Modules - Data Loss Prevention (DLP)

What is Avanan DLP?

Cloud applications make it easier than ever for your employees to access and share data, both internally and externally. This makes cloud services a major source of risk. Complicated sharing permissions make data leakage and compliance difficult to manage.

Avanan enables you to create universal policies across multiple cloud applications to control how files are shared amongst internal and external users. Our advanced tools identify and mark files containing confidential, financial, and personally identifiable information, including: credit card numbers, social security numbers, bank routing numbers, or data protected under HIPAA.

Avanan SmartDLP - DLP Engine

SmartDLP is a DLP engine developed by Avanan. It allows to easily detect sensitive information and generate security alerts in Avanan with a DLP policies.

For more information on SmartDLP read the following article.

Note - DLP is not available for Avanan Portal accounts residing in the United Arab Emirates (UAE) region. If required, you can request to enable DLP. However, sensitive data analysis will be performed in the United Kingdom (UK) and not within the borders of the UAE. If you wish to enable DLP, contact Avanan Support.

Benefits

  • Scan emails and files for sensitive information with ease, by using a common solution for all platforms.
  • Stop data leakage by using automated actions.
  • Generate actionable alerts.
  • Use an integrated solution for DLP and other types of attacks, such as phishing and malware.

Data Loss Prevention (DLP) Policy

DLP Policy filters outgoing emails to ensure that sensitive data does not reach unauthorized recipients. In addition, it can also filter incoming emails to ensure sensitive data is not stored in your organization's mailboxes and/or that it is shared only through authorized delivery methods.

Note - Changing the policy protection mode from Monitor Only or Detect and Prevent mode to Prevent (Inline) mode takes time to start protecting in Prevent (Inline) mode. It could take up to an hour, depending on the number of protected users in the Avanan account.

For more details about the DLP security engine, see Configuring DLP Security Engine.

DLP Policy for Outgoing Emails

To configure the DLP policy for outgoing emails:

  1. Go to Policy.
  2. Click Add a New Policy Rule.
  3. Select the desired SaaS application under Choose SaaS drop-down.
  4. Select DLP under Choose Security drop-down and click Next.
  5. Select Protect (Inline) or Monitor only mode.
  6. Select the Scope of the policy:
    1. Select Outbound Emails.
    2. Select the Specific Sending Users and Groups, the policy applies to.
  7. In the DLP Criteria section, do these:
    1. Select the required DLP Categories.
    2. Select the required Sensitivity Level. See DLP Policy Sensitivity Level.
    3. If you need to add a subject regular expression as the matching criteria to the DLP policy, under Advanced, enable the Enable matching based on subject regular expression checkbox and enter the regular expression. See DLP Subject Regular Expression.
      DLP-Subject-Regular-Expression
  8. In the DLP Workflow section, select the required DLP workflow. See DLP Workflows for outgoing emails.
    Note - This option is available only in Protect (Inline) mode.
  9. Select the required Severity.
  10. Select the required DLP Alerts. See DLP alerts for outgoing emails.
  11. Click Save and Apply.
    Note - Applying a Prevent (Inline) rule could take up to an hour to take effect, depending on the number of protected users in the Avanan account.

For more details about the DLP security engine, see Data Loss Prevention.

DLP Subject Regular Expression (Regex)

By default, Avanan matches emails to DLP policy rules based on the data types detected in them. However, you can use regular expressions to match emails from the email subject.

This type of matching helps you to detect sensitive emails from the email subject and allows you to trigger specific workflow. Therefore, emails with a defined subject pattern will match the DLP policy rule regardless of the data types they include.

