Masks
Configuration of path, file, and process masks.
Introduction
Configuring DLP rules in the system often requires defining locations, file types, or processes that will be covered by the security policy. Masks allow precise specification of what should be monitored or blocked, and exclusion masks enable the omission of specified elements from rule enforcement.
Examples of mask usage
Path mask: Specifies locations covered by the rule, e.g.
C:\Desktop. All files located in this location (including subfolders) will be monitored unless excluded, e.g.C:\Desktop\Śmietnik.File mask: Specifies types of files covered by the policy, e.g.
*.txt. All text files will be covered by the rule, with the option to exclude specific files, e.g.ABCD.TXT.Process mask: Specifies processes covered by the rule, e.g.
*.exe. Specific processes can be excluded, such aschrome.exe.
Practical applications
Path mask:
Configuration:
The rule covers files in the location
C:\Desktop.Exclusion:
C:\Desktop\Śmietnik.
Effect: All files on the desktop (including subdirectories) will be monitored, except those located in the "Śmietnik" folder.
File mask:
Configuration:
File monitoring
*.docx.Exclusion:
Raport.docx.
Effect: The policy applies to all Word files in the location, except for the specified file "Raport.docx".
Process mask:
Configuration:
Process monitoring
*.exe.Exclusion:
chrome.exe.
Effect: All executable processes are monitored, excluding the Chrome browser.
Advanced example:
File mask:
*faktura*.*.Effect: All files containing "faktura" in the name (any part of the name) with any extension are monitored.
Exclusion:
TESTfaktura.doc.
Step-by-step configuration
Creating a path, file, or process mask
Expand the configuration field
In the main rule view, go to the mask configuration section.

Add a new mask
Click + Add new next to the appropriate field.
Edit the mask
After confirmation, a field will open where you can change the mask name.
Optionally add a description to facilitate identifying the mask in the future.
Enter mask criteria
Enter path, file, or process masks (one item per line).
Example:
Paths:
C:\Desktop,C:\Documents.Files:
*.txt,Raport.docx.Processes:
chrome.exe,*.exe.

Confirm configuration
Click "Save" to add the mask to the list of available masks or abort the process using the "Cancel" button.
The new mask will also be available as an exclusion mask option.
Example of applying masks in rules
Trigger File operation
File masks allow monitoring of file opening within selected processes, e.g.:
File monitoring
*.docxin the processword.exe.Blocking opening of files in the process
chrome.exe.
Additional information
Recommendation for broad masks: For broad masks, it is advisable to use exclusion masks, e.g.:
Files:
*.bin, *.cookie, *.dat, *.db, *.dll, *.exe, *.ini, *.json, *.lnk, *.nls, *.ost, *.prefs, *.sdb, *.sync, *.temp, *.tmp.Paths:
AppData, Program Files, Windows.
INFO: Examples are only suggested usages and are not subject to vendor validation. They should be modified according to the organization's requirements.
Summary
Path, file, and process masks are a flexible tool that enables precise control over DLP rule behavior. Masks allow focusing monitoring on critical areas while excluding locations, files, or processes considered irrelevant.
Last updated
Was this helpful?