Custom automated scripts to test data transfer in files via removable storage [USB] channel do not trigger incidents with simple keyword policy.
The results show error:
C:\Users\User\DLP\TEST_FOLDER>DLP_Test_Policy_USB_script.exe
C:\Users\User\AppData\Local\Temp\ONEFIL~2equests\__init__.py:109: RequestsDependencyWarning: urllib3 (1.26.9) or chardet (5.2.0)/charset_normalizer (2.0.12) doesn't match a supported version!=== Symantec DLP Simulation Script ===
[+] Created local file with sensitive content: C:\Users\User\AppData\Local\Temp\onefile_14276_133967040316544576/Keyword_Test_File.txtTraceback (most recent call last):
File "C:\Users\User\AppData\Local\Temp\ONEFIL~2\DLP_Test_Policy_USB_script.exe.py", line 71, in <module>
File "C:\Users\User\AppData\Local\Temp\ONEFIL~2\DLP_Test_Policy_USB_script.exe.py", line 55, in simulate_usb_transfer
File "C:\Users\User\AppData\Local\Temp\ONEFIL~2\shutil.py", line 417, in copy
File "C:\Users\User\AppData\Local\Temp\ONEFIL~2\shutil.py", line 256, in copyfile
PermissionError: [Errno 13] Permission denied: 'D:/Keyword_Test_File.txt'
While EDPA logs show event evaluation without incident:
Request Id #9514
Detection Request Details :Session Command : Single Request
Request Type : Data In Motion Request
Dim Detection Request Details :
Process Id : 14276
Process Path : C:\Users\User\DLP\TEST_FOLDER\DLP_Test_Policy_USB_script.exe
Application Name : DLP_Test_Policy_USB_script.exe
User : User
Domain : DOMAIN-COM
Time Stamp : 07/11/2025 10:40:45
Dim Event Type : Application file access
AFAC Detection Request Details :
file: C:\Users\User\Links\desktop.ini
]
07/11/2025 11:40:45 | 24548 | INFO | CoreServices.MessageLogger | MESSAGETYPE_SCHEDULE_DETECTION MESSAGESOURCE_DETECTION_CACHE 07/11/2025 10:40:45 [req#9514 CrackingProcessPriority=NORMAL]
07/11/2025 11:40:45 | 24548 | INFO | CoreServices.MessageLogger | MESSAGETYPE_START_DETECTION MESSAGESOURCE_DETECTION_SCHEDULER 07/11/2025 10:40:45 [req#9514 CrackingProcessPriority=NORMAL]
07/11/2025 11:40:45 | 29928 | INFO | Detection.SPIDocumentTypeDetector | Document type detected: [unknown]
07/11/2025 11:40:45 | 29928 | INFO | Detection.ContentService | document type=ascii, text size=572
07/11/2025 11:40:45 | 24548 | INFO | CoreServices.MessageLogger | MESSAGETYPE_DETECTION_RESULT MESSAGESOURCE_DETECTION 07/11/2025 10:40:45 [req#9514 SUCCESS no incidents]
07/11/2025 11:40:45 | 24548 | INFO | CoreServices.MessageLogger | MESSAGETYPE_DETECTION_RESPONSE MESSAGESOURCE_POSTPROCESSOR 07/11/2025 10:40:45 [
Request Id #9514 SUCCESS allow
Data Loss Prevention Endpoint Prevent
version 16.1
This is caused by a GPO being present on the endpoint, which blocks USB drive access.
Once the USB exception is added and applied in the GPO, the scripting process is then able to capture the full data flow and hence trigger an incident.