SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
FORTIGATE FIREWALL HOW TO
DLP
www.ipmax.it
INTRODUCTION
If you are working for an enterprise or your business requires confidentiality, you may need to implement
countermeasures in order to prevent sensitive data to go outside your company.
Fortigate feature that implements data confidentiality is called Data Leak Prevention (DLP). DLP scans
outgoing traffic and blocks any sensitive data from leaving your network.
In order to configure DLP, the feature must be enabled on the
firewall. As all other Fortigate capabilities, DLP can be enabled
without any ad hoc license.
Go to System > Config > Features and enable both DLP and
Multiple Security Profiles if they are not yet active.
CONFIGURING DLP
As many other feature, the configuration foresees the creation of a sensor and its application to a
firewall policy.
Go to Security Profiles > Data Leak
Prevention > File Filter. Select Create
New to make a File Filter Table. Insert
the table name and click OK; now we
can insert new filters.
Creating the filter we can chose the
filter type (file name or file type). In
the example at right side we have
chosen «File Name Pattern», so we
can insert the name or extension of a
file we want to block.
CONFIGURING DLP - CONTINUED
Filtering on file name or extension basis is a very
simple method and exposes your network to data
leaks in case users rename files.
A more sophisticated method is filtering by file type.
In this case, the Fortigate scans file content and
recognizes its type also in case a user renames it.
Now we have to associate the just created file filter
to a new sensor.
Go to Security Profiles > Data Leak Prevention >
Sensors. Select the plus icon in the upper right corner
of the window to create a new sensor.
CONFIGURING DLP - CONTINUED
Select Create New to make a new filter and set the
type to Files.
Enable File Type included in and set it to your
previously created file filter.
Under Examine the following Services, select the
services you wish to monitor with DLP.
Finally set the Action to Block.
Now the only thing to do is to associate the sensor to a
firewall policy for the traffic going outside.
MORE NEEDS?
See hints on www.ipmax.it
Or email us your questions to info_ipmax@ipmax.it
IPMAX
IPMAX is a Fortinet Partner in Italy.
IPMAX is the ideal partner for companies seeking quality in products and services. IPMAX
guarantees method and professionalism to support its customers in selecting technologies with
the best quality / price ratio, in the design, installation, commissioning and operation.
IPMAX srl
Via Ponchielli, 4
20063 Cernusco sul Naviglio (MI) – Italy
+39 02 9290 9171

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Introduction and history of linux
Introduction and history of linuxIntroduction and history of linux
Introduction and history of linux
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
NTFS file system
NTFS file systemNTFS file system
NTFS file system
 
Linux kernel
Linux kernelLinux kernel
Linux kernel
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Basic commands for powershell : Configuring Windows PowerShell and working wi...
Basic commands for powershell : Configuring Windows PowerShell and working wi...Basic commands for powershell : Configuring Windows PowerShell and working wi...
Basic commands for powershell : Configuring Windows PowerShell and working wi...
 
Process management
Process managementProcess management
Process management
 
Process management in linux
Process management in linuxProcess management in linux
Process management in linux
 
Kali linux tutorial
Kali linux tutorialKali linux tutorial
Kali linux tutorial
 
Kali linux and hacking
Kali linux  and hackingKali linux  and hacking
Kali linux and hacking
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
File permission in linux
File permission in linuxFile permission in linux
File permission in linux
 
Linux ppt
Linux pptLinux ppt
Linux ppt
 
part2.pdf
part2.pdfpart2.pdf
part2.pdf
 
Unix Linux Commands Presentation 2013
Unix Linux Commands Presentation 2013Unix Linux Commands Presentation 2013
Unix Linux Commands Presentation 2013
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
 
Vi editor
Vi editorVi editor
Vi editor
 
VI editor in unix
VI editor in unix VI editor in unix
VI editor in unix
 
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
Sa1 chapter-5-managing-local-linux-users-and-groups-v2 (4)
 

Destacado

Assistive Technology Presentation
Assistive Technology PresentationAssistive Technology Presentation
Assistive Technology Presentation
Michelle Allen
 
NORMAS AASHTO2007 SECCIÓN2 DEFINICIONES
NORMAS AASHTO2007 SECCIÓN2 DEFINICIONESNORMAS AASHTO2007 SECCIÓN2 DEFINICIONES
NORMAS AASHTO2007 SECCIÓN2 DEFINICIONES
pablosantosfreire
 
