You wish to start using the REST API to access DLP.
For the full "Getting Started..." please visit the following link: Getting Started with DLP
SOAP API has been deprecated and is no longer available as of DLP 16.0. Instead you should now be using the REST API for DLP 16.0 and later.
Note: Username and Passwords provided below are for example only, choose your own values to match your company requirements.
Resources:
- APIDOCS Examples
- Overview of the Symantec Data Loss Prevention Detection REST API 2.0
- Detection Requests for the DLP Detection REST API 2.0
Support Limitations and the API:
- Support cannot write or help you to write your applications. That is beyond the scope of support.
- However, if you need help confirming if something you are working on is actually working correctly, support can help you confirm if specific functionality in the API is working as intended.
- If you do actually need help in writing your applications, you can contact your Account Team to discuss a Professional Services engagement to assist with creating specific API functionality.
Example .bat file:
- To help get you started I have attached a very basic example batch file (Windows) to demonstrate how to get started with the API. "API_Get_CustomAttributes.bat"
- This is an example to "Get Custom Attributes" using the API in a simple batch file for Windows.
- You can run this script on any Windows machine that can reach your Enforce Server, for simplicities sake, I recommend running it directly on the Enforce Server to start with.
- You will then be prompted for several pieces of information, if you are not using a Domain, simply leave that value empty.
- Once you answer these questions, it will automatically convert your credentials into Base64 so it can be passed into the API.
- NOTE: As this is a test script, it will print out your credentials in plain text on the screen, and then show you the Base64 conversion. This is done so you can manually verify the conversion is correct.
- It will then print out the results of your request.