DeviceLock Overview : ContentLock and NetworkLock
  
ContentLock and NetworkLock
DeviceLock DLP comes with ContentLock and NetworkLock - separately licensed components that provide additional functionality for DeviceLock. These components are installed automatically but require a license to function. For more information on ContentLock and NetworkLock licenses, see ContentLock and NetworkLock Licensing later in this chapter.
 
Note: ContentLock and NetworkLock are not yet supported in DeviceLock Service for Mac.
NetworkLock adds comprehensive context control capabilities over endpoint network communications. It supports port-independent network protocol and application detection and selective blocking, message and session reconstruction with file, data, and parameter extraction, as well as event logging and data shadowing. NetworkLock controls most popular network protocols and applications such as: plain and SSL-protected SMTP email communications (with messages and attachments controlled separately), communications between the Microsoft Outlook client and Microsoft Exchange Server (the MAPI protocol), IBM Notes, Web access and other HTTP-based applications including content inspection of encrypted HTTPS sessions (specifically, Web Mail, WhatsApp, and social networking applications like Gmail, Yahoo! Mail, Windows Live Mail, Facebook, Twitter, LiveJournal, etc.), instant messengers (Skype, Telegram, Viber, WhatsApp, ICQ Messenger, Jabber, IRC, Mail.ru Agent), cloud storages (Amazon S3, Dropbox, Box, Google Drive, Microsoft OneDrive, etc.), file transfers over FTP and FTP-SSL protocols, local network files transfers over SMB, as well as telnet and torrent sessions.
NetworkLock is represented in the user interface of DeviceLock Management Console, Service Settings Editor and DeviceLock Group Policy Manager by the Protocols node:
NetworkLock has the following key features and benefits:
Protocol access control. You can control which users or groups can gain access to the FTP, HTTP, IBM Notes, SMTP, MAPI (Microsoft Exchange), SMB, Telnet and Torrent protocols, instant messengers (Skype, Telegram, Viber, WhatsApp, ICQ Messenger, Jabber, IRC, Mail.ru Agent), cloud storages (Amazon S3, Dropbox, Box, Google Drive, Microsoft OneDrive, etc.), web search sites, career search web-sites, web-conferencing and webinars (Zoom.us), as well as webmail and social networking applications (AOL Mail, freenet.de, Gmail, GMX Mail, Hotmail (Outlook.com), Mail.ru, NAVER, Outlook Web App (OWA), Rambler Mail, T-online.de, Web.de, Yahoo! Mail, Yandex Mail, Zimbra; Facebook, Google+, Instagram, LinkedIn, LiveJournal, MeinVZ, Myspace, Odnoklassniki, Pinterest, StudiVZ, Tumblr, Twitter, Vkontakte, XING, Disqus, LiveInternet.ru) depending on the time of day and day of the week.
Protocols White List. Lets you selectively allow network communication over specified protocols regardless of existing protocol blocking settings. The white list is most effective in “least privilege” scenarios when you block all protocol traffic and then specifically authorize only what is required for employees to perform their daily job duties.
Content-Aware Rules (File Type Detection). You can selectively allow or deny access to specific types of files transmitted over the network. Recognition and identification of file types is based solely upon the content of files. This efficient and reliable algorithm allows for correct identification and handling of files regardless of the file extension. You can also use Content-Aware Rules to allow or deny the shadow copying of specific file types.
 