El galante. TIC
El galante. TICEl galante. TIC
El galante. TIC
El Galante
 
Automobile company centralizes master data management for improved efficiency
Automobile company centralizes master data management for improved efficiencyAutomobile company centralizes master data management for improved efficiency
Automobile company centralizes master data management for improved efficiency
Capgemini
 
Curriculum Vitae_Cramer 01132016
Curriculum Vitae_Cramer 01132016Curriculum Vitae_Cramer 01132016
Curriculum Vitae_Cramer 01132016
Joel Cramer
 
Revista az disputa por la educacion
Revista az disputa por la educacionRevista az disputa por la educacion
Revista az disputa por la educacion
Lina Salvador
 

Destacado (20)

FortiGate Firewall How-To: WEB Filtering
FortiGate Firewall How-To: WEB FilteringFortiGate Firewall How-To: WEB Filtering
FortiGate Firewall How-To: WEB Filtering
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
MicrosoftのOSSへの取り組み
MicrosoftのOSSへの取り組みMicrosoftのOSSへの取り組み
MicrosoftのOSSへの取り組み
 
スタートアップがスマホアプリゲームをAzureのサービスで運用した話
スタートアップがスマホアプリゲームをAzureのサービスで運用した話スタートアップがスマホアプリゲームをAzureのサービスで運用した話
スタートアップがスマホアプリゲームをAzureのサービスで運用した話
 
【FORTINET様】第3回SoftLayer勉強会資料
【FORTINET様】第3回SoftLayer勉強会資料【FORTINET様】第3回SoftLayer勉強会資料
【FORTINET様】第3回SoftLayer勉強会資料
 
Tutti pronti per Windows 10?
Tutti pronti per Windows 10?Tutti pronti per Windows 10?
Tutti pronti per Windows 10?
 
Assistive Technology Presentation
Assistive Technology PresentationAssistive Technology Presentation
Assistive Technology Presentation
 
VDI Performance of PRIMERGY S7 Server Generation
VDI Performance of PRIMERGY S7 Server GenerationVDI Performance of PRIMERGY S7 Server Generation
VDI Performance of PRIMERGY S7 Server Generation
 
NORMAS AASHTO2007 SECCIÓN2 DEFINICIONES
NORMAS AASHTO2007 SECCIÓN2 DEFINICIONESNORMAS AASHTO2007 SECCIÓN2 DEFINICIONES
NORMAS AASHTO2007 SECCIÓN2 DEFINICIONES
 
El galante. TIC
El galante. TICEl galante. TIC
El galante. TIC
 
Delio Live Help Tool "Software marketing y Ventas"- by Walmeric
Delio  Live Help Tool "Software marketing y Ventas"- by Walmeric Delio  Live Help Tool "Software marketing y Ventas"- by Walmeric
Delio Live Help Tool "Software marketing y Ventas"- by Walmeric
 
Bauerngarten No.1 Laurustico
Bauerngarten   No.1 LaurusticoBauerngarten   No.1 Laurustico
Bauerngarten No.1 Laurustico
 
La citazione in giudizio verso Mercedes
La citazione in giudizio verso MercedesLa citazione in giudizio verso Mercedes
La citazione in giudizio verso Mercedes
 
Ved
VedVed
Ved
 
metodos de fenotipificacion
metodos de fenotipificacionmetodos de fenotipificacion
metodos de fenotipificacion
 
4 g lte vs wimax,
4 g lte vs wimax,4 g lte vs wimax,
4 g lte vs wimax,
 
Presentacion industrias racionero
Presentacion industrias racioneroPresentacion industrias racionero
Presentacion industrias racionero
 
Automobile company centralizes master data management for improved efficiency
Automobile company centralizes master data management for improved efficiencyAutomobile company centralizes master data management for improved efficiency
Automobile company centralizes master data management for improved efficiency
 
Curriculum Vitae_Cramer 01132016
Curriculum Vitae_Cramer 01132016Curriculum Vitae_Cramer 01132016
Curriculum Vitae_Cramer 01132016
 
Revista az disputa por la educacion
Revista az disputa por la educacionRevista az disputa por la educacion
Revista az disputa por la educacion
 

Similar a Fortigate Firewall How to - DLP

10 cosas que un firewall debería hacer
10 cosas que un firewall debería hacer10 cosas que un firewall debería hacer
10 cosas que un firewall debería hacer
aloscocco
 
