows Store appsThe following instructions do not apply to Windows 8/8.1 desktop applications. Forinstructions on how to monitor Windows 8/8.1 desktop applications, see the sectionabove, Windows Desktop Applications.NoteIn order to monitor file access on Windows 8 Store apps,you must first add RuntimeBroker.exe as an endpointapplication, and monitor file access on this application. ForWindows 8.1 store apps, you must also addBulkOperationHost.exe and FileManager.exe. Theendpoint monitors all Windows Store apps accessing filesthrough the runtime broker and not just the designated app.RuntimeBroker.exe is a Windows desktop application, sofollow the instructions in Windows Desktop Applicationsto add this as an endpoint application.12 TRITON AP-ENDPOINT DLP

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLPTo import Windows 8 Store apps, select Main Resources Applications NewApplication. See Endpoint Applications.Windows 8 Store applications are identified by their application name. You should usethis name in the executable name field on this screen. Wildcards are supported.To identify the application name:1. Open PowerShell (run as administrator if you want to collect Windows 8Store apps for all users, or run as the current user if you want to collect appsfor the current user).2. Run the command “Get-AppXpackage -Allusers” to list apps for all users(requires you to run PowerShell as administrator).orRun the command “Get-AppXpackage” to list apps for the current user.3. Find the application name located in either the Name field orPackageFullName field.a. When entering the value from the Name field into TRITON AP-DATA,you must add the wildcard “*” after the application name (e.g.microsoft.microsoftonedrive*). This method allows for greater flexibilitywhen the app version changes.b. When entering the value from the PackageFullName field intoTRITON AP-DATA, no wildcard is necessary, but you will need toupdate the value if the app version changes.Mac ApplicationsTo import Mac applications, select Main Resources Applications NewApplication. See Endpoint Applications.To find the value to enter for Mac applications:1. Locate the application you want to monitor.2. Right click on the application and click Show Package Contents.3. Open the file info.plist in the Contents folder.4. Look for the key(s) CFBundleName and enter the value of the string(s)under it (e.g. for “ string Example /string ” enter “Example”).5. If there is no key by that name, or no info.plist file, use the process(es)name(s).If there are multiple CFBundleName keys and/or multiple string entries below thekey(s), each string value must be added separately.Very rarely, apps will launch other processes along with the main application. Theseprocesses should be added as endpoint applications as well. In order to know whatprocesses belong to an app you need to see what processes are created when openingan application, for example by using Activity Monitor.Endpoint Applications 13

Applications Supported in the Endpoint Application channel for TRITON AP-ENDPOINT DLP14 TRITON AP-ENDPOINT DLP

Visio Microsoft Office Word Notepad Numbers OpenOffice.org Calc OpenOffice.org Draw OpenOffice.org Math OpenOffice.org Writer Pages Reminders Stickies TextEdit WordPad Online . Portable Devices Bluetooth Stack COM Server - BTStackServer Copy/Cut Paste File Access File Access Fsquirt iTu

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

ESET Endpoint Protection Standard v6.5.522.0 FireEye Endpoint Security v4 Fortinet FortiClient v5.6.2 G DATA EndPoint Protection Business v14.1.0.67 Kaspersky Lab Kaspersky Endpoint Security v10 Malwarebytes Endpoint Protection v1.1.1.0 McAfee Endpoint Security v10.5 Palo Alto Networks Traps v4.1 Panda Security Panda Adaptive Defense 360 v2.4.1

Symantec Endpoint Protection . Endpoint Protection Manager: v11.600.550 Symantec Endpoint Protection: v11.6000.550 . Sophos Endpoint Security and Data Protection . Enterprise Console: v4.0.0.2362 Endpoint Security and Control: v9.05 . Trend Micro Worry-Free Business Security: Standard Edition . Worry-Free Business Security: v6.0 SP2 build 3025