Note: A ContentLock license is required to gain access to enhanced capabilities of the Content-Aware Rules feature.
Audit, shadowing and alerts. Provides the ability to track user activity for specified protocols, log a full copy of data/files transmitted over the network, and alert IS personnel to inappropriate user actions.
ContentLock is a content monitoring and filtering component that greatly enhances the capabilities of the Content-Aware Rules feature. With ContentLock, you can not only grant or deny access to information based on real file types but also create regular expressions patterns with numerical conditions and Boolean combinations of matching criteria and keywords. Recognizing more than eighty file formats and data types, ContentLock extracts and filters the content of data copied to removable drives and plug-n-play storage devices, as well as that transmitted over the network. With ContentLock, you can also filter shadowed data down to just those pieces of information meaningful to security auditing, incident investigations and forensic analysis before saving in the Shadow Log. This tremendously reduces storage space and network bandwidth requirements for shadow log delivery to the central database.
ContentLock has the following key features and benefits:
Content-based document access control. You can control access to documents depending on their content. Thus, you can block sensitive content leakage while allowing authorized employees to gain access to the information they need to collaborate.
Content-based filtering of shadow data. You can specify that only data that contains sensitive information is shadow copied and saved to the Shadow Log, thus reducing the volume of unnecessary log data and making the log files easier to work with.
Content classification-based control of documents. You can use digital fingerprints and Boldon James Classifier labels to control content access/sending permissions, content-aware shadowing, and/or simple content detection:
Digital fingerprints of sensitive documents are taken and stored on the DeviceLock Enterprise Server. Fingerprints can identify full copies as well as pieces of documents, even if the document has been changed.
In the Boldon James Classifier applications, classification labels specify the level of sensitivity of the document by appropriately setting its attributes.
Expansive coverage of multiple file formats and data types. You can analyze content of the following file formats and data types: Adobe Acrobat (including encrypted files if the type of encryption in the file is one of the following: 40-bit RC4, 128-bit RC4, 128- or 256-bit AES, and the file permissions do not prevent text extraction) (*.pdf), Adobe FrameMaker MIF (*.mif), Ami Pro (*.sam), Ansi Text (*.txt), ASCII Text, ASF media files (metadata only) (*.asf), AutoCAD (*.dwg, *.dxf), CSV (Comma-separated values) (*.csv), DBF (*.dbf), EBCDIC, EML (emails saved by Outlook Express) (*.eml), Enhanced Metafile Format (*.emf), Eudora MBX message files (*.mbx), Flash (*.swf), HTML (*.htm, *.html), iCalendar (*.ics), Ichitaro (versions 5 and later) (*.jtd, *.jbw), JPEG (*.jpg), Lotus 1-2-3 (*.123, *.wk?), MBOX email archives such as Thunderbird (*.mbx), MHT archives (HTML archives saved by Internet Explorer) (*.mht), MIME messages (including attachments), MSG (emails saved by Outlook) (*.msg), Microsoft Access MDB files (*.mdb, *.accdb, including Access 2007 and Access 2010), Microsoft Document Imaging (*.mdi), Microsoft Excel (*.xls), Microsoft Excel 2003 XML (*.xml), Microsoft Excel 2007, 2010, and 2013 (*.xlsx), Microsoft OneNote 2007, 2010, and 2013 (*.one), Microsoft Outlook data files (*.PST), Microsoft Outlook/Exchange Messages, Notes, Contacts, Appointments, and Tasks, Microsoft Outlook Express 5 and 6 (*.dbx) message stores, Microsoft PowerPoint (*.ppt), Microsoft PowerPoint 2007, 2010, and 2013 (*.pptx), Microsoft Rich Text Format (*.rtf), Microsoft Searchable Tiff (*.tiff), Microsoft Visio (*.vsd, *.vst, *.vss, *.vdw, *.vsdx, *.vssx, *.vstx, *.vsdm, *.vssm, *.vstm), Microsoft Word for DOS (*.doc), Microsoft Word for Windows (*.doc), Microsoft Word 2003 XML (*.xml), Microsoft Word 2007, 2010, and 2013 (*.docx), Microsoft Works (*.wks), MP3 (metadata only) (*.mp3), Multimate Advantage II (*.dox), Multimate version 4 (*.doc), OpenOffice versions 1, 2, and 3 documents, spreadsheets, and presentations (*.sxc, *.sxd, *.sxi, *.sxw, *.sxg, *.stc, *.sti, *.stw, *.stm, *.odt, *.ott, *.odg, *.otg, *.odp, *.otp, *.ods, *.ots, *.odf) (includes OASIS Open Document Format for Office Applications), Quattro Pro (*.wb1, *.wb2, *.wb3, *.qpw), QuickTime (*.mov, *.m4a, *.m4v), TIFF (metadata only) (*.tif), TNEF (winmail.dat), Treepad HJT files (*.hjt), Unicode (UCS16, Mac or Windows byte order, or UTF-8), Visio XML files (*.vdx), Windows Metafile Format (*.wmf), WMA media files (metadata only) (*.wma), WMV video files (metadata only) (*.wmv), WordPerfect 4.2 (*.wpd, *.wpf), WordPerfect (5.0 and later) (*.wpd, *.wpf), WordStar version 1, 2, 3 (*.ws), WordStar versions 4, 5, 6 (*.ws), WordStar 2000, Write (*.wri), XBase (including FoxPro, dBase, and other XBase-compatible formats) (*.dbf), XML (*.xml), XML Paper Specification (*.xps), XSL, XyWrite as well as PostScript, PCL5, PCL6 (PCL XL), HP-GL/2, EMF spooled files and GDI printing (ZjStream).
 