To add a regular expression condition to a DLP policy:

  1. Navigate to Policy.
  2. To add the regular expression to an existing DLP policy, click the policy and continue from step 6.
  3. To create a new DLP policy, click Add a New Policy Rule.
  4. Select the desired SaaS application under Choose SaaS drop-down.
  5. Select DLP under Choose Security drop-down and click Next.
  6. Select Prevent (Inline) or Monitor only protection mode.
  7. Select the Scope of the policy:
    1. Select email direction as Outbound.
    2. Under Senders, select the Specific Users and Groups the policy applies to.
  8. In the DLP Criteria section, do these:
    1. Select the required DLP Categories.
    2. Select the required Sensitivity Level.
    3. In Advanced, select the Enable matching based on subject regular expression checkbox.
    4. Enter the regular expressions.
  9. Click Save & Apply.

Subject Regular Expressions Syntax

The Subject Regular Expression field allows you to enter values in the Python Regular Expressions (RE) syntax.

For example, to create a DLP policy rule to find emails that contain the string [secure] in the email subject, add (?i)[secure] to the Subject Regular Expression field in the policy.

For more information, see Python regular expressions documentation.

DLP Workflows for Outgoing Emails

Workflow Description
Email is blocked. User is alerted and allowed to request a restore (admin must approve)

Any detected email will not be delivered to the recipient and will be moved to quarantine mailbox.

  1. The user receives an email with an alert of the quarantine action.
  2. To view the original email, the user must request to restore the email.
  3. An administrator must approve the request.
Email is blocked. User is alerted and allowed to restore the email

Any detected email will not be delivered to the recipient and will be moved to quarantine mailbox.

  1. The user receives an email with an alert of the quarantine action.
  2. The user can restore the original email without any administrator approval.
Email is allowed. Header is added to the email Any detected email will be delivered to the recipient with additional header that is configured in the policy.
Do nothing Any detected email will be delivered to the recipient without any changes.
Microsoft Encryption Workflows
Email is blocked and user can resend as encrypted by Microsoft Any detected email will not be delivered to the recipient and the user can resend the email as Microsoft encrypted email.
Email is allowed. Encrypted by Microsoft Any detected email will be delivered to the recipient as encrypted by Microsoft and a header will be added to the email. For more information, see Office 365 Encryption.
Email is blocked and user can request to resend as encrypted by Microsoft (admin must approve)

Any detected email will not be delivered to the recipient and will be moved to quarantine mailbox.

  1. The user receives an email with an alert of the quarantine action.
  2. The user can request to resend as Microsoft encrypted email.
  3. An administrator must approve the request.
SmartVault Workflows
Email is blocked and user can resend as encrypted by SmartVault Any detected email will not be delivered to the recipient and the user can resend the email as SmartVault email.
Email is allowed. Encrypted by SmartVault Any detected email will be vaulted by SmartVault and the recipient receives a email notification. For more information, see Avanan SmartVault.
Email is blocked and user can request to resend as encrypted by SmartVault (admin must approve)

Any detected email will not be delivered to the recipient and will be moved to quarantine mailbox.

  1. The user receives an email with an alert of the quarantine action.
  2. The user can request to resend as SmartVault email.
  3. An administrator must approve the request.


For more information on who receives the restored emails, see Who receives the Emails Restored from Quarantine.

DLP Alerts for Outgoing Emails

You can configure alerts for outgoing emails detected to contain a DLP violation:

  1. Send notification email to specific recipients when DLP is detected. It is possible to customize email
    template using the gear icon next to the action.
  2. Send email alert to the sender when DLP Subject Regex pattern and DLP is detected in the email
    subject. For details, see DLP Subject Regular Expression.
  3. Send email alert to the sender when DLP Subject Regex pattern is not detected but DLP is detected in the email subject. For details, see DLP Subject Regular Expression.

Prerequisites to Avoid Failing SPF Checks

For Office 365 Mail, if you enable Protect (Inline) Outgoing Traffic in the DLP or Threat Detection policy, Avanan gets added to the email delivery chain before reaching external recipients (Internal email sender > Microsoft 365 > Avanan > Microsoft 365 > External recipient).

