Notifications

Notifications in DLP rules

Introduction

Notifications is an optional but important element of data protection rules, allowing administrators and end users to be effectively informed about security-related events. Adding notifications increases transparency of rule operations and enables rapid response to potential policy violations.

Notifications are not required, but their configuration is the next step after defining actions. If the user does not enable notifications, the system still generates logs in the Logstab regardless of configured actions and notifications. Notifications execute concurrently with actions, ensuring full synchronization of operations and messages.

If the administrator wants to configure only a notification without additional actions, simply uncheck "...perform these actions..." in the previous step and proceed to configure notifications.

How to configure a DLP policy or rule?

Available notification options

  1. Log in the system:

    • Display the notification in the system, in the Logs tab of the web console.

  2. Admin alert (Email notification):

    • Send an e-mail message to the specified address or addresses.

  3. Notify the end user:

    • Display a notification window on the user's workstation in the bottom right corner.

Notification configuration

Log

  • Alert content:

    • Ability to enter any text.

    • Optional use of dynamic parameters (e.g., event date, computer name).

The list of available parameters is specific to each trigger and is located under Parameters for notifications.

Admin alert (Email notification)

  • Email addresses:

    • Enter one or multiple email addresses by clicking "+".

    • Remove addresses using the trash icon.

  • Optional settings:

    • Inform the device administrator: Send an email to the person assigned as the administrator in the device details card.

    • Notify the device user: Send an email to the user assigned to the device in the system.

  • Email message content:

    • Editable subject and body of the email.

    • Ability to use an advanced text editor with support for dynamic parameters (e.g., event date, file name).

The list of available parameters is specific to each trigger and is located under Parameters for notifications.

Notify end user

  • Notification in the bottom right corner of the screen for the end user:

    • Less intrusive informational window.

    • Content is visible after clicking the notification.

  • Alert content:

    • Ability to enter any text.

    • Optional use of dynamic parameters (e.g., event date, computer name).

The list of available parameters is specific to each trigger and is located under Parameters for notifications.


Parameters for notifications

chevron-rightFile operationshashtag

%DateTime% Date and time of the event %ComputerName% Computer name %UserName% Name of the logged-in user %ProcessName% Process name %ProcessPath% Path to the process directory %FileName% File name %FilePath% Path to the file directory %OldFileName% Previous file name %OldPath% Previous path to the file directory %FileSize% File size (in bytes) %Operation% Performed operation %DriveType% Type of storage media

chevron-rightScreenshothashtag

%DateTime% Date and time of the event %ComputerName% Computer name %UserName% Name of the logged-in user

chevron-rightCopyinghashtag

%DateTime% Date and time of the event %ComputerName% Computer name %UserName% Name of the logged-in user %ProcessName% Name of the process in which the copy operation occurred %ProcessPath% Path of the process directory %Format% Format of the read data (e.g., text, image, file) %Size% Size of data (in bytes) %Title% Title of the active window at the time of copying

chevron-rightExceeded working hourshashtag

%DateTime% Date and time of the event %ComputerName% Name of the computer where the violation was detected %UserName% Name of the logged-in user

chevron-rightConnecting USB storagehashtag

%DateTime% Date and time of the event %ComputerName% Computer name %UserName% Name of the logged-in user %IDPENDRIVE% Pendrive identifier (e.g., device serial number) %FileSystem% File system (e.g., NTFS, FAT32) %Encryption% Device encryption status

chevron-rightDevice connectionhashtag

%DateTime% Date and time of the event %ComputerName% Computer name %UserName% Name of the logged-in user %DeviceName% Name of the connected device %DeviceStatus% Device status (e.g., enabled, disabled) %ActionStatus% Status of action execution (e.g., success or error of enabling/disabling operation)

chevron-rightLaunched processes/Applicationshashtag

%DateTime% Date and time of the event %ComputerName% Computer name %UserName% Name of the logged-in user %ProcessName% Name of the process related to the event %ProcessPath% Path of the process directory %ParentProcessName% Name of the parent process that started or terminated the given process %ParentProcessPath% Path of the parent process directory %Operation% Performed operation (e.g., "Start" or "Terminate")

chevron-rightBrowsed web pageshashtag

%DateTime% Date and time of the event %ComputerName% Computer name %UserName% Name of the logged-in user %ProcessName% Name of the process in which the page was visited %ProcessPath% Path of the process directory %http% Address of the visited web page %c% Category of the visited web page

chevron-rightFile uploadhashtag

%DateTime% Date and time of the event %ComputerName% Computer name %UserName% Name of the logged-in user %ProcessName% Process name (applies to cloud applications and "Other") %FileName% Name of the uploaded file %FilePath% Path of the directory from which the file is being uploaded

chevron-rightConnecting to a networkhashtag

%DateTime% Date and time of the event %ComputerName% Computer name %UserName% Name of the logged-in user %SSID% SSID (network name) %BSSID% BSSID (MAC address of the access point) %Auth% Authentication algorithm (e.g., WPA2-PSK) %Cipher% Encryption algorithm (e.g., AES) %Channel% Channel on which the network operates %Quality% Signal quality expressed as a percentage [%]

chevron-rightPrintinghashtag

{p:date} Date of the event occurrence {p:user} User {p:pagelimit} Page limit {p:perhours} Within [hours] {p:pagecount} Number of pages printed

chevron-rightNetwork transferhashtag

{p:date} Date of the event occurrence {p:hostname} Computer name {p:ip} Computer IP address {p:user} Name of the logged-in user {p:periodofminutes} Monitoring period (in minutes) {p:filecount} Number of copied files

Summary

  1. Conditions for sending notifications:

    • Notifications are triggered according to the rules of the configured rule, i.e., after the occurrence of the event defined in the trigger.

  2. Practical application:

    • Notifications assist in rapid detection of incidents and their reporting.

    • Alerts for end users can be used as an educational tool to raise employee awareness of security policies.

A detailed description of parameters and usage examples can be found in the section Case Study.

Last updated

Was this helpful?