Note: The content of AutoCAD (DWG, DXF) file formats can be analyzed on Windows XP and later systems.
Automated protection of new documents. You can have content-based security policies automatically applied to new documents as they are created.
Multiple content detection methods. Various methods can be used to identify sensitive content contained in documents (based on regular expressions, keywords, and document properties).
Centralized content management. Content-Aware Rules are created based on content groups that enable you to centrally define the types of the content that is subject to control.
Ability to override device type/protocol-level policies. You can selectively allow or deny access to certain content regardless of preset permissions at the device type-/protocol-level.
Inspection of files within archives. Allows you to perform deep inspection of each individual file contained in an archive. The following inspection algorithm is used: When a user attempts to copy an archive file to a device or transmit it over the network, all files are extracted from the archive and analyzed separately to detect the content to which access is denied by Content-Aware Rules. If Content-Aware Rules deny access to at least one of the files extracted from the archive, the user is denied access to the archive. If Content-Aware Rules allow access to all of the files extracted from the archive, the user is allowed access to the archive.
 
Note: DeviceLock may skip inspecting fingerprints of files within an archive if it has detected an exact match of the archive file with a source file of a certain fingerprint. For details, see Inspecting fingerprints within archives in the Digital Fingerprints section of this document.
All archived files are extracted to the Temp folder of the System user. Typically, the system Temp folder resides in the following location: %windir%\Temp. If DeviceLock Service cannot access the Temp folder, the archived files are not analyzed and access to the archive is denied only if any one of the following conditions is true:
There is a Deny Content-Aware Rule
Deny-access permissions are set for the device type or protocol
All nested archives are also unpacked and analyzed one by one. Archive files are detected by content, not by extension. The following archive formats are supported: 7z (.7z), ZIP (.zip), GZIP (.gz, .gzip, .tgz), BZIP2 (.bz2, .bzip2, .tbz2, .tbz), TAR (.tar), RAR (.rar), CAB (.cab), ARJ (.arj), Z (.z, .taz), CPIO (.cpio), RPM (.rpm), DEB (.deb), LZH (.lzh, .lha), CHM (.chm, .chw, .hxs), ISO (.Iso), UDF (.Iso), COMPOUND (.Msi), WIM (.wim, .swm), DMG (.dmg), XAR (.xar), HFS (.hfs), NSIS (.exe), XZ (.xz), MsLZ (.mslz), VHD (.vhd), FLV (.flv), SWF (.swf) as well as CramFS, SquashFS (.squashfs), NTFS, FAT, and MBR file system and disk images. Split (or multi-volume) and password-protected archives are not unpacked.
 
