Customer environment has Dropbox (or possibly similar programs like Google Drive or Skydrive) that can share data outside the network via cloud networking and they wish to detect and possibly block data or notify users of their transgressions.
Etrack 3241133 Note: This article is referencing Dropbox ONLY. Similar programs may have similar steps, but these steps pertain to Dropbox.
Step 1: Set up Dropbox properly in the AFAC (Application File Access Control).
In the Enforce Console: System --> Agent --> Application Monitoring
Add Application or Edit a previous entry:
|Application Monitoring Configuration|
|Check one or more activities to enable application monitoring.|
Step 2: Ensure that AFAC is enabled on the Endpoint Server.
In the Enforce Console: System --> Agent --> Agent Configuration
*If you need a config to work with, clone their currrent config*
Inside the configuration under the Agent Monitoring area is the Applications section with a single option. Ensure that Application File Access is checked.
You can either Save and Apply or just Save. If you only save or if you cancel, make sure the configuration has been applied to the Endpoint Server.
In the Enforce Console: System --> Agent --> Agent Configuration. Click the Apply Configuration button.
Select the appropriate server and choose the correct configuration from the dropdown menu on that right.
Click the Apply and Update button.
Step 3: Set up a response rule. (If the customer has a response set up already, skip this step)
In the Enforce Console: Manage --> Policies --> Response Rules
If the customer is looking to Notify or Block the action, make sure the Action is Endpoint Block / Notify / User Cancel
If the customer is looking to only apply this response to Dropbox (and any other applications being monitored), you can select Protocol or Endpoint Monitoring and choose Endpoint Application File Access under conditions.
Step 4: Set up the proper policy.
In the Enforce Console: Manage --> Policies --> Policy List
Any previously created policies should trigger the Dropbox response. If you are unsure, your best option would be to create a simple keyword policy, apply the appropriate Dropbox response, and test.
Note: Detection steps for Google Drive (TECH222150) and SkyDrive (TECH221594) are very similar.