Configuring DSMs
Symantec Data Loss Prevention (DLP)
359
Step 8
On the
Conditions
panel, select the following conditions:
•
From the first drop-down list box, select
Protocol or Endpoint Monitoring
.
•
From the second drop-down list box, select
Is Any Of
.
•
From the third drop-down list box, select
SMTP
.
Step 9
On the
Actions
panel, click
Add Action
.
Step 10
From the
Actions
drop-down list box, select
All: Log to a Syslog Server
.
The Log to a Syslog Server actions are displayed.
Step 11
Configure the following options:
a
Host
- Type the IP address of SIEM or an Event Collector.
b
Port
- Type
514
as the syslog port.
c
Message
-Type the following string to add a message for SMTP events.
LEEF:1.0|Symantec|DLP|2:medium|$POLICY$|suser=$SENDER$|duser=
$RECIPIENTS$|rules=$RULES$|matchCount=$MATCH_COUNT$|blocked=$
BLOCKED$|incidentID=$INCIDENT_ID$|incidentSnapshot=$INCIDENT_
SNAPSHOT$|subject=$SUBJECT$|fileName=$FILE_NAME$|parentPath=$
PARENT_PATH$|path=$PATH$|quarantineParentPath=$QUARANTINE_PAR
ENT_PATH$|scan=$SCAN$|target=$TARGET$
d
Level
- From this drop-down list box, select
6 - Informational
.
Step 12
Click
Save
.
You are now ready to configure your None Of SMTP response rule.
Creating a None Of
SMTP Response Rule
To configure a None Of SMTP response rule in Symantec DLP:
Step 1
From the menu, select the
Manage > Policies > Response Rules
.
Step 2
Click
Add Response Rule
.
The New Response Rule panel is displayed.
Step 3
Select one of the following response rule types:
•
Automated Response
- Automated response rules are triggered automatically
as incidents occur. This is the default value.
•
Smart Response
- Smart response rules are added to the Incident Command
screen and handled by an authorized Symantec DLP user.
Step 4
Click
Next
.
The Configure Response Rule panel is displayed.
Step 5
Configure the following values:
a
Rule Name
- Type a name for the rule you are creating. This name should be
descriptive enough for policy authors to identify the rule. For example,
SIEM
Syslog None Of SMTP
.
b
Description
- Optional. Type a description for the rule you are creating.
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......