Note: To allow transfer of split (multi-volume) archives in case of content-aware rules combined with Archives content inspection on read or Archives content inspection on write option enabled in Service Options, configure allow rules based on Document Properties Content Groups with the Text extraction not supported flag selected.
Optical Character Recognition (OCR). The use of the OCR technology allows you to recognize and extract text from scanned documents, camera-captured documents (if these documents were aligned 90 degrees to the camera), and screen shots of documents for further content analysis by Content-Aware Rules.
OCR includes the following capabilities:
An entire image or some portions of the image can be inverted, rotated, or mirrored.
Images with poor brightness or low contrast are supported.
Most fonts can be accurately recognized.
OCR includes the following limitations:
Recognition of handwritten text or any fonts that look like handwritten text is not supported.
Embossed and engraved texts are not recognized.
Best recognition results are achieved for black text on a white background.
The built-in OCR supports the following languages: Arabic, Bulgarian, Catalan, Chinese - Simplified, Chinese - Traditional, Croatian, Czech, Danish, Dutch, English, Estonian, Finnish, French, German, Hungarian, Indonesian, Italian, Japanese, Korean, Latvian, Lithuanian, Norwegian, Polish, Portuguese, Romanian, Russian, Slovak, Slovenian, Spanish, Swedish, and Turkish. The following image files are supported for OCR processing: BMP files, Dr. Halo CUT files, DDS files, EXR files, Raw Fax G3 files, GIF files, HDR files, ICO files, IFF files (except Maya IFF files), JBIG files, JNG files, JPEG/JIF files, JPEG-2000 files, JPEG-2000 codestream files, KOALA files, Kodak PhotoCD files, MNG files, PCX files, PBM/PGM/PPM files, PFM files, PNG files, Macintosh PICT files, Photoshop PSD files, RAW camera files, Sun RAS files, SGI files, TARGA files, TIFF files, WBMP files, XBM files, and XPM files.
 
Note: The OCR feature is only supported on Windows XP and later versions of Windows.
Text in picture detection. The use of the text in picture detection technology allows you to classify all images into two groups: text images (containing text, such as scanned documents or screen shots of documents) and non-text images (those that do not contain text), and separately control access to each group. For example, you can allow certain users to copy non-text images to devices, but prevent them from writing text images thus preventing leakage of sensitive information within image files. The following image files are supported: BMP files, Dr. Halo CUT files, DDS files, EXR files, Raw Fax G3 files, GIF files, HDR files, ICO files, IFF files (except Maya IFF files), JBIG files, JNG files, JPEG/JIF files, JPEG-2000 files, JPEG-2000 codestream files, KOALA files, Kodak PhotoCD files, MNG files, PCX files, PBM/ PGM/PPM files, PFM files, PNG files, Macintosh PICT files, Photoshop PSD files, RAW camera files, Sun RAS files, SGI files, TARGA files, TIFF files, WBMP files, XBM files, and XPM files.
Inspection of images embedded in documents. Allows you to perform deep inspection of each individual image embedded in saved emails (EML), Adobe Portable Document Format (including encrypted files if the type of encryption in the file is one of the following: 40-bit RC4, 128-bit RC4, 128-bit AES and 256-bit AES, and the file permissions do not disable text extraction) (PDF) files, Rich Text Format (RTF), AutoCAD files (.dwg, .dxf), and Microsoft Office documents (.doc, .xls, .ppt, .vsd, .docx, .xlsx, .pptx, .vsdx). All embedded images are extracted from these documents to the Temp folder of the System user and analyzed independently from text to detect the content to which access is denied by Content-Aware Rules. The text contained inside documents is checked by Content-Aware Rules that are created based on Keywords, Pattern or Complex content groups. Embedded images are checked by Content-Aware Rules that are created based on Keywords, Pattern, File Type Detection, Document Properties or Complex content groups. Access to documents is granted only when Content-Aware Rules allow access to text and all of the images contained in documents.
 
Note: Deep inspection of images embedded in files of AutoCAD (DWG, DXF) formats can be performed on Windows XP and later systems only.