Installing R H E L 5
Installing  R H E L 5Installing  R H E L 5
Installing R H E L 5
monywa
 

Similar a Fortigate Firewall How to - DLP (20)

Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthrough
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
 
Scanning & Password Protecting Docs
Scanning & Password Protecting DocsScanning & Password Protecting Docs
Scanning & Password Protecting Docs
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
10 cosas que un firewall debería hacer
10 cosas que un firewall debería hacer10 cosas que un firewall debería hacer
10 cosas que un firewall debería hacer
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdf
 
White paper clape
White paper clapeWhite paper clape
White paper clape
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Installing R H E L 5
Installing  R H E L 5Installing  R H E L 5
Installing R H E L 5
 
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Eu gdpr technical workflow and productionalization   neccessary w privacy ass...Eu gdpr technical workflow and productionalization   neccessary w privacy ass...
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
 
Azure Data Loss Prevention
Azure Data Loss PreventionAzure Data Loss Prevention
Azure Data Loss Prevention
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthrough
 
Mazenet Technologies-Tally
Mazenet Technologies-TallyMazenet Technologies-Tally
Mazenet Technologies-Tally
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
 

Más de IPMAX s.r.l.

Más de IPMAX s.r.l. (10)

Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatchHuawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionHuawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
 
Huawei Switch S5700 How To - Configuring single-tag vlan mapping
Huawei Switch S5700  How To - Configuring single-tag vlan mappingHuawei Switch S5700  How To - Configuring single-tag vlan mapping
Huawei Switch S5700 How To - Configuring single-tag vlan mapping
 
Huawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
Huawei SAN Storage How To - Configuring the i-SCSI Communication ProtocolHuawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
Huawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
 
Huawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setupHuawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setup
 
Huawei SAN Storage How To - Assigning Management IP Address
Huawei SAN Storage How To - Assigning Management IP AddressHuawei SAN Storage How To - Assigning Management IP Address
Huawei SAN Storage How To - Assigning Management IP Address
 
Huawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP serverHuawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP server
 
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP modeHUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
 
FortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZFortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZ
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 

Fortigate Firewall How to - DLP

  • 1. FORTIGATE FIREWALL HOW TO DLP www.ipmax.it
  • 2. INTRODUCTION If you are working for an enterprise or your business requires confidentiality, you may need to implement countermeasures in order to prevent sensitive data to go outside your company. Fortigate feature that implements data confidentiality is called Data Leak Prevention (DLP). DLP scans outgoing traffic and blocks any sensitive data from leaving your network. In order to configure DLP, the feature must be enabled on the firewall. As all other Fortigate capabilities, DLP can be enabled without any ad hoc license. Go to System > Config > Features and enable both DLP and Multiple Security Profiles if they are not yet active.
  • 3. CONFIGURING DLP As many other feature, the configuration foresees the creation of a sensor and its application to a firewall policy. Go to Security Profiles > Data Leak Prevention > File Filter. Select Create New to make a File Filter Table. Insert the table name and click OK; now we can insert new filters. Creating the filter we can chose the filter type (file name or file type). In the example at right side we have chosen «File Name Pattern», so we can insert the name or extension of a file we want to block.
  • 4. CONFIGURING DLP - CONTINUED Filtering on file name or extension basis is a very simple method and exposes your network to data leaks in case users rename files. A more sophisticated method is filtering by file type. In this case, the Fortigate scans file content and recognizes its type also in case a user renames it. Now we have to associate the just created file filter to a new sensor. Go to Security Profiles > Data Leak Prevention > Sensors. Select the plus icon in the upper right corner of the window to create a new sensor.
  • 5. CONFIGURING DLP - CONTINUED Select Create New to make a new filter and set the type to Files. Enable File Type included in and set it to your previously created file filter. Under Examine the following Services, select the services you wish to monitor with DLP. Finally set the Action to Block. Now the only thing to do is to associate the sensor to a firewall policy for the traffic going outside.
  • 6. MORE NEEDS? See hints on www.ipmax.it Or email us your questions to info_ipmax@ipmax.it
  • 7. IPMAX IPMAX is a Fortinet Partner in Italy. IPMAX is the ideal partner for companies seeking quality in products and services. IPMAX guarantees method and professionalism to support its customers in selecting technologies with the best quality / price ratio, in the design, installation, commissioning and operation. IPMAX srl Via Ponchielli, 4 20063 Cernusco sul Naviglio (MI) – Italy +39 02 9290 9171