The recipient's email security solution sees the Avanan IP address as part of the delivery chain. If the recipient's email security solution fails to recognize the original IP address, it may consider the Avanan IP address as the IP address from which the email was sent.

If you do not configure the SPF record in your DNS to allow Avanan IP addresses to send emails on behalf of your domain, your emails might fail SPF checks and may be rejected. Avanan recommends you add the Avanan IP addresses to your SPF record before you enable Protect (Inline) Outgoing Traffic for outgoing emails.

To prevent outgoing emails from failing SPF checks and being quarantined, you must add include:spfa.cpmails.com to your SPF record.

Note - The above statement includes several IP addresses and networks, some outside your Avanan portal's data region. This is done for uniformity and consistency in all Avanan SPF records regardless of your data region. Avanan sends the emails only from one of the IP addresses in your region.

Office 365 Footprint

Transport rules:

Additional transport rule is created when enabling Inline DLP.

  • Rule name: Avanan - Protect Outgoing.
  • Verify similar to Avanan - Protect.
  • Rule:

    DLP-three

  • Rule description:
    DLP-four

Connectors

Additional connector will be added, Avanan to O365

  • Connector:

DLP-five

 

DLP Policy Sensitivity Level

The Sensitivity Level for a DLP policy is the minimum number of times all the Data Types in the selected categories need to match (hit count) for the policy to trigger the DLP workflow.

You can select these Sensitivity Level for every policy rule.

  • Very High (hit count > 0)
  • High (hit count > 2)
  • Medium (hit count > 5)
  • Low (hit count > 10)
  • Very Low (hit count > 20)
  • Custom (and enter the minimum hit count (Hit count higher than) required for the policy)

For example, a DLP policy includes only the PII category and you selected the Sensitivity Level as High.

  • If all the Data Types in PII were matched only once - the rule does not trigger the selected DLP workflow.
  • If all the Data Types in PII were matched three times - the rule triggers the selected DLP workflow.

DLP Policy for Incoming Emails

To configure the DLP policy for incoming emails:

  1. Go to Policy.
  2. Click Add a New Policy Rule.
  3. Select the desired SaaS application under Choose SaaS drop-down.
  4. Select DLP under Choose Security drop-down and click Next.
  5. Select Protect (Inline) mode.
  6. Select the Scope of the policy:
    1. Select Inbound Emails.
      Note - This option is available only in Protect (Inline) mode.
    2. Select the Specific Receiving Users and Groups to which the policy applies.
  7. In the DLP Criteria section, do these:
    1. Select the required DLP Categories.
    2. Select the required Sensitivity Level. See DLP Policy Sensitivity Level.
  8. Select the required DLP Rules.
  9. Select the required DLP workflow.
  10. Click Save and Apply.
    Note - Applying a Prevent (Inline) rule could take up to an hour to take effect, depending on the number of protected users in the Avanan account.

For more details about configuring the DLP engine, see Data Loss Prevention.

DLP Workflows for Incoming Emails

  • Email is blocked. User is alerted and allowed to request a restore (admin must approve) (default)
    - Detected email will not be delivered to the recipient and will be moved to quarantine mailbox. The
    user will receive an email with an alert of the quarantine action, and will be able to request to restore
    the original email (send the original email to the recipient).
  • Email is blocked. User is alerted and allowed to restore the email - Any detected email will not be
    delivered to the recipient and will be moved to quarantine mailbox; the user will receive an email with
    alert of the quarantine action, and will be able to restore the original email (send the original email to
    the recipient).
  • Do nothing - Any detected email will be delivered to the recipient without any changes.
  • User receives the email with a warning - The email is delivered to the user with a warning banner inserted in the body of the email. To customize the banner (text, background color, etc.), click the gear icon next to the workflow.

DLP Alerts for Incoming Emails

You can configure alerts for incoming emails detected to contain a DLP violation:

  • Send alert on this violation to specific mailboxes.
  • Alert the external sender about the violation when the email is quarantined.